It seems that you're concerned about Java applets, ResoMail is an application which runs on Java platform, it's not an applet. It's on your...
Why Java is a problem?
It encrypts your communication. And it's safe from data eavesdropping. It's a one time password to allow you to generate a secure key pair for...
I've opened a topic about open sourcing cryptography software, can you please help me with advice, the topic is here:...
I'm sorry, but why do you think that ResoMail send your private keys? It send only public key to certificate authority (domain owner) to be...
I thought that may be there are some limitation in hosting cryptography software there, based on it being hosted in US? I want people to be able...
Why you're an opponent of plausible deniability?
Here is the official site of Vanish: http://vanish.cs.washington.edu/ The idea is interesting: if you've sent a message to somebody who...
There are a lot of places where there is free Wi-Fi, here in our central park there is free Wi-Fi a lot of restaurants and bars, airport etc.
Faking DNS is also hacking so I don't see a big difference from practical point of view.
Not always, if you're not using https the page transfered to you can be tampered by man in the middle, and your isp is in the middle, it can take...
What is the best way to publish sources for encryption software? Is a version control system a must or I can publish just an archive with...
Noroc! :) It seems that you're using Firefox. What is in Edit->Preferences->Main->Home Page ? If there is google.ro then try open a new page...
Thank you! :) Now they can go to http://resomail.com download the client, unpack or install it, depending on whether they have installer or...
Initially I wanted to create a "paranoid" composite cryptographic engine for ResoMail, which will link together several algorithm, like TrueCrypt...
If there are no security flaws in both services it's secure to log to both.
At least for backup services you can encrypt by yourself your content, but for on-line documents it's much more difficult.
Thank you, but what you showed doesn't reveal your real IP address. Actually I was afraid that since JavaScript executes on client side it somehow...
Actually Truecrypt deniability consist in ability for the same volume to have 2 different passwords and opening 2 different disks, one is from...
I've read that there are no major security flows been found in Twofish, and the winner for AES was chosen for simplicity and speed. I've chosen...
And how this can compromise your identity if you're using an anonymous encrypted tool, like tor?
It depends on ISP. Some ISPs have hard-coded IP addresses.
I've been developing ResoMail for quite some time and I need your help. I'm looking for people who would like to test it and for volunteers to...
Actually you can create a fully anonymous identity and while surfing with that identity don't provide any real info about yourself. You can...
Yes, using tor will slow your speed, so you'll have to make some compromises for privacy.
Separate names with a comma.