"VeraCrypt 1.0e is out with many security fixes and performance enhancements." Okay security fixes such as? The documentation could be better....
Depends on what you want, I thought the main goal with this phone was a decent level of privacy but maybe I understand this phones goal wrong, did...
If they were serious about privacy they wouldn't add two cameras (at least they would make them "mechanically blocked" by default). I think they...
If you are a bit paranoid you will touch all the things that you don't need. Such as webgl, a lot of the things under media: wave, opus, ogg and...
If facebook was serious about letting people rule their privacy they would let you rule it already. The tools you get to control the privacy isn't...
I think people exaggerate when they present passwords as a huge issue. How often are you hacked due to your password? It seems like the Bogeyman...
I hope you guys deliver on this. Its pretty much a main thing I see lacking with this interesting software.
With previous incidents of celebrities having their "private videos" and cellphones hacked one would think they would be a little more careful...
If someone is worried, just change password to those sites you care for (will take a few minutes maybe) but just paying these guys will take just...
You have no security at home unless you runs a custom OS that is highly stripped of junk code, but Stay away from wireless if possible. I like to...
A little paranoia has never hurt (actually it saved a few people). Tor has many theoretical weaknesses (tho we lack evidence of concrete hacks)....
You need secure endpoints as well for a secure connection. If one endpoint that does the decryption is potentially tapped then the connection...
I find this interesting as well. It seems possible that an algorithm could identify child porn using some advanced young/nude recognition feature...
As long as they aren't paying millions for any backdoors found its probably backdoored or just poorly coded. I would trust it if they were to say...
You can be anonymous when browsing. But the way you describe is not a (secure) way (its more how a noob would do it). It will fool many. But its...
One router I ordered was shipped with a dual logon. Its not something normal computer users would have noted and I barley did. The security in...
The first thing that strikes me as odd considering that this is supposed to be a product aimed for "paranoid" or at least "privacy aware" people...
Most software is somewhat stable so removing "that software" or at least disabling it might not make any noticeable difference for you. But just...
How do they say. Fool me once? A totally unrelated link: security theater.
If the program is acting in a way it shouldn't then I'm sure most developers would want to know about it (whenever it has to do with stability or...
There already are a lot of documentation and guidelines (of varying quality..) out there for those wanting it. Maybe the documentation is boring...
Its a good idea to use windows own functionality and other trusted tools to add holes to a system and weaken it. Once done, almost no security...
This is another good way to do this and even more user friendly. But its worth noting that when you add stuff to be possible to run "on command"...
One way of doing this is by simple scripts in powershell. When I uses someones computer and I don't feel like doing much work I usually just plug...
Google him and have a chat online with "him" to make up your own mind if he is convincing or not. He does give good answer to some stuff but other...
Separate names with a comma.