I hate to break your bubble, but: All that the article talks about is "subscriber records". No where in the article is explained what...
The same applies to TrueCrypt aswell.
Of course it is not widely used. First, as mentioned before, you need a TPM-module. Although there are ways to make BitLocker work without a...
Slightly offtopic of course: But what did happen to that guy from CryptoCloud. I never figured out for what is was arrested for. Was it...
Seriously, like anybody is really going to read all of that. But Germany, being part of the EU, isnt in reality all that kind when it comes to...
Maybe he WAS one of the suspects. ;D I kid, I kid.
My conspiracy-radar did "beep beep" upon reading this. Good luck gaining offline access through Truecrypt used as a FDE.
I wonder how they even got noticed, since they weren't stealing intelligence ...yet. So did they also got on the FBI's radar through money...
Can you use batch-scripts with PGP Desktop, like you can with Truecrypt? And by batch-script I mean something that you can do from Windows'...
Sorry for being such a johny-come-lately but for which charges was Spink arrested? Another case of hard drugs?
Hi all, Speed-issue: I've been using CryptoCloud for a couple of days and see that the speed is around 50 kilobytes/second through every node....
The website, that Caspian mentions, uses Java to get the MAC-address. My browser, that blocks all running scripts bij default, including Java,...
"Windows Genuine Advantage" has nothing to do with the network at all. WGA uses several points of data concerning your hardware to composite a...
Again, I know of no such software or hardware that would "look" at the MAC-address of your NIC. Not even your ISP would be interested in that....
Websites, by default, dont see MAC-addresses. Perhaps a website with the right script could obtain such an address from a visitor's computer....
Couldn't this be caused by running a cable-modem in bridge-mode? A know alot of cable-modems that do only that. But something tells me that...
Justin, If you were to give someone one advice, who's business relies on securing the data of their laptops. What would you advice: Truecrypt...
Also it only addresses Coffee, while most LEA forensic specialists, that I know personally, use FTK. And besides FTK also another big brand who...
Yep, it beats every kind of computer forensics. Rendering it useless. Also given that the FDE-software you use doesn't has an enduser- and a...
I ussually dont see any kind of comments at all about this but, apparently it does get read by people here. In that light I stand corrected.
I thought this was a forum, not a website for your daily newsdump. Without any commentary, this is just an ordinary newsdump. Sjeez, Snowdrift.
A lot of networking-hardware manufacturers offer this features in complaint to government regulations. It is not so weird, when you know that...
Does anybody know how much a Narus STA 6400 in reality costs? The Narus STA 6400 is one of the interception devices on AT&T's network on behalf...
CAST 256 did not replace AES. It was in competition with the likes of Rijndael, and did not made it to get the label of "AES" . Only Rijndael...
Wow, an opening post without an opinion. One might get the idea that this is just ordinairy spam. Getting back ontopic: Why use CAST 256 when...
Separate names with a comma.