Anyone that doesn't live in a cave has heard about the mass hackings of late and that those behind the hacks have been dumping the personal info...
Normally I don't subscribe to the idea that "two wrongs make a right" but this is just too good. From the article: Anyone stupid enough to put...
Provided that the adversary hasn't stolen the private key.
There is a double standard involved that users could take advantage of. Corporations and businesses have greater freedom to defend themselves, and...
When one looks at the number of linux servers that are compromised, physical access is clearly not required. Can one really assume that the...
The term "selectively" is the problem. The closest I can think of are CD-R and DVD-R, custom built and equipped on an air gapped machine. Copying...
If Microsoft did that, their planned obsolescence business model would suffer. If they made a secure OS, they couldn't use all of the scare...
Linux users aren't safe either. They have an RCS agent for linux. [img] In image 8, they list 26 security products that they could evade...
In the Bromium Labs report, did you see this? I haven't used it in a while, but isn't Virtualbox also capable of running VMWare disks? If they...
In that respect, they're no different than the countries with "state controlled media" as the US is fond of saying. The only difference is that in...
Make a system backup before you install a new app. When you want to get rid of that app, use that backup and forget the uninstaller. If you keep...
I didn't take you that way. You were basically repeating the script the media uses to describe Tor users. Even in local news, that control is...
@mirimir Two sets of laws and standards of acceptable behavior. The one for corporations and governments is anything you can get away with is...
A classic HIPS with the ability to control parent/child permissions can intercept these attempts. On most of them, you'll have to enable this...
And who didn't see this coming? The US tries to do this under the guise of national security, then hide the fact. The US seems to think that only...
That individual chose to do this. He could have done the same thing with linux. Windows has nothing to do with it. I ran an exit for almost 2...
Combine this technology with the selfie craze of many people. Something to think about.
Actually, that's the setup I'm still using. Mozilla used to be a lot better than they are now. SeaMonkey used to be called the Mozilla Suite....
@Georgiegie This post describes the basic package that I use. It's an older version of the Vidalia exit bundle, which they appear to no longer...
Have they restricted 3rd party connections yet?
I don't use Tails or the Tor browser, aka FireFox. I'm rapidly losing trust in Mozilla thanks to the "call home" feature creep. I can't comment...
I don't use a VPN, just Tor. For me, IPv6 is not an issue. My equipment is all IPv4. Regarding DNSCrypt, it serves no purpose with Tor. When you...
Like several other questions regarding Tor, there's compromises involved. Trust is one of the big issues. On what basis can an exit node be...
Your ISP will see the first place you connect to, regardless of whether it's a VPN or Tor. In both cases, where you connect from there is beyond...
It's a perfectly vicious circle. A secure key exchange requires a connection that can't be MITM'd. A connection that can't be MITM'd requires that...
Separate names with a comma.