wiby  
Settings



Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

of an RSA file security encryption program tattooed on his arm (:wired496:) RFC 1882: The 12-Days of Technology Before Christmas Country domains registered: Ethiopia (ET), Cote d'
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Security

http://askmrwizard.com/2019/Security/Security.htm

of foundational, modern encryption How your computer's Operating System really works What the blinking lights really mean on your Router and Wifi equipment The simplest way to man

Your Personal Web Site

https://www.billdietrich.me/YourPersonalWebSite.html

And maybe I need an encryption key, too. [Eventually asked Support, they said yes need SSH, no key, they'll enable SSH on my account. Login details a bit different, but now SFTP w
How to develop and maintain your own personal web site

Digital Freedom across the World

https://eylenburg.github.io/countries.htm

may insist that encryption is bad because it's just used by criminals and nonces and if you have nothing to hide you have nothing to fear, that we can't protect children from harm
{REPLACE THIS}

Ayham's Online Website | A Practical Guide to GnuPG

https://ayham.xyz/posts/a-practical-guide-to-gpg/

GnuPG uses asymmetric encryption, which means that you would use 2 keys. Private keys for decrypting data. Public keys for encrypting data. By default, the implementation of GnuPG

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

as possible. Full encryption on devices link , two-factor authentication link on important online accounts, reduce browser fingerprint link , VPN link , opt out of data-broker tra
Best practices and information about computer and smartphone security and privacy

Threat modelling case study: bicycles

https://calpaterson.com/bicycle-threat-model.html

important data" or "use encryption" but these can all be just as vapid. "Strong passwords!" as a slogan fails to address the fact that the average internet user has hundreds of lo
How to avoid buying your bike again every 6-12 months and tips for how to apply the same reasoning to other things, like computers

Wayne Pollock's Home Page

http://wpollock.com/

available to provide encryption and digital signatures for your email and files, known as Gnu Privacy Guard (or GnuPG or simply GPG ).  This is compatible with the older Pret
Wayne Pollock homepage

Brad Templeton's Home Page

https://www.templetons.com/brad/

with opportunistic encryption. How to solve sysadmin and upgrade problems in modern operating systems. A conceptual draft for Out-of-Band SGML /HTML/XMLs which are a way to provid

NLnet; All projects

https://nlnet.nl/project/

of identity-based encryption NGI0 PET 2019 2019 Make encryption simpler A Secret Key Store for Sequoia PGP NGI Assure 2021 2024 Standards-compliant private key store for OpenPGP A

15 reasons not to start using PGP

https://secushare.org/PGP

is better than no encryption at all, and being end-to-end it is also better than relying on SMTP over TLS (that is, point-to-point between the mail servers while the message is un

::[FSFLA]:: 0G Manifesto: Escaping the Surveillance Blackhole with Free Mobile Computing

http://www.fsfla.org/ikiwiki/blogs/lxo/pub/0G

etc, besides end-to-end encryption policies. Connectivity Just having a SIM card, or even a cellular link, is enough for base stations to track you through your phone. Considering


Find more...