Hobbes' Internet Timeline - the definitive ARPAnet & Internet historyhttps://www.zakon.org/robert/internet/timeline/
of an RSA file security encryption program tattooed on his arm (:wired496:) RFC 1882: The 12-Days of Technology Before Christmas Country domains registered: Ethiopia (ET), Cote d'
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'
Securityhttp://askmrwizard.com/2019/Security/Security.htm
of foundational, modern encryption How your computer's Operating System really works What the blinking lights really mean on your Router and Wifi equipment The simplest way to man
Your Personal Web Sitehttps://www.billdietrich.me/YourPersonalWebSite.html
And maybe I need an encryption key, too. [Eventually asked Support, they said yes need SSH, no key, they'll enable SSH on my account. Login details a bit different, but now SFTP w
How to develop and maintain your own personal web site
Digital Freedom across the Worldhttps://eylenburg.github.io/countries.htm
may insist that encryption is bad because it's just used by criminals and nonces and if you have nothing to hide you have nothing to fear, that we can't protect children from harm
{REPLACE THIS}
Ayham's Online Website | A Practical Guide to GnuPGhttps://ayham.xyz/posts/a-practical-guide-to-gpg/
GnuPG uses asymmetric encryption, which means that you would use 2 keys. Private keys for decrypting data. Public keys for encrypting data. By default, the implementation of GnuPG
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
as possible. Full encryption on devices link , two-factor authentication link on important online accounts, reduce browser fingerprint link , VPN link , opt out of data-broker tra
Best practices and information about computer and smartphone security and privacy
Threat modelling case study: bicycleshttps://calpaterson.com/bicycle-threat-model.html
important data" or "use encryption" but these can all be just as vapid. "Strong passwords!" as a slogan fails to address the fact that the average internet user has hundreds of lo
How to avoid buying your bike again every 6-12 months and tips for how to apply the same reasoning to other things, like computers
Wayne Pollock's Home Pagehttp://wpollock.com/
available to provide encryption and digital signatures for your email and files, known as Gnu Privacy Guard (or GnuPG or simply GPG ). This is compatible with the older Pret
Wayne Pollock homepage
Brad Templeton's Home Pagehttps://www.templetons.com/brad/
with opportunistic encryption. How to solve sysadmin and upgrade problems in modern operating systems. A conceptual draft for Out-of-Band SGML /HTML/XMLs which are a way to provid
NLnet; All projectshttps://nlnet.nl/project/
of identity-based encryption NGI0 PET 2019 2019 Make encryption simpler A Secret Key Store for Sequoia PGP NGI Assure 2021 2024 Standards-compliant private key store for OpenPGP A
15 reasons not to start using PGPhttps://secushare.org/PGP
is better than no encryption at all, and being end-to-end it is also better than relying on SMTP over TLS (that is, point-to-point between the mail servers while the message is un
::[FSFLA]:: 0G Manifesto: Escaping the Surveillance Blackhole with Free Mobile Computinghttp://www.fsfla.org/ikiwiki/blogs/lxo/pub/0G
etc, besides end-to-end encryption policies. Connectivity Just having a SIM card, or even a cellular link, is enough for base stations to track you through your phone. Considering
Find more...