wiby  
Settings



Introducing the REBOL Internet Operating System: IOS

http://www.rebol.com/ios/ios-intro.html

months. Full strength encryption, certificates, and authentication. Integrates quickly with legacy systems and existing databases. Administrative functions can be script operated.

Vigay.com : Main Homepage

http://www.vigay.com/

privacy and secure encryption methods. If you would like help with these matters, please feel free to contact me or view the security pages . Irrespective of whether you're a chil
All the news in one place

Things that make me mad

https://www.increasinglyadequate.com/mad.html

last. People who say encryption doesn't matter because somebody could torture you for the key. That's a bizarre justification for their own laziness. It's akin to telling people n
Basically, just a list of things that make me mad.

NLnet; 55 New Projects Awarded NGI0 Grants

https://nlnet.nl/news/2023/20231123-announcing-projects.html

including the X25519 encryption system and the Ed25519 signature system. Curve25519 is the fastest curve in TLS 1.3, and the only curve in Wireguard, Signal, and many other applic

Linux

https://www.billdietrich.me/Linux.html

security mechanisms and encryption and more. Linux kernel map Linux kernel map Interactive map of Linux kernel sleeplessbeastie's "How to display kernel release information" Kerne
Linux operating system basics, parts, myths, and truths

Privacy Tips || LurkBeforePost

http://lurkbeforepost.win/tutorials/privacy/

hard Learn to use PGP encryption Start using the dark web De-Google your phone Encrypt your drives! TailsOS in your pocket right NOW! Obfuscating the money trail Non-technical goo

Fuck Big Tech: A Privacy Guide

https://fuckbigtech.neocities.org/

uses Zero-Knowledge Encryption, which means they don't know your password and have no access to it. When you create an account, a hash function is encrypted to it, and when you en
Big Tech strives to end privacy and make massive surveillance non-optional, you best start believing in cyberpunk dystopias, you are in one.

jwz

https://www.jwz.org/blog/

warns the operator when encryption is not engaged. At first, a human read the numbers. Eventually, the station switched to using automated numbers. In addition, there have been a
jwz's blog, est. 1994. Jamie Zawinski was one of the founders of Netscape and Mozilla.org, was the primary developer of Lucid Emacs, and wrote most of your screen savers. Tod

Fake privacy / security initiatives

http://digdeeper.love/articles/fake_initiatives.xhtml

- - "End-to-end" encryption - - Forced "protection" - - Silent or forced updates - - External link filters - - Firefox Send - - Firefox Lockbox - - EFF's "Who has your back?" - -

Net.Legends.FAQ (Noticeable Phenomena Of UseNet) Part 1/4

https://www.linux.it/~md/usenet/legends1.html

"xvob" ("kibo" in rot13 encryption) and anti-grepping for "ski boots", for obvious reasons (but not for "kibosh"...). He has become a UseNet term, derived from this activity: grep

Let's Decentralize

https://letsdecentralize.org/

(by using end-to-end encryption), and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary p

The Code of the Geeks v3.1 Generator

http://www.joereiss.net/geek/geek.html

of information. Encryption just bogs that down. ( ) > PGP--- If you support encryption on the Internet, you must be a drug dealer or terrorist or something like that. ( ) >


Find more...