Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
Cryptography, crime, terror, and surveillancehttps://mohit.uk/git-bin/epq/paper.html
suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan
Greg A. Woodshttp://www.weird.com/~woods/
name to look up. Old Computers Once upon a time (before I moved most recently) I had a small collection of old computers. Well maybe it wasn't all that small.... Sadly most of it
OpenBSD Router Guidehttps://openbsdrouterguide.net/
but it can protect your computers and devices on the inside of the network, and it can help you monitor and control the traffic that comes and goes to and from your local network.
On the xz-utils backdoorhttps://andrewdmorrow.com/on-the-xz-utils-backdoor.html
(and arguably before computers took over the world). They sprang up in the early 90's and remain largely unchanged. Relationships of trust which were appropriate to a hobbyist pro
Trust The Linux ecosystem (the kernel and distros like Ubuntu, Debian, and Fedora; which together form the backbone of modern digital infrastructure) operates on multiple distinct
t2bot.io - Docs - Terms and Conditionshttps://t2bot.io/docs/legal/terms-v1/
when we're at our computers, however as a small volunteer team we do not currently have automated alarms to be notified when the Service is under stress. We respond to issues
Public bridges, bots, and integrations. Visit #help:t2bot.io for more information.
Techrights — Links 30/01/2024: Many More Layoffs (Microsoft the Most Tech Layoffs This Year)http://techrights.org/n/2024/01/30/Links_30_01_2024_Many_More_Layoffs_Microsoft_the_Most_Tech_Layo.shtml
in Guam there are many computers in that island Bad faith: Hugo Roy knew FSFE impersonating FSF before French tribunal, colleagues deceived Reprinted with permission from Daniel P
Links for the day
Claws Mail configuration guide (incl. PGP)http://digdeeper.love/articles/claws.xhtml
systems or client computers. For clarity's sake - Claws Mail was immune to the attack - so the situation wasn't that bad. Still, it shows you shouldn't put all your privacy eggs i
Ross Anderson's Home Pagehttps://www.cl.cam.ac.uk/archive/rja14/
of security Our computers and communications use several percent of global energy, and have secondary costs too – particularly if you have to throw things away for lack of s
Find more...