Mar
16
2009
Make Fedora boot and shut down faster. The goal is to be at the login screen in 20 seconds and then to be as fast as possible after the login (gnome-session). New storage code to use udev for detection of block devices and rewritten modules for management of partitions (pyparted), LVM, Software RAID, and block device encryption (pycryptsetup).
Comments Off on Linux : Fedora 11 Accepted Features List. | tags: encryption, linux | posted in technical news
Mar
9
2009
In a recent blog post, CNet’s Jon Oitsik has called for a policy shift with respect to data encryption. A new standard by the Trusted Computing Group promises the availability of self-encrypting hard drives soon, leading some to call for immediate adoption. Will this create even more security problems due to lazy custodians, or should someone responsible for keeping your information safe be required to move to the new hardware? Hopefully the new hardware comes with a warning to continue to use other data protection measures as well.
Read more of this story at Slashdot.
Comments Off on Self-Encrypting Hard Drives and the New Security | tags: encryption, google, security, tv | posted in technical news
Feb
26
2009
An anonymous reader writes “If you’re planning on traveling internationally with a laptop, consider the following: District Court Overturns Magistrate Judge in Fifth Amendment Encryption Case. Laptop searches at the border have been discussed many times previously. This is the case where a man entered the country allegedly carrying pornographic material in an encrypted file on his laptop. He initially cooperated with border agents during the search of the laptop then later decided not to cooperate citing the Fifth Amendment. Last year a magistrate judge ruled that compelling the man to enter his password would violate his Fifth Amendment right against self-incrimination. Now in a narrow ruling, US District Judge William K. Sessions III said the man had waived his right against self-incrimination when he initially cooperated with border agents.” sohp notes that “the order is not that he produce the key — just that he provide an unencrypted copy.”
Read more of this story at Slashdot.
Comments Off on US District Ct. Says Defendant Must Provide Decrypted Data | tags: encrypted, encryption, google, laptop | posted in technical news
Feb
24
2009
CSEMike writes “Currently popular peer-to-peer networks suffer from a lack of privacy. For applications like BitTorrent or Gnutella, sharing a file means exposing your behavior to anyone interested in monitoring it. OneSwarm is a new file sharing application developed by researchers at the University of Washington that improves privacy in peer-to-peer networks. Instead of communicating directly, sharing in OneSwarm is friend-to-friend; senders and receivers exchange data using multiple intermediaries in an overlay mesh. OneSwarm is built on (and backwards compatible with) BitTorrent, but includes numerous extensions to improve privacy while providing good performance: point-to-point encryption using SSL, source-address rewriting, and multi-path and multi-source downloading. Clients and source are available for Linux, Mac OS X, and Windows.”
Read more of this story at Slashdot.
Comments Off on Combining BitTorrent With Darknets For P2P Privacy | tags: encryption, google, linux, Mac, network, privacy | posted in technical news
Feb
23
2009
CSEMike writes “Currently popular peer-to-peer networks suffer from a lack of privacy. For applications like BitTorrent or Gnutella, sharing a file means exposing your behavior to anyone interested in monitoring it. OneSwarm is a new file sharing application developed by researchers at the University of Washington that improves privacy in peer-to-peer networks. Instead of communicating directly, sharing in OneSwarm is friend-to-friend; senders and receivers exchange data using multiple intermediaries in an overlay mesh. OneSwarm is built on (and backwards compatible with) BitTorrent, but includes numerous extensions to improve privacy while providing good performance: point-to-point encryption using SSL, source-address rewriting, and multi-path and multi-source downloading. Clients and source are available for Linux, Mac OS X, and Windows.”
Read more of this story at Slashdot.
Comments Off on Combining BitTorrent With Darknets For P2P Privacy | tags: encryption, google, linux, Mac, network, privacy | posted in technical news
Feb
19
2009
nk497 writes “Hackers at the Black Hat conference have shown that SSL encryption isn’t as secure as online businesses would like us to think. Independent hacker Moxie Marlinspike showed off several techniques to fool the tech behind the little padlock on your screen. He claimed that by using a real world attack on several secure websites such as PayPal, Gmail, Ticketmaster and Facebook, he garnered 117 email accounts, 16 credit card numbers, seven PayPal logins and 300 other miscellaneous secure logins.”
Read more of this story at Slashdot.
Comments Off on Black Hat Presentation Highlights SSL Encryption Flaws | tags: email, encryption, facebook, gmail, google, web | posted in technical news
Feb
8
2009
While no one may have a real reason to spy on you, relying solely on security through obscurity has always been a poor policy to live by. Because of this, encryption is the only real option you can trust. We teach you how to put your emails in a lockbox before sending them off to their destinations.
Comments Off on Protect your Privacy! How to Send Encrypted Emails in Linux | tags: email, emails, encrypted, encryption, linux, privacy, security | posted in technical news
Jan
29
2009
Lucas123 writes “Six of the largest disk manufacturers, along with encryption management software vendors, are backing three specifications finalized [Tuesday] that will eventually standardize the way encryption is used in firmware within hard disk drives and solid state disk drive controllers ensuring interoperability. Disk vendors are free to choose to use AES 128-bit or AES 256-bit keys depending on the level of security they want. ‘This represents interoperability commitments from every disk drive maker on the planet,’ said Robert Thibadeau, chief technologist at Seagate Technology.”
Read more of this story at Slashdot.
Comments Off on Universal Disk Encryption Spec Finalized | tags: encryption, google, security, technology | posted in technical news
Jan
28
2009
The largest drive manufacturers, including SSD vendors, have agreed on a single specification to encrypt all drives.
Comments Off on Coming soon: Disk Encryption for All Computers | tags: computers, encryption, google | posted in technical news
Jan
20
2009
Comments Off on Judge blocks RIM's hostile bid for Certicom – Globe and Mail | tags: encryption, google, news, technology, tv | posted in technical news