Mar 16 2009

Linux : Fedora 11 Accepted Features List.

Make Fedora boot and shut down faster. The goal is to be at the login screen in 20 seconds and then to be as fast as possible after the login (gnome-session). New storage code to use udev for detection of block devices and rewritten modules for management of partitions (pyparted), LVM, Software RAID, and block device encryption (pycryptsetup).

Share

Mar 9 2009

Self-Encrypting Hard Drives and the New Security

In a recent blog post, CNet’s Jon Oitsik has called for a policy shift with respect to data encryption. A new standard by the Trusted Computing Group promises the availability of self-encrypting hard drives soon, leading some to call for immediate adoption. Will this create even more security problems due to lazy custodians, or should someone responsible for keeping your information safe be required to move to the new hardware? Hopefully the new hardware comes with a warning to continue to use other data protection measures as well.

Read more of this story at Slashdot.

Share

Feb 26 2009

US District Ct. Says Defendant Must Provide Decrypted Data

An anonymous reader writes “If you’re planning on traveling internationally with a laptop, consider the following: District Court Overturns Magistrate Judge in Fifth Amendment Encryption Case. Laptop searches at the border have been discussed many times previously. This is the case where a man entered the country allegedly carrying pornographic material in an encrypted file on his laptop. He initially cooperated with border agents during the search of the laptop then later decided not to cooperate citing the Fifth Amendment. Last year a magistrate judge ruled that compelling the man to enter his password would violate his Fifth Amendment right against self-incrimination. Now in a narrow ruling, US District Judge William K. Sessions III said the man had waived his right against self-incrimination when he initially cooperated with border agents.” sohp notes that “the order is not that he produce the key — just that he provide an unencrypted copy.”

Read more of this story at Slashdot.

Share

Feb 24 2009

Combining BitTorrent With Darknets For P2P Privacy

CSEMike writes “Currently popular peer-to-peer networks suffer from a lack of privacy. For applications like BitTorrent or Gnutella, sharing a file means exposing your behavior to anyone interested in monitoring it. OneSwarm is a new file sharing application developed by researchers at the University of Washington that improves privacy in peer-to-peer networks. Instead of communicating directly, sharing in OneSwarm is friend-to-friend; senders and receivers exchange data using multiple intermediaries in an overlay mesh. OneSwarm is built on (and backwards compatible with) BitTorrent, but includes numerous extensions to improve privacy while providing good performance: point-to-point encryption using SSL, source-address rewriting, and multi-path and multi-source downloading. Clients and source are available for Linux, Mac OS X, and Windows.”

Read more of this story at Slashdot.

Share

Feb 23 2009

Combining BitTorrent With Darknets For P2P Privacy

CSEMike writes “Currently popular peer-to-peer networks suffer from a lack of privacy. For applications like BitTorrent or Gnutella, sharing a file means exposing your behavior to anyone interested in monitoring it. OneSwarm is a new file sharing application developed by researchers at the University of Washington that improves privacy in peer-to-peer networks. Instead of communicating directly, sharing in OneSwarm is friend-to-friend; senders and receivers exchange data using multiple intermediaries in an overlay mesh. OneSwarm is built on (and backwards compatible with) BitTorrent, but includes numerous extensions to improve privacy while providing good performance: point-to-point encryption using SSL, source-address rewriting, and multi-path and multi-source downloading. Clients and source are available for Linux, Mac OS X, and Windows.”

Read more of this story at Slashdot.

Share

Feb 19 2009

Black Hat Presentation Highlights SSL Encryption Flaws

nk497 writes “Hackers at the Black Hat conference have shown that SSL encryption isn’t as secure as online businesses would like us to think. Independent hacker Moxie Marlinspike showed off several techniques to fool the tech behind the little padlock on your screen. He claimed that by using a real world attack on several secure websites such as PayPal, Gmail, Ticketmaster and Facebook, he garnered 117 email accounts, 16 credit card numbers, seven PayPal logins and 300 other miscellaneous secure logins.”

Read more of this story at Slashdot.

Share

Feb 8 2009

Protect your Privacy! How to Send Encrypted Emails in Linux

While no one may have a real reason to spy on you, relying solely on security through obscurity has always been a poor policy to live by. Because of this, encryption is the only real option you can trust. We teach you how to put your emails in a lockbox before sending them off to their destinations.

Share

Jan 29 2009

Universal Disk Encryption Spec Finalized

Lucas123 writes “Six of the largest disk manufacturers, along with encryption management software vendors, are backing three specifications finalized [Tuesday] that will eventually standardize the way encryption is used in firmware within hard disk drives and solid state disk drive controllers ensuring interoperability. Disk vendors are free to choose to use AES 128-bit or AES 256-bit keys depending on the level of security they want. ‘This represents interoperability commitments from every disk drive maker on the planet,’ said Robert Thibadeau, chief technologist at Seagate Technology.”

Read more of this story at Slashdot.

Share

Jan 28 2009

Coming soon: Disk Encryption for All Computers

The largest drive manufacturers, including SSD vendors, have agreed on a single specification to encrypt all drives.

Share

Jan 20 2009

Judge blocks RIM's hostile bid for Certicom – Globe and Mail


AFP

Judge blocks RIM's hostile bid for Certicom
Globe and Mail – 6 hours ago
Toronto — An Ontario judge has blocked Research In Motion Ltd. from proceeding with a hostile bid for Certicom Corp. According to a ruling by Justice Alexandra Hoy, the BlackBerry maker will be barred from continuing its unfriendly offer for the
Canadian blackberry maker RIM may appeal court block of takeover AFP
Certicom granted permanent injunction restraining RIM take-over bid FOXBusiness
The Canadian Press – Reuters – Hindu – Computer Business Review
all 94 news articles
Share