interesting links2024-02-23T11:15:43+01:00https://roland.iwasno.net/links/https://roland.iwasno.net/links/https://roland.iwasno.net/links/What is the Small Web? – Aral Balkanhttps://roland.iwasno.net/links/?S86xtw2024-02-23T11:15:43+01:00Ideas about reducing the dependence on big companies. See also the author's blog, which contains interesting articles such as<br />
<a href="https://ar.al/2021/11/23/how-to-apply-a-chroma-key-using-imagemagick/" rel="nofollow">https://ar.al/2021/11/23/how-to-apply-a-chroma-key-using-imagemagick/</a><br />
<a href="https://ar.al/2018/10/26/version-display-linux-version-information" rel="nofollow">https://ar.al/2018/10/26/version-display-linux-version-information</a><br />
<br />
<a href="https://ar.al/2021/08/16/key-mapper-a-visual-tool-for-remapping-keys-and-more-on-linux/" rel="nofollow">https://ar.al/2021/08/16/key-mapper-a-visual-tool-for-remapping-keys-and-more-on-linux/</a><br />
<a href="https://ar.al/2019/03/12/reclaiming-your-tilde-and-backtick-with-mac-uk-layout-on-an-ansi-us-keyboard/" rel="nofollow">https://ar.al/2019/03/12/reclaiming-your-tilde-and-backtick-with-mac-uk-layout-on-an-ansi-us-keyboard/</a><br />
<a href="https://ar.al/2019/03/11/setting-multiple-key-bindings-for-the-same-action-in-gnome/" rel="nofollow">https://ar.al/2019/03/11/setting-multiple-key-bindings-for-the-same-action-in-gnome/</a><br />
<a href="https://ar.al/2018/07/18/typographical-typing-habits-for-linux" rel="nofollow">https://ar.al/2018/07/18/typographical-typing-habits-for-linux</a><br>(<a href="https://roland.iwasno.net/links/?S86xtw">Permalink</a>)Using FIDO2 Auth Keys (Yubikey, Solokeys) with MacOS and FreeBSD // hackacad.nethttps://roland.iwasno.net/links/?aEOkIQ2024-02-20T13:43:01+01:00Just what it says in the title.<br>(<a href="https://roland.iwasno.net/links/?aEOkIQ">Permalink</a>)GPSJAM - daily GPS/GNSS Interference Maphttps://roland.iwasno.net/links/?7TCY-Q2024-02-12T15:34:10+01:00Daily maps of navigation accuracy as reported by aircraft using ADS-B.<br />
Provided by John Wiseman<br>(<a href="https://roland.iwasno.net/links/?7TCY-Q">Permalink</a>)GPG in Emacs - First Step Towards Data Securityhttps://roland.iwasno.net/links/?lLeFhA2024-01-04T00:02:04+01:00Found on Sacha Chua's blog <a href="https://sachachua.com/blog/2024/01/2024-01-01-emacs-news/" rel="nofollow">https://sachachua.com/blog/2024/01/2024-01-01-emacs-news/</a><br>(<a href="https://roland.iwasno.net/links/?lLeFhA">Permalink</a>)DROPSAFE Security, Privacy, Digital Rights, and Nerdy Parenthoodhttps://roland.iwasno.net/links/?8aJSnw2024-01-02T12:59:19+01:00Found via a link on the TUHS mailing list to <a href="https://alecmuffett.com/article/108789" rel="nofollow">https://alecmuffett.com/article/108789</a><br />
See <a href="https://alecmuffett.com/article/108139" rel="nofollow">https://alecmuffett.com/article/108139</a> "Hot on the heels of #ChatControl and in the name of “identity” and “consumer choice” the EU seeks the ability to undetectably spy on HTTPS communication; 300+ experts say “no” to #Article45 of #eIDAS #QWAC"<br>(<a href="https://roland.iwasno.net/links/?8aJSnw">Permalink</a>)A demo of the WebAuthn specificationhttps://roland.iwasno.net/links/?PiNRNA2023-11-17T15:59:56+01:00Found in c't 2023-10 (TBC).<br />
See also <a href="https://passkey.org/" rel="nofollow">https://passkey.org/</a> which was mentioned in the same article.<br>(<a href="https://roland.iwasno.net/links/?PiNRNA">Permalink</a>)Getting started with Google OpenSKhttps://roland.iwasno.net/links/?4_a2Sw2023-11-14T07:41:40+01:00OpenSK <a href="https://github.com/google/OpenSK" rel="nofollow">https://github.com/google/OpenSK</a> released by Google is a fully open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.<br />
<br />
OpenSK is based on the FIDO2 specifications, which combine the World Wide Web Consortium’s (W3C) Web Authentication (WebAuthn) specification and FIDO Alliance’s corresponding Client-to-Authenticator Protocol (CTAP).<br />
<br />
The nRF52840 MDK USB Dongle works well with OpenSK. Taking advantage of the UF2 Bootloader, you can easily program the OpenSK by just copying the .uf2-format image to the flash drive.<br>(<a href="https://roland.iwasno.net/links/?4_a2Sw">Permalink</a>)Keyoxidehttps://roland.iwasno.net/links/?acPqYw2023-05-02T14:31:37+02:00Verifying online identity with cryptography.<br />
Found via Nicolas Martyanoff's page <a href="https://www.n16f.net/about/" rel="nofollow">https://www.n16f.net/about/</a><br>(<a href="https://roland.iwasno.net/links/?acPqYw">Permalink</a>)Blog - Copperheadhttps://roland.iwasno.net/links/?ybQ0rQ2023-04-24T16:23:45+02:00Found via <a href="https://cpbotha.net/2016/11/27/android-security-in-2016-is-a-mess/" rel="nofollow">https://cpbotha.net/2016/11/27/android-security-in-2016-is-a-mess/</a><br>(<a href="https://roland.iwasno.net/links/?ybQ0rQ">Permalink</a>)SC4: Secure Communications in a Very Small Code Basehttps://roland.iwasno.net/links/?Tew39g2023-04-21T17:16:05+02:00SC4 is a secure communications system specifically designed for (relatively) easy auditability by way of a ruthless commitment to simplicity. SC4 provides the functional equivalent of PGP from the end-user's point of view, but implements it in two order of magnitude less code. The cryptographic core of SC4 is Daniel J. Bernstein's TweetNaCl library (<800 LOC). On top of this we have a variety of UI implementations ranging from 1000 to 5000 LOC. One of these has completed a formal audit to date.<br>(<a href="https://roland.iwasno.net/links/?Tew39g">Permalink</a>)Signs of Triviality - Opinions, mostly my own, on the importance of being and other things.https://roland.iwasno.net/links/?6ry7gA2023-03-22T11:45:04+01:00Blog, mostly about network-related things. Found via <a href="https://www.tuhs.org/pipermail/tuhs/2023-March/028267.html" rel="nofollow">https://www.tuhs.org/pipermail/tuhs/2023-March/028267.html</a><br />
Time is an illusion, Unix time doubly so... <a href="https://www.netmeister.org/blog/epoch.html" rel="nofollow">https://www.netmeister.org/blog/epoch.html</a><br />
Sharing Secrets <a href="https://www.netmeister.org/blog/sharing-secrets.html" rel="nofollow">https://www.netmeister.org/blog/sharing-secrets.html</a><br>(<a href="https://roland.iwasno.net/links/?6ry7gA">Permalink</a>)Hardware-based SSH/GPG agenthttps://roland.iwasno.net/links/?pv4iOg2022-09-24T14:37:05+02:00This project allows you to use various hardware security devices to operate GPG and SSH. Instead of keeping your key on your computer and decrypting it with a passphrase when you want to use it, the key is generated and stored on the device and never reaches your computer. Read more about the design on <a href="https://github.com/romanz/trezor-agent/blob/master/doc/DESIGN.md" rel="nofollow">https://github.com/romanz/trezor-agent/blob/master/doc/DESIGN.md</a><br />
<br />
Currently TREZOR One, TREZOR Model T, Keepkey, Ledger Nano S, and OnlyKey are supported.<br>(<a href="https://roland.iwasno.net/links/?pv4iOg">Permalink</a>)roughtime - Git at Googlehttps://roland.iwasno.net/links/?ykRN0g2022-09-08T17:46:49+02:00Roughtime is a protocol that aims to achieve rough time synchronisation in a secure way that doesn't depend on any particular time server, and in such a way that, if a time server does misbehave, clients end up with cryptographic proof of it.<br />
<br />
“Rough” time synchronisation means that, at this stage, we would be happy with time synchronisation to within 10 seconds of the correct time. If you have serious time synchronisation needs you‘ll want the machinery in NTP or even PTP (which needs hardware support to do right). There’s no reason why Roughtime shouldn‘t be (almost) as precise as NTP, but the use cases that we have in mind for now don’t need much precision. For example, about 25% of certificate errors shown by Chrome appear to be caused by bad local clocks and we don't need much precision to fix that.<br />
<br />
Found via Cillian O'Driscoll's fork <a href="https://github.com/odrisci/roughtime" rel="nofollow">https://github.com/odrisci/roughtime</a><br />
See also <a href="https://github.com/oreparaz/vroughtime" rel="nofollow">https://github.com/oreparaz/vroughtime</a> for a simple client written in C.<br>(<a href="https://roland.iwasno.net/links/?ykRN0g">Permalink</a>)GNU Privacy Guard is very powerful software with a terrible interface.https://roland.iwasno.net/links/?OWVyDA2022-07-01T11:31:54+02:00This document attempts to give you the tools needed to answer questions and explain the mysteries of gpg and PGP so that you too can take advantage of this tool and stop making excuses.<br />
Found on <a href="https://rgoulter.com/blog/posts/programming/2022-06-10-a-visual-explanation-of-gpg-subkeys.html" rel="nofollow">https://rgoulter.com/blog/posts/programming/2022-06-10-a-visual-explanation-of-gpg-subkeys.html</a><br />
See also <a href="https://github.com/dmshaw/paperkey" rel="nofollow">https://github.com/dmshaw/paperkey</a> and <a href="https://github.com/jonathancross/jc-docs" rel="nofollow">https://github.com/jonathancross/jc-docs</a><br>(<a href="https://roland.iwasno.net/links/?OWVyDA">Permalink</a>)A Visual Explanation of GPG Subkeys - Richard Goulter's Bloghttps://roland.iwasno.net/links/?J2USmg2022-06-27T11:17:05+02:00Found via <a href="https://rgoulter.com/blog/posts/programming/2020-08-22-early-impressions-of-bm40rgb-ortholinear-keyboard.html" rel="nofollow">https://rgoulter.com/blog/posts/programming/2020-08-22-early-impressions-of-bm40rgb-ortholinear-keyboard.html</a><br />
See also<br />
<a href="https://rgoulter.com/blog/posts/programming/2022-02-20-using-home-manager-to-manage-symlinks-to-dotfiles.html" rel="nofollow">https://rgoulter.com/blog/posts/programming/2022-02-20-using-home-manager-to-manage-symlinks-to-dotfiles.html</a><br />
<a href="https://rgoulter.com/blog/posts/programming/2014-04-26-online-resources-for-git.html" rel="nofollow">https://rgoulter.com/blog/posts/programming/2014-04-26-online-resources-for-git.html</a><br />
and probably more.<br>(<a href="https://roland.iwasno.net/links/?J2USmg">Permalink</a>)EFF's New Wordlists for Random Passphrases | Electronic Frontier Foundationhttps://roland.iwasno.net/links/?fRtfQQ2022-06-09T13:55:16+02:00Improved word lists for dice-generated passphrases, found via <a href="https://michael.kjorling.se/password-tips/" rel="nofollow">https://michael.kjorling.se/password-tips/</a><br>(<a href="https://roland.iwasno.net/links/?fRtfQQ">Permalink</a>)Qubes OS: A reasonably secure operating system | Qubes OShttps://roland.iwasno.net/links/?n21Yew2022-05-09T08:17:57+02:00Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes.<br>(<a href="https://roland.iwasno.net/links/?n21Yew">Permalink</a>)Encrypting sensitive and personal datahttps://roland.iwasno.net/links/?BZ9vIg2022-04-06T17:01:32+02:00Available for Linux, OS X and Windows. More details can be found on <a href="https://www.primx.eu/en/encryption-software/zed-en/" rel="nofollow">https://www.primx.eu/en/encryption-software/zed-en/</a><br />
ALGORITHMS: AES (128 to 256 bits) and RSA (1024 to 4096 bits).<br />
TECHNOLOGIES: PKCS#1, PKCS#5, PKCS#11, X509, Microsoft CSP, LDAP technologies, PKIx compatible.<br />
PKCS#1 RSA Cryptography Standard <a href="https://en.wikipedia.org/wiki/PKCS_1" rel="nofollow">https://en.wikipedia.org/wiki/PKCS_1</a> <br />
PKCS#5 Password-based Encryption Standard <a href="https://en.wikipedia.org/wiki/PBKDF2" rel="nofollow">https://en.wikipedia.org/wiki/PBKDF2</a><br />
PKCS#11 Cryptographic Token Interface <a href="https://en.wikipedia.org/wiki/PKCS_11" rel="nofollow">https://en.wikipedia.org/wiki/PKCS_11</a><br />
X509 <a href="https://en.wikipedia.org/wiki/X.509" rel="nofollow">https://en.wikipedia.org/wiki/X.509</a> (ITU) standard defining the format of public key certificates.<br />
Does CSP stand for <a href="https://en.wikipedia.org/wiki/Credential_service_provider" rel="nofollow">https://en.wikipedia.org/wiki/Credential_service_provider</a> , Cloud service provide <a href="https://mymatetech.net/what-is-microsoft-csp-ab5b80519e79" rel="nofollow">https://mymatetech.net/what-is-microsoft-csp-ab5b80519e79</a> or something else?<br />
LDAP <a href="https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol" rel="nofollow">https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol</a><br />
Does PKIx stand for <a href="https://en.wikipedia.org/wiki/X.509#PKIX_Working_Group" rel="nofollow">https://en.wikipedia.org/wiki/X.509#PKIX_Working_Group</a> ?<br />
<br />
SYSTEMS: Available for Windows 11 to Windows 7, Linux (various distributions) and Mac OS.<br />
LANGUAGES: Available in 7 languages.<br />
ZED! mobile app for iOS and Android.<br>(<a href="https://roland.iwasno.net/links/?BZ9vIg">Permalink</a>)GitHub - seemoo-lab/fido2ext: Bring Your Own FIDO2 Extensions!https://roland.iwasno.net/links/?A5wSXA2022-03-15T13:40:16+01:00This repository documents how to implement custom FIDO2 extensions. It contains supplementary material to our paper at ETAA 2021. We describe how to implement extensions on all parts of the FIDO2 stack: On the relying party (website), on the client (browser), and on the authenticator (hardware token).<br />
<br />
Found via <a href="https://positive.security/blog/find-you" rel="nofollow">https://positive.security/blog/find-you</a> and <a href="https://github.com/seemoo-lab/openhaystack" rel="nofollow">https://github.com/seemoo-lab/openhaystack</a><br>(<a href="https://roland.iwasno.net/links/?A5wSXA">Permalink</a>)Hard pass - diary at Telent Netowrkshttps://roland.iwasno.net/links/?vz0dcA2022-02-08T14:20:43+01:00A password manager. It's a lot like pass ("the standard unix password manager") - which I have been using up 'til now - but it uses age instead of GPG to do the heavy lifting. Written in Ruby<br>(<a href="https://roland.iwasno.net/links/?vz0dcA">Permalink</a>)Better Web Browsing - riseup.nethttps://roland.iwasno.net/links/?gxDJCg2022-01-31T11:09:19+01:00Recommendations for improving security/privacy-related settings of common Web browsers.<br>(<a href="https://roland.iwasno.net/links/?gxDJCg">Permalink</a>)Trustworthy Systemshttps://roland.iwasno.net/links/?BuBJcQ2022-01-19T17:11:13+01:00We use rigorous formal methods to develop trustworthy software systems—systems that come with provable security, safety and reliability guarantees.<br>(<a href="https://roland.iwasno.net/links/?BuBJcQ">Permalink</a>)Anti-malware Web browser extension to mitigate potential threats from JavaScripthttps://roland.iwasno.net/links/?b30qcA2022-01-05T20:04:52+01:00Found on the FSF website <a href="https://www.fsf.org/news/fsf-announces-jshelter-browser-add-on-to-combat-threats-from-nonfree-javascript" rel="nofollow">https://www.fsf.org/news/fsf-announces-jshelter-browser-add-on-to-combat-threats-from-nonfree-javascript</a><br />
As of 2022-01-05, it can be installed on Firefox, Chrome and Opera.<br>(<a href="https://roland.iwasno.net/links/?b30qcA">Permalink</a>)IP/DNS Detect - What is your IP, what is your DNS, what informations you send to websites.https://roland.iwasno.net/links/?v509Aw2021-10-15T11:48:33+02:00From <a href="https://www.schneier.com/blog/archives/2021/09/check-what-information-your-browser-leaks.html" rel="nofollow">https://www.schneier.com/blog/archives/2021/09/check-what-information-your-browser-leaks.html</a><br />
<a href="https://dnsleaktest.com/" rel="nofollow">https://dnsleaktest.com/</a> offers a similar service.<br>(<a href="https://roland.iwasno.net/links/?v509Aw">Permalink</a>)Viral Attacks On UNIX System Securityhttps://roland.iwasno.net/links/?BcZfjg2021-10-14T21:29:40+02:00Article from Tom Duff, August 1987<br />
Executable files in the Ninth Edition of the UNIX system contain small amounts of unused space, allowing small code sequences to be added to them without noticeably affecting their functionality. A program fragment that looks for binaries and introduces copies of itself into their slack space will transitively spread like a virus. Such a virus program could, like the Trojan Horse, harbor Greeks set to attack the system when run by sufficiently privileged users or from infected set-userid programs.<br>(<a href="https://roland.iwasno.net/links/?BcZfjg">Permalink</a>)A few comments on ‘age’ – Neil Maddenhttps://roland.iwasno.net/links/?DWifxw2021-10-12T18:09:43+02:00Critical review of some of the design choices made in the cryptographic tool 'age'.<br />
There are other interesting articles, such as the three-part series<br />
<a href="https://neilmadden.blog/2018/11/14/public-key-authenticated-encryption-and-why-you-want-it-part-i/" rel="nofollow">https://neilmadden.blog/2018/11/14/public-key-authenticated-encryption-and-why-you-want-it-part-i/</a><br />
<a href="https://neilmadden.blog/2018/11/26/public-key-authenticated-encryption-and-why-you-want-it-part-ii/" rel="nofollow">https://neilmadden.blog/2018/11/26/public-key-authenticated-encryption-and-why-you-want-it-part-ii/</a><br />
<a href="https://neilmadden.blog/2018/12/14/public-key-authenticated-encryption-and-why-you-want-it-part-iii/" rel="nofollow">https://neilmadden.blog/2018/12/14/public-key-authenticated-encryption-and-why-you-want-it-part-iii/</a><br />
and<br />
<a href="https://neilmadden.blog/2016/09/13/critical-thinking-for-software-engineers" rel="nofollow">https://neilmadden.blog/2016/09/13/critical-thinking-for-software-engineers</a><br>(<a href="https://roland.iwasno.net/links/?DWifxw">Permalink</a>)Disroot | Disroothttps://roland.iwasno.net/links/?FqwmfA2021-09-27T13:42:38+02:00Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization.<br />
Found on <a href="https://idiomdrottning.org/matrix-vapor" rel="nofollow">https://idiomdrottning.org/matrix-vapor</a><br>(<a href="https://roland.iwasno.net/links/?FqwmfA">Permalink</a>)Titan Security Key | Google Cloudhttps://roland.iwasno.net/links/?EP6ECw2021-09-21T14:36:07+02:00Phishing-resistant two-factor authentication (2FA) devices that help protect high-value users<br />
Works with popular devices, browsers, and a growing set of apps that support FIDO standards<br />
Built with a hardware chip (with firmware engineered by Google) to verify integrity of the key<br />
Sold on <a href="https://store.google.com/product/titan_security_key?hl=de" rel="nofollow">https://store.google.com/product/titan_security_key?hl=de</a> for €35<br>(<a href="https://roland.iwasno.net/links/?EP6ECw">Permalink</a>)SHA-1 is a Shambleshttps://roland.iwasno.net/links/?FSkm0w2021-09-13T11:47:05+02:00Chosen-prefix collisions for SHA-1. Note that this can affect GPG 1.4.<br />
Found via <a href="https://fossil-scm.org/home/doc/trunk/www/fossil-v-git.wiki" rel="nofollow">https://fossil-scm.org/home/doc/trunk/www/fossil-v-git.wiki</a><br>(<a href="https://roland.iwasno.net/links/?FSkm0w">Permalink</a>)Reviews of Antivirus-Softwarehttps://roland.iwasno.net/links/?13WmGw2021-08-17T09:19:15+02:00(<a href="https://roland.iwasno.net/links/?13WmGw">Permalink</a>)Running firefox a bit more safely - HOWTOhttps://roland.iwasno.net/links/?laiaoQ2021-06-04T01:20:44+02:00Instructions for running Firefox as another, less privileged user. Found on <a href="https://minnie.tuhs.org/pipermail/tuhs/2017-March/010757.html" rel="nofollow">https://minnie.tuhs.org/pipermail/tuhs/2017-March/010757.html</a><br />
In the following post, <a href="https://www.qubes-os.org/intro/" rel="nofollow">https://www.qubes-os.org/intro/</a> was recommended as an improved way.<br>(<a href="https://roland.iwasno.net/links/?laiaoQ">Permalink</a>)saltpack - a modern crypto messaging formathttps://roland.iwasno.net/links/?1R8y2w2021-06-01T22:14:50+02:00Need to encode, transmit, or store encrypted or signed data? saltpack is a streamlined, modern solution, designed with simplicity in mind. It is easy to implement & integrate. We've made few crypto decisions and instead leave almost all of the heavy lifting to the NaCl library.<br />
<br />
saltpack is a binary message format, encoded using the MessagePack format. Messages are broken up into reasonable (1MB) chunks, over which regular NaCl operations are performed. We have taken pains to address many of the shortcomings of current message formats: (1) only authenticated data is output; (2) repudiable authentication is used wherever possible; (3) chunks cannot be reordered or combined with other transmissions; (4) the public keys of senders and recipients can be hidden; and (5) message truncation is detectable.<br />
<br />
Implementations in Go and Python are available at <a href="https://saltpack.org/implementations" rel="nofollow">https://saltpack.org/implementations</a> The format is used by <a href="https://keybase.io/" rel="nofollow">https://keybase.io/</a><br>(<a href="https://roland.iwasno.net/links/?1R8y2w">Permalink</a>)Clean Your System and Free Disk Space | BleachBithttps://roland.iwasno.net/links/?ANM78A2021-05-28T16:55:08+02:00Found on <a href="https://ssd.eff.org/en/module/how-delete-your-data-securely-linux" rel="nofollow">https://ssd.eff.org/en/module/how-delete-your-data-securely-linux</a><br>(<a href="https://roland.iwasno.net/links/?ANM78A">Permalink</a>)https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=917935https://roland.iwasno.net/links/?3XuvQQ2021-05-21T15:03:49+02:00ITL BULLETIN FOR FEBRUARY 2015<br />
NIST SPECIAL PUBLICATION 800-88 REVISION 1,<br />
GUIDELINES FOR MEDIA SANITIZATION<br />
<a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf" rel="nofollow">http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf</a><br>(<a href="https://roland.iwasno.net/links/?3XuvQQ">Permalink</a>)How often should I rotate my ssh keys? · Tailscalehttps://roland.iwasno.net/links/?y_CXkQ2021-05-11T11:02:54+02:00Interesting story about stolen ssh private keys. I should start to change my private keys, because those registered with GitLab will expire soon.<br>(<a href="https://roland.iwasno.net/links/?y_CXkQ">Permalink</a>)Bitmessage Wikihttps://roland.iwasno.net/links/?m3uvIQ2021-05-04T15:05:10+02:00Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide "non-content" data, like the sender and receiver of messages, from passive eavesdroppers like those running warrantless wiretapping programs. If Bitmessage is completely new to you, you may wish to start by reading the whitepaper <a href="https://bitmessage.org/bitmessage.pdf" rel="nofollow">https://bitmessage.org/bitmessage.pdf</a><br />
<br />
Not sure how up to date it is, version 0.6.1 is dated 2016-08-21, the latest one 0.6.3.2 was released 2018-02-14 <br />
<a href="https://github.com/Bitmessage/PyBitmessage/releases/" rel="nofollow">https://github.com/Bitmessage/PyBitmessage/releases/</a><br />
<br />
According to <a href="https://www.reddit.com/r/bitmessage/comments/cjxk9s/current_status_of_pybitmessage/" rel="nofollow">https://www.reddit.com/r/bitmessage/comments/cjxk9s/current_status_of_pybitmessage/</a> (2019-07-30) development is on-going.<br />
This can also be seen on github, e.g. <a href="https://github.com/Bitmessage/PyBitmessage/issues/1712#issuecomment-830636842" rel="nofollow">https://github.com/Bitmessage/PyBitmessage/issues/1712#issuecomment-830636842</a><br />
One of the difficulties seems to be the transition from Python2 to Python3.<br />
<br />
Uses proof-of-work.<br />
<br />
Found on <a href="https://karl-voit.at/2014/04/10/bitmessage/" rel="nofollow">https://karl-voit.at/2014/04/10/bitmessage/</a><br>(<a href="https://roland.iwasno.net/links/?m3uvIQ">Permalink</a>)Automatic Security Updates on Ubuntuhttps://roland.iwasno.net/links/?pA7HQA2021-03-03T09:09:43+01:00Simple tutorial that will teach you to configure your system to automatically install security updates.<br>(<a href="https://roland.iwasno.net/links/?pA7HQA">Permalink</a>)cppcryptfs is an encrypted overlay filesystemhttps://roland.iwasno.net/links/?4gTOcA2021-02-12T00:12:57+01:00cppcryptfs is based on the design of gocryptfs, an encrypted overlay filesystem written in Go.<br />
<br />
cppcryptfs is an implementation of the gocryptfs filesystem in C++ for Windows. cppcryptfs is compatible with gocryptfs. Filesystems created with one can generally be mounted (and synced) with the other.<br />
<br />
Found on <a href="https://infosec-handbook.eu/recommendations/" rel="nofollow">https://infosec-handbook.eu/recommendations/</a> via <a href="https://nuetzlich.net/gocryptfs/" rel="nofollow">https://nuetzlich.net/gocryptfs/</a><br>(<a href="https://roland.iwasno.net/links/?4gTOcA">Permalink</a>)Modern credential management: security tokens, password managers, and a simple spreadsheethttps://roland.iwasno.net/links/?LurhHA2021-02-11T23:57:52+01:00Useful tips for password/credential management.<br>(<a href="https://roland.iwasno.net/links/?LurhHA">Permalink</a>)moz://a *privacy not includedhttps://roland.iwasno.net/links/?PlOf-w2021-01-10T23:31:48+01:00Fourth edition of Mozilla’s *Privacy Not Included buyer’s guide. Our goal is to help you shop smart—and safe—for products that connect to the internet.<br>(<a href="https://roland.iwasno.net/links/?PlOf-w">Permalink</a>)Aaron Toponcehttps://roland.iwasno.net/links/?DwL59Q2020-12-18T23:02:20+01:00Blog about cryptography, hash functions and more<br>(<a href="https://roland.iwasno.net/links/?DwL59Q">Permalink</a>)Michael Orlitzky { Let's not Encrypt }https://roland.iwasno.net/links/?lqId8A2020-12-04T16:40:10+01:00Interesting argument against the current state of HTTPS certification.<br />
See also his other articles, e.g. <a href="http://michael.orlitzky.com/articles/makeing_latex.xhtml" rel="nofollow">http://michael.orlitzky.com/articles/makeing_latex.xhtml</a><br>(<a href="https://roland.iwasno.net/links/?lqId8A">Permalink</a>)Using a Yubikey as a touchless, magic unlock key for Linuxhttps://roland.iwasno.net/links/?KSjJDQ2020-08-19T14:54:53+02:00Found on Tony Finch's link log <a href="https://dotat.at/" rel="nofollow">https://dotat.at/</a>:/<br />
The pamtester program used there might be useful to learn more about pam.<br>(<a href="https://roland.iwasno.net/links/?KSjJDQ">Permalink</a>)Emacs, GnuPG and Pass | jherrlinhttps://roland.iwasno.net/links/?QkdJhg2020-07-15T10:17:36+02:00Blog article about configuring and using the GNU privacy guard gpg, the password manager pass and Emacs, found via Sacha Chua's blog.<br>(<a href="https://roland.iwasno.net/links/?QkdJhg">Permalink</a>)Blog articles from José Antonio Ortega Ruizhttps://roland.iwasno.net/links/?QyWr4g2020-07-10T14:45:27+02:00Interesting blog written in org-mode, using <a href="https://github.com/bastibe/org-static-blog" rel="nofollow">https://github.com/bastibe/org-static-blog</a>, written by Bastian Bechtold <a href="https://bastibe.de/" rel="nofollow">https://bastibe.de/</a><br />
Some highlights: <br />
<a href="https://jao.io/blog/2020-02-26-literate-programming.html" rel="nofollow">https://jao.io/blog/2020-02-26-literate-programming.html</a> literate programming<br />
<a href="https://jao.io/blog/2020-02-23-signel.html" rel="nofollow">https://jao.io/blog/2020-02-23-signel.html</a>, a barebones signal chat on top of signal-cli, written in literate style<br />
<a href="https://jao.io/blog/2006-03-17-programmers-go-bananas.html" rel="nofollow">https://jao.io/blog/2006-03-17-programmers-go-bananas.html</a> category theory<br />
<a href="https://jao.io/blog/2020-05-01-dancers-at-the-end-of-time.html" rel="nofollow">https://jao.io/blog/2020-05-01-dancers-at-the-end-of-time.html</a> sounds like an interesting book.<br />
<a href="https://jao.io/blog/2006-07-06-geometrically-speaking.html" rel="nofollow">https://jao.io/blog/2006-07-06-geometrically-speaking.html</a> geometric proofs, Kindergarten Quantum Mechanics<br />
<a href="https://jao.io/blog/2020-05-04-observatory.html" rel="nofollow">https://jao.io/blog/2020-05-04-observatory.html</a> Mozilla Observatory to check a website's security<br />
<a href="https://jao.io/blog/2022-06-19-simple-note-taking.html" rel="nofollow">https://jao.io/blog/2022-06-19-simple-note-taking.html</a> simple note taking<br>(<a href="https://roland.iwasno.net/links/?QyWr4g">Permalink</a>)Magic-Wormhole: Get Things From One Computer To Another, Safely — Magic-Wormhole 0.12.0+3.g95a628e.dirty documentationhttps://roland.iwasno.net/links/?p552-A2020-05-27T18:43:39+02:00This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical “wormhole codes”: in general, the sending machine generates and displays the code, which must then be typed into the receiving machine.<br />
<br />
The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to be memorized.<br>(<a href="https://roland.iwasno.net/links/?p552-A">Permalink</a>)The first open-source FIDO2 security keyhttps://roland.iwasno.net/links/?2StZng2020-05-24T23:29:20+02:00Open-source hard- and software for two-factor authentication.<br />
I need to test them and want to understand the differences between versions 1 and 2. The articles<br />
<a href="https://solokeys.com/blogs/news/trussed-announcement" rel="nofollow">https://solokeys.com/blogs/news/trussed-announcement</a> and<br />
<a href="https://github.com/trussed-dev/trussed-totp-pc-tutorial" rel="nofollow">https://github.com/trussed-dev/trussed-totp-pc-tutorial</a> look interesting.<br>(<a href="https://roland.iwasno.net/links/?2StZng">Permalink</a>)Solid - "social linked data"https://roland.iwasno.net/links/?lYsewg2020-03-15T19:03:18+01:00Solid (<a href="https://solid.mit.edu/" rel="nofollow">https://solid.mit.edu/</a>) was created by the inventor of the World Wide Web, Sir Tim Berners-Lee. Its mission is to reshape the web as we know it. Solid will foster a new breed of applications with capabilities above and beyond anything that exists today.<br />
<br />
Solid (derived from "social linked data") is a proposed set of conventions and tools for building decentralized social applications based on Linked Data principles. Solid is modular and extensible and it relies as much as possible on existing W3C standards and protocols.<br />
<br />
<a href="https://solid.inrupt.com/how-it-works" rel="nofollow">https://solid.inrupt.com/how-it-works</a><br />
Within the Solid ecosystem, you decide where you store your data. Photos you take, comments you write, contacts in your address book, calendar events, how many miles you run each day from your fitness tracker… they’re all stored in your Solid POD. This Solid POD can be in your house or workplace, or with an online Solid POD provider of your choice. Since you own your data, you’re free to move it at any time, without interruption of service.<br>(<a href="https://roland.iwasno.net/links/?lYsewg">Permalink</a>)Open Source Password Management Solutions | Bitwardenhttps://roland.iwasno.net/links/?_JiX-Q2019-11-29T15:14:09+01:00Yet another password manager.<br>(<a href="https://roland.iwasno.net/links/?_JiX-Q">Permalink</a>)Top 20 OpenSSH Server Best Security Practiceshttps://roland.iwasno.net/links/?LbQMSw2019-10-04T22:05:07+02:00(<a href="https://roland.iwasno.net/links/?LbQMSw">Permalink</a>)