Shaare your links...
2353 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 2 / 9
Newer►
177 results for tags security x
  • Hardware-based SSH/GPG agent
    This project allows you to use various hardware security devices to operate GPG and SSH. Instead of keeping your key on your computer and decrypting it with a passphrase when you want to use it, the key is generated and stored on the device and never reaches your computer. Read more about the design on https://github.com/romanz/trezor-agent/blob/master/doc/DESIGN.md

    Currently TREZOR One, TREZOR Model T, Keepkey, Ledger Nano S, and OnlyKey are supported.
    Sat Sep 24 14:37:05 2022 - permalink -
    - https://github.com/romanz/trezor-agent
    FOSS GPL hardware security software
  • roughtime - Git at Google
    Roughtime is a protocol that aims to achieve rough time synchronisation in a secure way that doesn't depend on any particular time server, and in such a way that, if a time server does misbehave, clients end up with cryptographic proof of it.

    “Rough” time synchronisation means that, at this stage, we would be happy with time synchronisation to within 10 seconds of the correct time. If you have serious time synchronisation needs you‘ll want the machinery in NTP or even PTP (which needs hardware support to do right). There’s no reason why Roughtime shouldn‘t be (almost) as precise as NTP, but the use cases that we have in mind for now don’t need much precision. For example, about 25% of certificate errors shown by Chrome appear to be caused by bad local clocks and we don't need much precision to fix that.

    Found via Cillian O'Driscoll's fork https://github.com/odrisci/roughtime
    See also https://github.com/oreparaz/vroughtime for a simple client written in C.
    Thu Sep 8 17:46:49 2022 - permalink -
    - https://roughtime.googlesource.com/roughtime
    Apache FOSS Go security software time
  • GNU Privacy Guard is very powerful software with a terrible interface.
    This document attempts to give you the tools needed to answer questions and explain the mysteries of gpg and PGP so that you too can take advantage of this tool and stop making excuses.
    Found on https://rgoulter.com/blog/posts/programming/2022-06-10-a-visual-explanation-of-gpg-subkeys.html
    See also https://github.com/dmshaw/paperkey and https://github.com/jonathancross/jc-docs
    Fri Jul 1 11:31:54 2022 - permalink -
    - https://gpg.wtf/
    cryptography GNU gpg reading security TODO
  • A Visual Explanation of GPG Subkeys - Richard Goulter's Blog
    Found via https://rgoulter.com/blog/posts/programming/2020-08-22-early-impressions-of-bm40rgb-ortholinear-keyboard.html
    See also
    https://rgoulter.com/blog/posts/programming/2022-02-20-using-home-manager-to-manage-symlinks-to-dotfiles.html
    https://rgoulter.com/blog/posts/programming/2014-04-26-online-resources-for-git.html
    and probably more.
    Mon Jun 27 11:17:05 2022 - permalink -
    - https://rgoulter.com/blog/posts/programming/2022-06-10-a-visual-explanation-of-gpg-subkeys.html
    blog cryptography gpg security
  • EFF's New Wordlists for Random Passphrases | Electronic Frontier Foundation
    Improved word lists for dice-generated passphrases, found via https://michael.kjorling.se/password-tips/
    Thu Jun 9 13:55:16 2022 - permalink -
    - https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases
    security TODO tool
  • Qubes OS: A reasonably secure operating system | Qubes OS
    Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes.
    Mon May 9 08:17:57 2022 - permalink -
    - https://www.qubes-os.org/
    operating-system security
  • Encrypting sensitive and personal data
    Available for Linux, OS X and Windows. More details can be found on https://www.primx.eu/en/encryption-software/zed-en/
    ALGORITHMS: AES (128 to 256 bits) and RSA (1024 to 4096 bits).
    TECHNOLOGIES: PKCS#1, PKCS#5, PKCS#11, X509, Microsoft CSP, LDAP technologies, PKIx compatible.
     PKCS#1 RSA Cryptography Standard https://en.wikipedia.org/wiki/PKCS_1
     PKCS#5 Password-based Encryption Standard https://en.wikipedia.org/wiki/PBKDF2
     PKCS#11 Cryptographic Token Interface https://en.wikipedia.org/wiki/PKCS_11
     X509 https://en.wikipedia.org/wiki/X.509 (ITU) standard defining the format of public key certificates.
     Does CSP stand for https://en.wikipedia.org/wiki/Credential_service_provider , Cloud service provide https://mymatetech.net/what-is-microsoft-csp-ab5b80519e79 or something else?
     LDAP https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol
     Does PKIx stand for https://en.wikipedia.org/wiki/X.509#PKIX_Working_Group ?

    SYSTEMS: Available for Windows 11 to Windows 7, Linux (various distributions) and Mac OS.
    LANGUAGES: Available in 7 languages.
    ZED! mobile app for iOS and Android.
    Wed Apr 6 17:01:32 2022 - permalink -
    - https://www.zedencrypt.com/
    cryptography security TODO
  • GitHub - seemoo-lab/fido2ext: Bring Your Own FIDO2 Extensions!
    This repository documents how to implement custom FIDO2 extensions. It contains supplementary material to our paper at ETAA 2021. We describe how to implement extensions on all parts of the FIDO2 stack: On the relying party (website), on the client (browser), and on the authenticator (hardware token).

    Found via https://positive.security/blog/find-you and https://github.com/seemoo-lab/openhaystack
    Tue Mar 15 13:40:16 2022 - permalink -
    - https://github.com/seemoo-lab/fido2ext
    cryptography FIDO security software
  • Hard pass - diary at Telent Netowrks
    A password manager. It's a lot like pass ("the standard unix password manager") - which I have been using up 'til now - but it uses age instead of GPG to do the heavy lifting. Written in Ruby
    Tue Feb 8 14:20:43 2022 - permalink -
    - https://ww.telent.net/2021/8/14/hard_pass
    blog Ruby security software
  • Better Web Browsing - riseup.net
    Recommendations for improving security/privacy-related settings of common Web browsers.
    Mon Jan 31 11:09:19 2022 - permalink -
    - https://riseup.net/en/security/network-security/better-web-browsing
    security TODO web
  • Trustworthy Systems
    We use rigorous formal methods to develop trustworthy software systems—systems that come with provable security, safety and reliability guarantees.
    Wed Jan 19 17:11:13 2022 - permalink -
    - https://trustworthy.systems/about/
    computer L4 microkernel operating-system security
  • Anti-malware Web browser extension to mitigate potential threats from JavaScript
    Found on the FSF website https://www.fsf.org/news/fsf-announces-jshelter-browser-add-on-to-combat-threats-from-nonfree-javascript
    As of 2022-01-05, it can be installed on Firefox, Chrome and Opera.
    Wed Jan 5 20:04:52 2022 - permalink -
    - https://jshelter.org/
    browser JavaScript security
  • IP/DNS Detect - What is your IP, what is your DNS, what informations you send to websites.
    From https://www.schneier.com/blog/archives/2021/09/check-what-information-your-browser-leaks.html
    https://dnsleaktest.com/ offers a similar service.
    Fri Oct 15 11:48:33 2021 - permalink -
    - https://ipleak.net/
    browser DNS privacy security
  • Viral Attacks On UNIX System Security
    Article from Tom Duff, August 1987
    Executable files in the Ninth Edition of the UNIX system contain small amounts of unused space, allowing small code sequences to be added to them without noticeably affecting their functionality. A program fragment that looks for binaries and introduces copies of itself into their slack space will transitively spread like a virus. Such a virus program could, like the Trojan Horse, harbor Greeks set to attack the system when run by sufficiently privileged users or from infected set-userid programs.
    Thu Oct 14 21:29:40 2021 - permalink -
    - https://cryptohub.nl/zines/vxheavens/lib/-show_abstract=vtd01.htm
    computer history security Unix
  • A few comments on ‘age’ – Neil Madden
    Critical review of some of the design choices made in the cryptographic tool 'age'.
    There are other interesting articles, such as the three-part series
    https://neilmadden.blog/2018/11/14/public-key-authenticated-encryption-and-why-you-want-it-part-i/
    https://neilmadden.blog/2018/11/26/public-key-authenticated-encryption-and-why-you-want-it-part-ii/
    https://neilmadden.blog/2018/12/14/public-key-authenticated-encryption-and-why-you-want-it-part-iii/
    and
    https://neilmadden.blog/2016/09/13/critical-thinking-for-software-engineers
    Tue Oct 12 18:09:43 2021 - permalink -
    - https://neilmadden.blog/2019/12/30/a-few-comments-on-age/
    blog cryptography reading security TODO
  • Disroot | Disroot
    Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization.
    Found on https://idiomdrottning.org/matrix-vapor
    Mon Sep 27 13:42:38 2021 - permalink -
    - https://disroot.org/en
    privacy security TODO
  • Titan Security Key  |  Google Cloud
    Phishing-resistant two-factor authentication (2FA) devices that help protect high-value users
    Works with popular devices, browsers, and a growing set of apps that support FIDO standards
    Built with a hardware chip (with firmware engineered by Google) to verify integrity of the key
    Sold on https://store.google.com/product/titan_security_key?hl=de for €35
    Tue Sep 21 14:36:07 2021 - permalink -
    - https://cloud.google.com/titan-security-key/
    FIDO hardware security
  • SHA-1 is a Shambles
    Chosen-prefix collisions for SHA-1. Note that this can affect GPG 1.4.
    Found via https://fossil-scm.org/home/doc/trunk/www/fossil-v-git.wiki
    Mon Sep 13 11:47:05 2021 - permalink -
    - https://sha-mbles.github.io/
    cryptography gpg security SHA
  • Reviews of Antivirus-Software
    Tue Aug 17 09:19:15 2021 - permalink -
    - https://de.bestantiviruspro.org
    computer german security
  • Running firefox a bit more safely - HOWTO
    Instructions for running Firefox as another, less privileged user. Found on https://www.tuhs.org/pipermail/tuhs/2017-March/010757.html
    In the following post, https://www.qubes-os.org/intro/ was recommended as an improved way.
    Fri Jun 4 01:20:44 2021 - permalink -
    - https://lists.dragonflybsd.org/pipermail/users/2015-August/291195.html
    security software TODO TUHS web
Links per page: 20 50 100
◄Older
page 2 / 9
Newer►
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.