Shaare your links...
2371 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 5 / 9
Newer►
177 results for tags security x
  • entropy - What is your way to create good passwords that can actually be remembered? - Information Security Stack Exchange
    Discussion about secure, but memorable passwords.
    Sun Nov 6 23:45:13 2016 - permalink -
    - http://security.stackexchange.com/questions/662/what-is-your-way-to-create-good-passwords-that-can-actually-be-remembered
    security
  • Copay – Secure, Shared Bitcoin Wallet
    Open source (MIT licensed), available for iOS, Android, Windows, OS X and Linux.
    Sun Nov 6 23:28:28 2016 - permalink -
    - https://copay.io/
    bitcoin cryptography MIT security software
  • Bitcoin Wiki
    Sun Nov 6 23:25:05 2016 - permalink -
    - https://en.bitcoin.it/wiki/Main_Page
    bitcoin cryptography security wiki
  • GRC | Off The Grid    
    A paper-based system for encrypting domain names into secure passwords.
    Sun Nov 6 23:22:20 2016 - permalink -
    - https://www.grc.com/offthegrid.htm
    hack security
  • Minisign by Frank Denis
    Minisign is a dead simple tool to sign files and verify signatures.

    It is portable, lightweight, and uses the highly secure Ed25519 public-key signature system.
    Fri Oct 14 16:43:23 2016 - permalink -
    - https://jedisct1.github.io/minisign/
    cryptography security software
  • Computer Laboratory: Capsicum: practical capabilities for UNIX
    Capsicum is a lightweight OS capability and sandbox framework developed at the University of Cambridge Computer Laboratory, supported by grants from Google, the the FreeBSD Foundation, and DARPA. Capsicum extends the POSIX API, providing several new OS primitives to support object-capability security on UNIX-like operating systems:

       capabilities - refined file descriptors with fine-grained rights
       capability mode - process sandboxes that deny access to global namespaces
       process descriptors - capability-centric process ID replacement
       anonymous shared memory objects - an extension to the POSIX shared memory API to support anonymous swap objects associated with file descriptors (capabilities)
       rtld-elf-cap - modified ELF run-time linker to construct sandboxed applications
       libcapsicum - library to create and use capabilities and sandboxed components
       libuserangel - library allowing sandboxed applications or components to interact with user angels, such as Power Boxes.
       chromium-capsicum - a version of Google's Chromium web browser that uses capability mode and capabilities to provide effective sandboxing of high-risk web page rendering.
    Thu Sep 1 17:23:54 2016 - permalink -
    - http://www.cl.cam.ac.uk/research/security/capsicum/
    BSD Linux security Unix
  • Webseite von Hanno Böck
    Found via http://www.metzdowd.com/pipermail/cryptography/2015-December/027444.html.
    Tue Aug 30 19:29:44 2016 - permalink -
    - https://hboeck.de/
    blog cryptography german security
  • VeraCrypt - Home
    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and that is based on TrueCrypt 7.1a.
    Windows / MacOSX / Linux / Source
    Thu Aug 4 15:50:32 2016 - permalink -
    - https://veracrypt.codeplex.com/
    cryptography FOSS security software
  • TCnext - Site dedicated to the development of the next "truecrypt"
    TrueCrypt will not die

    TrueCrypt.ch is the gathering place for all up-to-date information.  Unfortunately TrueCrypt.org is dead. But, we (the pure-privacy people) will help organize a future.
    Thu Aug 4 15:48:17 2016 - permalink -
    - https://truecrypt.ch/
    cryptography FOSS security software
  • cryptsetup / cryptsetup · GitLab
    Cryptsetup is utility used to conveniently setup disk encryption based on DMCrypt kernel module.

    These include plain dm-crypt volumes, LUKS volumes, loop-AES and TrueCrypt (including VeraCrypt extension) format.

    Project also includes veritysetup utility used to conveniently setup DMVerity block integrity checking kernel module.
    Thu Aug 4 15:12:42 2016 - permalink -
    - https://gitlab.com/cryptsetup/cryptsetup
    cryptography Linux security
  • SECURE SHARE
    Think of Facebook, Whatsapp, Gmail and Skype rolled into one, without the centralized surveillance and control. secushare employs GNUnet for end-to-end encryption and anonymizing mesh routing (because it has a more suitable architecture than Tor or I2P) and applies PSYC on top (because it performs better than XMPP, JSON or OStatus) to create a distributed social graph.
    Tue Jul 19 01:17:48 2016 - permalink -
    - http://secushare.org/
    cryptography security TODO
  • TAxable electronic Libre Electronic Reserve - Electronic payments for a liberal society!
    Taler is a new electronic payment system under development at Inria. Today, this website only presents the advantages our system is expected to provide. We expect to make the payment system available to the general public in 2016.
    Fri Jul 8 16:55:36 2016 - permalink -
    - https://taler.net/
    cryptography GNU security software
  • Home - CONIKS
    CONIKS is a key management system for end users capable of integration in end-to-end secure communication services. The main idea is that users should not have to worry about managing encryption keys when they want to communicate securely, but they also should not have to trust their secure communication service providers to act in their interest.
    Fri Apr 15 17:36:13 2016 - permalink -
    - https://coniks.cs.princeton.edu/
    cryptography security software
  • When coding style survives compilation: De-anonymizing programmers from executable binaries
    Coding style can survive compilation. Interesting study where programmers were de-anonymized with fairly high success rates from the binary code of their programs.
    Fri Apr 15 17:33:17 2016 - permalink -
    - https://freedom-to-tinker.com/blog/aylin/when-coding-style-survives-compilation-de-anonymizing-programmers-from-executable-binaries/
    security software
  • userv - user services client and daemon
    Put the security boundary where it ought to be.
    userv (pronounced you-serve) is a program which, according to the specification, is
     a Unix system facility to allow one program to invoke another when only limited trust exists between them.

    Found via the interesting "Experiences with Subversion" http://www.chiark.greenend.org.uk/~sgtatham/svn.html
    Tue Mar 8 00:23:23 2016 - permalink -
    - http://www.chiark.greenend.org.uk/~ian/userv/
    security software Unix
  • David A. Wheeler's Personal Home Page
    Papers & projects on developing secure software, free / libre / open source software (OSS/FLOSS), software innovation, & other interesting things...
    Mon Jan 18 15:49:32 2016 - permalink -
    - http://www.dwheeler.com/
    blog FOSS security
  • /dev/random - Random Thoughts On Programming In Parentheses - Pee - A password manager for the command line
    A simple password manager written in Chicken Scheme.

    Other articles on the blog are interesting as well, e.g. http://pestilenz.org/~ckeen/blog/posts/germany.html has an interesting plot.
    Wed Jan 13 17:05:14 2016 - permalink -
    - http://pestilenz.org/~ckeen/blog/posts/pee.html
    cryptography Scheme security
  • UBERWACH!
    Es werden Zugriffe der Bundes- und Landesministerien, sowie von Regierungs- und Oppositionsparteien auf teilnehmende Blogs, Foren und Webauftritte überwacht.
    Wed Jan 6 19:30:42 2016 - permalink -
    - http://www.uberwach.de/
    german politics security web
  • Pond - forward secure, asynchronous messaging
    So Pond is not email. Pond is forward secure, asynchronous messaging for the discerning. Pond messages are asynchronous, but are not a record; they expire automatically a week after they are received. Pond seeks to prevent leaking traffic information against everyone except a global passive attacker.
    Written in go.
    Tue Dec 15 13:07:01 2015 - permalink -
    - https://pond.imperialviolet.org/
    cryptography Go security software
  • Expertized in mobile security, virtualization and cloud services - TrustKernel Home
    Trusted execution environment for ARM-based computers, based on
    https://en.wikipedia.org/wiki/Xv6
    Wed Nov 18 14:39:24 2015 - permalink -
    - https://www.trustkernel.com/
    ARM security software Unix
Links per page: 20 50 100
◄Older
page 5 / 9
Newer►
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.