Shaare your links...
2431 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 7 / 10
Newer►
182 results for tags security x
  • Simtec Electronics Entropy Key: USB True Random Number Generator
    The Entropy Key is a small, unobtrusive and easily installed USB stick that generates high-quality random numbers, or entropy.
    The Entropy Key contains two high-quality noise generators, and an ARM Cortex CPU that actively measures, checks and confirms all generated random numbers, before encrypting them and sending them to the server. It also actively detects attempts to corrupt or sway the device. It aims towards FIPS-140-2 Level 3 compliance with some elements of Level 4, including tamper-evidence, tamper-proofing, role-based authentication, and environmental attacks. If it detects that one of its two generators has failed, may be about to fail, or if it detects a physical attack, it will automatically shut down.
    £36, but currently (Jan 2015) out of stock.
    Wed Jan 28 18:07:41 2015 - permalink -
    - http://www.entropykey.co.uk/
    hardware security
  • The Privacy Surgeon » Dissecting the issues that matter to you
    Blog of the privacy activist Simon Davies.
    Sun Jan 25 23:02:51 2015 - permalink -
    - http://www.privacysurgeon.org/blog/
    blog cryptography politics reading security
  • USB armory wiki
    The USB armory from Inverse Path is an open source hardware design, implementing a flash drive sized computer.
    Tue Jan 6 22:32:26 2015 - permalink -
    - https://github.com/inversepath/usbarmory/wiki
    FOSS hardware security
  • simple password manager
    Requires X11, gpg.
    Tue Jan 6 21:33:31 2015 - permalink -
    - https://github.com/stef/pwd.sh
    FOSS security
  • Shellshock
    Detailed description of the shellshock vulnerability and the lessions to be learned from it.
    Mon Nov 3 00:55:31 2014 - permalink -
    - http://www.dwheeler.com/essays/shellshock.html
    FOSS Linux security shell Unix
  • Why Google is Hurrying the Web to Kill SHA-1
    SHA-1 should no longer be used for TLS certificates.
    Wed Oct 15 12:50:11 2014 - permalink -
    - https://konklone.com/post/why-google-is-hurrying-the-web-to-kill-sha-1
    cryptography security TLS TODO
  • totp-me - TOTP for Java ME - Google authenticator
    Time-based one-time-password (TOTP, RFC6238) generator for Java mobile edition.
    Tue Sep 23 13:19:32 2014 - permalink -
    - http://totpme.sourceforge.net/index.html
    Java security
  • miniLock is a small, portable file encryption software.
    The idea behind its design is that passphrase memorized by the user, along with their email address, can act as a complete, portable basis for a persistent public key identity and provide a full substitute for other key pair models, such as having the key pair stored on disk media (the PGP approach).

    Found via http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html
    Mon Sep 15 14:33:41 2014 - permalink -
    - https://github.com/kaepora/miniLock/blob/master/README.md
    cryptography FOSS security
  • Not A Number - About Me
    Blog about Programming, Theory, and Math, written by John Meacham.
    Wed Aug 6 00:06:21 2014 - permalink -
    - http://notanumber.net/about
    blog electronics programming security
  • GRC's | TrueCrypt, the final release, archive  
    Background about the shutdown of the TrueCrypt project
    Mon Jul 14 21:56:09 2014 - permalink -
    - https://www.grc.com/misc/truecrypt/truecrypt.htm
    cryptography FOSS security
  • Is TrueCrypt Audited Yet?
    Information about the on-going audit of the TrueCrypt disk encryption software.
    Mon Jul 14 21:46:39 2014 - permalink -
    - http://istruecryptauditedyet.com/
    FOSS security
  • Successor of the encryption software TrueCrypt | Sirrix Aktiengesellschaft
    As a reaction to the announced end of the development of the encryption software TrueCrypt, Sirrix AG, Germany, plans to publish an open-source version of TrustedDisk as successor of TrueCrypt.
    Fri Jul 4 23:15:10 2014 - permalink -
    - http://www.sirrix.com/content/news/66230.htm
    cryptography FOSS security TODO
  • Capability-based security; how does it work? | Lambda the Ultimate
    Blog article about capability-based security. Includes a link to Jonathan Rees' W7 system http://www.cap-lore.com/CapTheory/Rees/Rees.html
    Tue Jul 1 14:37:40 2014 - permalink -
    - http://lambda-the-ultimate.org/node/3930
    operating-system Scheme security
  • Convergence | Beta
    Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to configure a dynamic set of Notaries which use network perspective to validate your communication.
    Fri May 9 01:42:39 2014 - permalink -
    - http://convergence.io/details.html
    security TLS TODO
  • GnuTLS manual (version3.2.13)
    Manual of the GnuTLS (transport layer security) library, which appears to provide a good overview of TLS/SSL.
    Tue Apr 15 13:49:33 2014 - permalink -
    - http://www.gnutls.org/manual/html_node/index.html
    GNU security software
  • Goteo.org Crowdfunding the commons
    New website and infrastructure for the GNU privacy guard, financed by crowdfunding.
    Tue Mar 4 00:33:53 2014 - permalink -
    - http://goteo.org/project/gnupg-new-website-and-infrastructure/updates
    FOSS GNU security
  • Dark Mail Alliance
    Our Mission:To bring the world our unique end-to-end encrypted protocol and architecture that is the 'next-generation' of private and secure email.
    Wed Nov 13 18:04:17 2013 - permalink -
    - http://www.darkmail.info/home.html
    cryptography e-mail security
  • myIDkey | The first voice-search, secure Bluetooth / USB drive that displays passwords and ID on the go
    USB drive with fingerprint authentication.
    Wed Oct 16 16:03:16 2013 - permalink -
    - http://myidkey.com/
    hardware security USB
  • Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora - PRISM Break
    Collection of software to make NSA's spying more difficult.
    Mon Oct 7 23:50:51 2013 - permalink -
    - https://www.prism-break.org/
    FOSS security software
  • A Complete Guide to Mastering Eshell | Mastering Emacs
    Interesting explanation of eshell, the Emacs shell. It claims that diff is "redirected to Emacs proper".
    See also https://www.masteringemacs.org/article/replacing-tmux-gnu-screen-emacs and
    https://www.masteringemacs.org/article/securely-generating-totp-tokens-emacs (bookmarked Tue Oct 25 16:08:47 2022)
    Wed Sep 18 13:56:00 2013 - permalink -
    - http://www.masteringemacs.org/articles/2010/12/13/complete-guide-mastering-eshell/
    blog cryptography emacs lisp reading security
Links per page: 20 50 100
◄Older
page 7 / 10
Newer►
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.