• Apr 24, 2019
  • Derek Zimmer
  • Governments, Open Source, Security,

Huawei Could Rebuild Trust in Their Products Through Open Source

Chinese Megacorp Huawei has been in the news over the last few months because companies and entire nations have been banning their equipment over spying concerns. There has been little public evidence of such spying taking place on a large scale, but the action of multiple countries within the fourteen eyes surveillance alliance suggests that … Continue reading “Huawei Could Rebuild Trust in Their Products Through Open Source”

0

Google’s Infinite Reach – How Google Builds a Profile on Everyone

There’s a lot of talk about the invasive practices of FaceBook right now, but somehow Google has skated by largely unfazed by the public outcry against privacy violations and the snowballing impact of too much personal information being out there with ambiguous consent from the parties being snooped on. Through the lens of privacy activism, … Continue reading “Google’s Infinite Reach – How Google Builds a Profile on Everyone”

0

  • Mar 20, 2019
  • Derek Zimmer
  • Privacy, Security, Tutorials,

Preparing for Travel – Properly Backing Up Your Android Cell Phone

When I prepare for travel, I take some steps to make sure that my protected data will not be read or otherwise mishandled by customs. I then follow-up with rigorous steps to ensure that my information and devices maintain their integrity and that I can trust them with the same degree that I did before … Continue reading “Preparing for Travel – Properly Backing Up Your Android Cell Phone”

0

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

With a constant stream of news of big organizations that have neglected their security, we often forget that the most vulnerable organizations are the small and medium businesses that don’t have the resources to build elaborate security teams. These businesses can have a single iPad, phone or dated register protecting their critical customer data. They … Continue reading “Identity and Card Theft – Shielding Yourself from the Unsafe Small Business”

0

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

We have been talking about the National Institute of Standards and Technologies’ contest to find the most attractive new algorithms for quantum resistance. (Part 1) (Part 2) (Part 3) In this final part, we talk about the candidates for a new standard Digital Signature Algorithm. (DSA) The core component of a secure digital signature lies … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms”

0

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

In the first article of this series, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)”

0

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the algorithms against one … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)”

0

  • Jan 9, 2019
  • Derek Zimmer
  • Net Neutrality, News, Open Source, Privacy, Security,

OpenVPN 2.5.0 – What is Coming to OpenVPN in 2019

OpenVPN is the old guard of the VPN world. It is powerful, stable, and it has a large and enthusiastic dev community backed by multiple commercial interests. A new dot release is scheduled to be released this year, with many new features that aim to make OpenVPN easier to use and resist censorship. Here is … Continue reading “OpenVPN 2.5.0 – What is Coming to OpenVPN in 2019”

0

  • Dec 5, 2018
  • Ashley Perna
  • General Privacy and Security, Online Activity, Tutorials,

How to Set a Strong Passcode on Your Mobile Device

Without a strong passcode, everything on your mobile device is accessible by anyone. That includes thieves, random co-workers, and local law enforcement officers and the FBI. Even if you only keep your mobile device secure in your pocket or at home, imagine the damage your child could do once they access your Amazon account. Adding … Continue reading “How to Set a Strong Passcode on Your Mobile Device”

0

  • Dec 2, 2018
  • Sean Doyle
  • General Privacy and Security, Tutorials,

What is Adware?

Adware is software that displays advertisements, directs your browser to advertising websites, and collects information about your browsing habits so that advertisements can be shown to you based from your online activity. Advertisements displayed by adware are typically produced within an Internet Browser window; However, they can also be displayed in the user interface of … Continue reading “What is Adware?”

0