to recover the data: how to mount luks2 encrypted volume possibility: remove harddisk, attach to sata2usb adapter, then mount on different machine like this: # unlock encrypted harddisk udisksctl unlock -b /dev/sdb5 udisksctl mount -b /dev/mapper/ubuntu–vg-root Mounted /dev/dm-1 at /media/dpm/e8cf82c0-f0a3-41b3-ab28-1f9d23fcfa72 […]
All SmartPhones are spies! that’s why Merkel keeps the Nokia from 1995 (even if that device is spied on as well, because it can not end2end encrypt sms or phone calls (*FAIL*! X-D)) Putin does not have a mobile phone […]
The Age of Surveillance Capitalism: “be careful what you reveal to your friend” (the internet) https://irlpodcast.org/season4/episode5/ what if – instead of security – Google wants mass surveillance and a direct uplink to the US-Pentagon to blow all “terrorists” (basically anyone […]
guess with it-security and internet-security (internet = roads, cars = computers that users use every day) it is like with real-life-security – there is no 100% security. all users of a system are in constant potential danger of having an […]
Tor is easier to use than ever just get the tor bundle – it is tor bundled with firefox https://www.torproject.org/download/ Is Tor essentially an NSA honeypot? in other words: is the NSA running a lot of (modified to their tracking […]
probably THE most important film, that every school kid (of the age of 16) should have seen (highly recommend to cut out the violent scenes) 1984 mass surveillance: for a better world? as people might have noticed: privacy is survival […]
https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/ hm…. let me think where one has seen this before: TELEGRAM! Zoom’s service is “not suited for secrets” “The researchers also found that Zoom protects video and audio content using a home-grown encryption scheme, that there is a vulnerability […]
Videos: ssh thanks for sharing even when the audio is pretty crappy. slides (hard to read on video) can be found here: https://degabriele.info/slides/SSH_CCS_16.pdf “dropbear” is ambedded ssh server Made in Australia (wiki) also available as Android App naming: a “dropbear” […]
now WITH SPICY COMMENTS X-D SecurityLab, [22.12.19 12:40] A Twitter user using the alias 08Tc3wBB created tfp0-an exploit that allows you to jailbreak the latest iPhone models with IOS 13.3. The functionality of the exploit has already been confirmed by […]
Why is quantum computing important: optimization Update: Google claims to have reached quantum supremacy The tech giant unveiled its x-quantum computer chip Bristlecone in March 2018 (src: cnet) original nasa paper: https://drive.google.com/file/d/19lv8p1fB47z1pEZVlfDXhop082Lc-kdD/view book: https://deepai.org/machine-learning/researcher/eleanor-g-rieffel https://www.amazon.com/Quantum-Computing-Introduction-Engineering-Computation/dp/0262015064 Scott’s Supreme Quantum Supremacy FAQ! […]
looks awesome 🙂 update: how to root with Magisk and install a firewall (scroll down and behave – slave of the digital dictatorship!) “Pretty much everything you do on the phone is data-mined by Google. The mic is on listening […]
While “backdoors” in hardware sound like a good idea… you don’t know how hackers are using it to sabotage infrastructure or extort bitcoins of another country’s companies… see “backdoor in cisco router“. IT IS F**** DANGEROUS! ESPECIALLY if it is […]
Why: Do MAJOR news outlets NOT use SSL? Euronews is not able to use SSL? Out of compatibility reasons? (maybe platform not ready yet? lame!) Because the surveillance state works better without SSL? I guess. Same goes for: https://spiegel.de -> […]
Update: 2020.03 “The newly developed Rowhammer- attack TRRespass can crack the RAM-a security mechanism by many DDR4-DRAM-modules as well as LPDDR4 Chips. Until now, these were considered to be almost immune to Rowhammer attacks.” https://www.com-magazin.de/news/sicherheit/software-hammer-ram-schutz-attackiert-2515621.html Update: 2019.10 Zombieload is back. […]
LibreSignal is like Signal – the private WhatsApp and SMS service – but without using requirement for GooglePlay. So people with alterntive firmwares on their phones (CyanogenMod) can use it as well. Is it a fake alternative that started off […]
you should setup harddisk encryption during setup. to add an encrypted /home partition afterwards might be possible but a lot more effort. scroll very down if you want to know how to encrypt an usb sticks … needless to say […]
Warning! while gpg is very likely sound and solid encryption – what is far more likely to be compromised is YOUR HARDWARE – every network card – wifi card – usb UMTS G3 modem – PCI-Card – contains enough RAM […]
Veracrypt command line usage: manpage: veracrypt.man.txt # start interactive command line wizard veracrypt -t -c # to create a new encrypted volume or usb stick Volume type: 1) Normal 2) Hidden Select [1]: # dismount all volumes currently mounted /usr/bin/veracrypt […]
Veracrypt command line usage: manpage: veracrypt.man.txt # start interactive command line wizard veracrypt -t -c # to create a new encrypted volume or usb stick Volume type: 1) Normal 2) Hidden Select [1]: # dismount all volumes currently mounted /usr/bin/veracrypt […]
I don’t know if its fake or not. Since April 2016 or since WhatsApp Version 2.8.2-5222 (iPhone) Facebook-Whatsapp seems to have added encryption. A pretty brave move of the Facebook-Whatsapp guys… if this is for real. If this is for […]
This is a backup of: https://spin.atomicobject.com/2013/09/25/gpg-gnu-privacy-guard/ Getting Started with GNU Privacy Guard This is part of a series on GNU Privacy Guard: Getting Started with GNU Privacy Guard (this post) Generating More Secure GPG Keys: Rationale Generating More Secure GPG […]
Veracrypt command line usage: manpage: veracrypt.man.txt # start interactive command line wizard veracrypt -t -c # to create a new encrypted volume or usb stick Volume type: 1) Normal 2) Hidden Select [1]: # dismount all volumes currently mounted /usr/bin/veracrypt […]
checkout https://dwaves.de/2016/02/26/is-truecrypt-insecure/ and successor: https://sourceforge.net/projects/veracrypt/files/ vim /usr/bin/nautilus #!/bin/bash # set your filemanager here filemgr=thunar # set your webbrowser here, usually x-www-browser should be perfect webbrowser=x-www-browser ### DO NOT CHANGE ANYTHING BELOW HERE unless you know what you’re doing ### oldparams=$@ […]
Update: 2020-05 PDF are important file formats for document exchange, but in 2020 PDF as Mail-Attachments can not be 100% trusted anymore. how to create PDF under Linux? there are various programs that support export to PDF format least but […]
update: 2020-02: First of: thanks! PGP + enigmail + Thunderbird is is working great on for example: GNU Debian Linux 10. And setup now can be done by normal users. (the enigmail wizard is pretty nice) THANKS ALL INVOLVED 🙂 […]
SSLv3 is older than my daughter, but is still supported by all major browsers. The latest crypto bug is a MITM (man in the middle) attack that could allow anyone with a network device (WiFi router) sitting between browser users […]
This is an UNTESTED (!!!) howto from: https://help.ubuntu.com/community/FullDiskEncryptionHowto the same for debian 🙂 https://dwaves.de/2017/07/10/gnu-linux-debian-9-full-harddisk-encryption/ the ideal OS for minimalists 🙂 It describes a way to set up an Ubuntu installation with a encrypted root partition and encrypted Swap. Please refer […]