Blogs

BROWSE: Most Recent | Popular Tags |

Tags > encryption

Big data and privacy: an uneasy face-off for government to face

By Andy Oram
March 5, 2014

Thrust into controversy by Edward Snowden’s first revelations last year, President Obama belatedly welcomed a “conversation” about privacy. As cynical as you may feel about US spying, that conversation with the federal government has now begun. In particular, the first …

The technical aspects of privacy

By Andy Oram
March 5, 2014

Thrust into controversy by Edward Snowden’s first revelations last year, President Obama belatedly welcomed a “conversation” about privacy. As cynical as you may feel about US spying, that conversation with the federal government has now begun. In particular, the first …

The RSA/NSA controversy concerns you!

By Jeffrey Carr
February 18, 2014

As a cyber security author and CEO of a security consulting company, I was personally shocked by the RSA’s attitude about the alleged secret payments it received from the NSA as well as its willingness to weaken its BSAFE product; …

Adobe’s Breach Widens

By Jon Callas
November 12, 2013

Over the last week, the analysis of the Adobe breach has gotten more interesting. The actual file itself has been available via BitTorrent. I found a torrent file and looked through it myself. If you’re interested, note that the torrent …

Security After the Death of Trust

By Simon St. Laurent
October 2, 2013

Security has to reboot. What has passed for strong security until now is going to be considered only casual security going forward. As I put it last week, the damage that has become visible over the past few months means …

After the NSA Subverted Security Standards

By Simon St. Laurent
September 11, 2013

I was somewhat surprised, despite my paranoia, by the extent of NSA data collection. I was very surprised, though, to find the New York Times reporting that NSA seems to have eased its data collection challenge by weakening security standards …

Four short links: 18 July 2013

By Nat Torkington
July 17, 2013

Ten Rules of the Internet (Anil Dash) — they’re all candidates for becoming “Dash’s Law”. I like this one the most: When a company or industry is facing changes to its business due to technology, it will argue against the …

The Watering Hole - Speciality Counseling

The Watering Hole - Speciality Counseling
By James Turner
October 24, 2010

But little did any of them know that Eve was secretly listening in on the whole conversation...

Wayner security flip gets real-life play in Wesabe's Grendel

By Andy Oram
January 13, 2010

A security trick documented by Peter Wayner in the books Beautiful Security and Translucent Databases was also discovered and used by Wesabe.

Four short links: 8 October 2009

By Nat Torkington
October 8, 2009

Linux Baby Rocker -- inventive use of a CD drive and the eject command ... (via Hacker News) I Like Unicorn Because It's Unix -- forceful rant about the need to rediscover Unix systems programming. Reminds me of the Varnish notes where the author explains that it works better because it uses the operating system instead of recreating it...

Four short links: 23 July 2009

By Nat Torkington
July 22, 2009

Google Wave Federation Protocol -- the interesting part of Wave for me is the system for keeping databases coherent. There's a reference implementationl. I shouldn't have yelled at that Chinese guy so much -- the post that redeemed Fake Steve Jobs in my eyes. We all know that there's no fucking way in the world we should have microwave...

Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor Project and the EFF

Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor Project and the EFF
By Timothy M. O'Brien
June 19, 2009

The Tor Project produces an anonymous proxy services which allows users to evade surveillance. In this interview, Andrew Lewman talks about the Tor Project and discusses some statistics that show its increased use from with Iran. This article also includes some questions and answers with the EFF about the legal implications of running an open proxy server.

Introducing Nitro-LM "Lite"

By Andrew Westberg
May 22, 2009

        I've been consulting for Simplified Logic the creators of Nitro-LM full time for the past two years. Nitro-LM is a licensing and encryption solution for software written in C/C++, Java, Eclipse, Eclipse Plugins, and Adobe...

Encryption in Flex Applications 3 - NitroLM SWF Encryption

By Andrew Westberg
April 2, 2008

NitroLM (Nitromation License Manager) is a commercial product developed by Simplified Logic, Inc. (SLI) for managing users, products, notifications, and source code protection for applications. It started off as an internal tool to protect SLI’s 3D engineering design and...

Encryption in Flex Applications 2 - SWC AS3 Library Encryption

By Andrew Westberg
April 2, 2008

In this article, we’ll go over an example using Interfaces, Factories, and Encryption to protect code in a SWC library from being easily decompiled.

Encryption in Flex Applications 1 - Simulate EncryptedLocalStore

By Andrew Westberg
March 31, 2008

In the RIA world, Flex and AIR applications have really taken off. With that has come increased adoption by Fortune 500 companies and new enterprise-level apps taking advantage of the Adobe Flash platform. Application and data security should always be a concern of the Flex/AIR developer. The level of paranoia the developer should implement must be weighed against the goals of the project.

TrueCrypt 5.1: Open Source File and Device Encryption Goodness

By Todd Ogasawara
March 18, 2008

TrueCrypt 5.1 lets you encrypt and secure files and folders very easily and quickly. The encrypted data can also be used on Linux and Microsoft Windows computers with TrueCrypt on it. Since it only became available for Mac OS X this year, I thought I'd provide a brief introduction to this amazing free Open Source encryption tool.


1 to 17 of 17
The Watering Hole