Tags: encryption

cncf_dan_kohn.png

Dan Kohn CNCF
This week, Cloud Native Computing Foundation announced Google is donating gRPC, its high performance remote procedure call (RPC) framework, to the foundation. Here pictured: Dan Kohn, CNCF Executive Director, at Cloud Native Day 2016.

This Week in Open Source, CNCF Announces 6th Managed Project, Changes in OSS Accelerate SDN & More

This week in open source news, CNCF adds gRPC to list of existing projects, making it the sixth, and other stories. Keep reading to stay on top of your news this week! 1) The Linux Foundation's Cloud Native Computing Foundation (CNCF) announced it's adding gRPC open source protocol to list of...
Read 0 Comments

Linus Torvalds on SHA-1 and Git: 'The Sky Isn't Falling'

Yes, SHA-1 has been cracked, but that doesn't mean your code in Git repositories is in any real danger of being hacked. The real worry about Google showing SHA-1 encryption is crackable, as pointed out by Peter Gutmann, a cryptography expert at the at the University of Auckland, New Zealand, is "...
Read 0 Comments

EFF: Half of Web Traffic is Now Encrypted

Half of the web’s traffic is now encrypted, according to a new report from the EFF released this week. The rights organization noted the milestone was attributable to a number of efforts, including recent moves from major tech companies to implement HTTPS on their own properties. Over the years,...
Read 0 Comments

Security Hygiene for Software Professionals

As software makers, we face a unique threat model. The computers or accounts we use to develop and deliver software are of more value to an attacker than what ordinary computer users have—cloud service keys can be stolen and used for profit, and the software we ship can be loaded with malware ...
Read 0 Comments

How to Password Protect a Folder on Linux/Unix without Encryption

As operating systems, Linux/Unix put the user's privacy and safety above all. While this has resulted in a product that many people swear by, it's also led to certain features that may not be easy to discern at first sight. For instance, the possibility of password protecting directories without...
Read 0 Comments

top-security-tutorials.jpg

security tutorials
Check out these top tutorials from Linux.com to help you improve your Linux server security.

Best Linux Server Security Tutorials on Linux.com

The first rule of Linux server security is to keep your server lean and mean. Only install the packages and run the services that you really need, writes Swapnil Bhartiya in his Linux.com tutorial on making your server more secure. “Even the most hardened servers can be hijacked by exploiting any...
Read 0 Comments

lets-encrypt-security.jpg

Let's Encrypt
We’re incredibly close to a Web that is more encrypted than not, says Josh Aas in this update from the Let’s Encrypt project.

3 Lessons in Web Encryption from Let’s Encrypt

As exciting as 2016 was for encryption on the Web, 2017 seems set to be an even more incredible year. Much of the infrastructure and many of the plans necessary for a 100 percent  encrypted Web really solidified in 2016, and the Web will reap the rewards in 2017. Let’s Encrypt is proud to have been...
Read 0 Comments

Google Ventures into Public Key Encryption

Google's Key Transparency project offers a model of a public lookup service for encryption keys. Google announced an early prototype of Key Transparency, its latest open source effort to ensure simpler, safer, and secure communications for everyone. The project’s goal is to make it easier for...
Read 0 Comments

Google Open-Sources Test Suite to Find Crypto Bugs

Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems. To help developers check their code for implementation errors and find weaknesses in cryptographic software libraries, Google has released a test suite as part of Project...
Read 0 Comments

josh-aas-lets-encrypt.png

Josh Aas
Josh Aas of Let's Encrypt explains how the Achilles heel of managing web encryption is not encryption itself, but authentication, which requires trusted third parties, and secure mechanisms for managing the trust chain.

The Urgency of Protecting Your Online Data With Let's Encrypt

We understand that online security is a necessity, so why is only 48.5% of online traffic encrypted? Josh Aas, co-founder of Let's Encrypt, gives us a simple answer: it's too difficult. So what do we do about it? Aas has answers for that as well in his LinuxCon North America presentation. Aas...
Read 0 Comments

Pages

Click Here!