Tags: encryption

Google Open-Sources Test Suite to Find Crypto Bugs

Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems. To help developers check their code for implementation errors and find weaknesses in cryptographic software libraries, Google has released a test suite as part of Project...
Read 0 Comments

josh-aas-lets-encrypt.png

Josh Aas
Josh Aas of Let's Encrypt explains how the Achilles heel of managing web encryption is not encryption itself, but authentication, which requires trusted third parties, and secure mechanisms for managing the trust chain.

The Urgency of Protecting Your Online Data With Let's Encrypt

We understand that online security is a necessity, so why is only 48.5% of online traffic encrypted? Josh Aas, co-founder of Let's Encrypt, gives us a simple answer: it's too difficult. So what do we do about it? Aas has answers for that as well in his LinuxCon North America presentation. Aas...
Read 0 Comments

How to Fix the Cryptsetup Vulnerability in Linux

A new vulnerability has been found to affect encrypted Debian and Ubuntu systems. Here's how to put a temporary fix on the Cryptsetup issue. Linux enjoys a level of security that most platforms cannot touch. That does not, in any way, mean it is perfect. In fact, over the last couple of years a...
Read 0 Comments

Major Linux Security Hole Gapes Open

An old Linux security 'feature' script, which activates LUKS disk encryption, has been hiding a major security hole in plain sight. The security hole this time is with how Debian and Ubuntu, and almost certainly other Linux distributions, implement Linux Unified Key Setup-on-disk-format (LUKS)....
Read 0 Comments

Let's Automate Let's Encrypt

HTTPS is a small island of security in this insecure world, and in this day and age, there is absolutely no reason not to have it on every Web site you host. Up until last year, there was just a single last excuse: purchasing certificates was kind of pricey. That probably was not a big deal for...
Read 2 Comments

GPG Sync Simplifies Encryption Key Management

Open source project GPG Sync makes it easier for organizations already using GPG to encrypt email messages to manage different user keys. In all the discussion about using encryption, a critical point keeps getting lost: It's difficult to work with, and it's even harder to deploy it at scale....
Read 0 Comments

lets-encrypt.png

Let's Encrypt
“We want every server on the Internet to have a certificate,” said Josh Aas, speaking about the Let’s Encrypt project at LinuxCon North America.

Let's Encrypt: Every Server on the Internet Should Have a Certificate

The web is not secure. As of August 2016, only 45.5 percent of Firefox page loads are HTTPS, according to Josh Aas, co-founder and executive director of Internet Security Research Group. This number should be 100 percent, he said in his talk called “Let’s Encrypt: A Free, Automated, and Open...
Read 0 Comments

Let's Encrypt: Why Create a Free, Automated, and Open CA?

During the summer of 2012, Eric Rescorla and I decided to start a Certificate Authority (CA). A CA acts as a third-party to issue digital certificates, which certify public keys for certificate holders. The free, automated, and open CA we envisioned, which came to be called Let's Encrypt, has been...
Read 0 Comments

security-gpg.png

Gnu Privacy Guard
This intro to Gnu Privacy Guard will help you secure your environment and be able to send and receive encrypted data.

How to Send and Receive Encrypted Data with GnuPG

The day has come where the security of your data—be it on a server, a work desktop, or your personal machine—is one of the single most important issues you can take on. Whether you’re hoping to secure company information or private email to clients, friends, and/or loved ones, you need to...
Read 1 Comments

How to Encrypt and Decrypt Files and Directories Using Tar and OpenSSL

When you have important sensitive data, then its crucial to have an extra layer of security to your files and directories, specially when you need to transmit the data with others over a network. That’s the reason, I am looking for a utility to encrypt and decrypt certain files and directories in...
Read 0 Comments

Pages

Click Here!