Tags: encryption

Are Your Linux Servers Really Protected?

When thinking about IT security, one area that may not readily come to mind is the physical security of an enterprise’s servers. It’s often thought that because the servers are behind lock and key and/or in a data center, and because the data is in continuous use, encrypting the server drives isn’t...
Read 0 Comments

4 Management Tools for Git Encryption

See how Git-crypt, BlackBox, SOPS, and Transcrypt stack up for storing secrets in Git. There are a lot of great open source tools out there for storing secrets in Git. It can be hard to determine the right one for you and your organization—it depends on your use cases and requirements. To help you...
Read 0 Comments

Disk Encryption for Low-End Hardware

Eric Biggers and Paul Crowley were unhappy with the disk encryption options available for Android on low-end phones and watches. For them, it was an ethical issue. Eric said: We believe encryption is for everyone, not just those who can afford it. And while it's unknown how long CPUs without AES...
Read 0 Comments

lock-1920.jpg

lets encrypt
Unencrypted HTTP sessions are wide open to abuse; lock them down with Let's Encrypt.

Protect Your Websites with Let's Encrypt

Learn how to use Let's Encrypt in this tutorial from our archives. Back in the bad old days, setting up basic HTTPS with a certificate authority cost as much as several hundred dollars per year, and the process was difficult and error-prone to set up. Now we have Let's Encrypt for free, and the...
Read 1 Comments

Quantum Computing and Cryptography

Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to...
Read 0 Comments

Encrypting NFSv4 with Stunnel TLS

NFS clients and servers push file traffic over clear-text connections in the default configuration, which is incompatible with sensitive data. TLS can wrap this traffic, finally bringing protocol security. Before you use your cloud provider's NFS tools, review all of your NFS usage and secure it...
Read 0 Comments

How to Use the gpg Command to Encrypt Linux Files

There are many reasons to encrypt files — even on a system that is well maintained and comparatively secure. The files may highly sensitive, contain personal information that you don't want to share with anyone, or be backed up to some variety of online storage where you'd prefer it be extra secure...
Read 0 Comments

New IEEE Position Statement Supports Strong Encryption

On 24 June, the IEEE Board of Directors adopted a position statement in support of strong encryption for confidentiality and data integrity.  The essence of the position is that: “IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and...
Read 0 Comments

Using the Command Line to Decrypt a Message on Linux

If you have disabled the PGP plugin from your mail client and saved a copy of an encrypted email to your desktop, this guide will help you read that message in as safe a way as possible given what we know about the vulnerability described by EFAIL. Note that the first three steps (opening the...
Read 1 Comments

TLS 1.3 Is Approved: Here's How It Could Make the Entire Internet Safer

​The IETF has finally given the okay to the TLS 1.3 protocol, which will speed up secure connections and make snooping harder for attackers. TLS 1.3 has been approved for use, which will make all secure internet connections faster and safer. The security and speed improvements brought by TLS 1.3...
Read 0 Comments

Pages

Click Here!