Server encryption with remote SSH unlock
In this guide, you'll learn how to unlock an encrypted Linux server remotely with SSH.
In this guide, you'll learn how to unlock an encrypted Linux server remotely with SSH.
PDF encryption is broken. Here's why and what you can do about it.
There are different kinds of cloud drives, with different levels of reliability, maintenance, cost and privacy... and the state of things is not pleasing.
Do not use Apple's "Hide My Email" together with ProtonMail, or your real address can leak.
With this guide, building and installing obfs4proxy is a no-brainer if you know how to use a terminal and have Git and Go installed.
Why you shouldn't use SKS, and what to use instead.
After following this guide, you should be able to encrypt, decrypt and sign emails within Thunderbird, even with a smartcard. This guide assumes you already have a GPG keyring or know how to set it up. Install GPG Suite Download and install GPG Suite from [here]. Install MacPorts and gpgme [...]
Brief Today I'll show you how to set up PGP WKD (Web Key Discovery), to easily distribute your public key, so that anyone who has your email address will be able to get your public key (in some cases automatically) while being reasonably sure that it's the real key. Requirements [...]
I am writing this post because Thunderbird 78.x has issues for advanced PGP users
I met someone through this very blog. We have been emailing back and forth, and eventually the question arised why I'm so interested in IT security. My response was, that there's no particular reason and I guess it's just "obvious" to me. To which he replied seemingly perplexed, that I [...]