If everything burns down, and your data is lost, could you regain access to your accounts?
PDF encryption is broken. Here's why and what you can do about it.
Synology made a brain-dead decision that undermines privilege separation, a fundamental concept in IT security.
This is a quick guide on how to create and verify signatures with GnuPG (in a terminal).
There are different kinds of cloud drives, with different levels of reliability, maintenance, cost and privacy... and the state of things is not pleasing.
PSA: Do NOT use Apple’s “Hide My Email” together with ProtonMail (and possibly others), or it can LEAK your real email
Do not use Apple's "Hide My Email" together with ProtonMail, or your real address can leak.
Why you shouldn't use SKS, and what to use instead.
A guide to easily prevent ZFS leaks.
You probably heard of the Log4j vulnerability by now, and you probably know that (the original) Minecraft is written in Java, and so is the server, and it uses Log4j. So, Minecraft servers are affected by this. I do run a small Minecraft server network (https://www.bitloco.org) but I haven't had [...]
In today's article, I'd like to talk about the pros and cons of sideloading, playing devil's advocate, offering a counter-argument and finally a possible solution to allow it in a secure fashion. Craig Federighi, Apple's current Senior Vice President of Software Engineering said in the Web Summit 2021: "Sideloading is [...]