On linux, for full disk encryption, LUKS might be a good choice. Most
distributions nowadays offer a way to turn on full disk encryption when
installing (minus the /boot partition).
For single files I use GnuPG.
regards,
Jonas
On 16.08.2014 06:05, Mark Thomas wrote:
I have a question for the
On 28.11.2013 10:29, Stephan Mueller wrote:
That is why my current patch set only uses the jitter noise source as last
resort, i.e. when /dev/random is about to block. As long as the other
noise sources produce entropy, my jitter noise source is not even asked.
That sounds as if the jitter
Dear Hans-Joachim,
Oddly, there is in fact one, which “suddenly” appeared on my servers and
which is nagging me currently about a soon-to-expire certificate. It
sends out daily mails to root@host.domain with detailed information.
It's called certwatch and is at least shipped with fedora. It can
Jitsi is XMPP or SIP. For the text-part, they have built-in support for
OTR. Otherwise, there is no end-to-end secrecy as far as I know.
For voicecalls, they have something similar, with some shared-secret
verification which is validated using the text-channel, which is best
secured with OTR I
you
want: http://www.fourmilab.ch/random/
regards,
Jonas Wielicki
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
On 15.02.2013 00:45, Jonathan Thornburg wrote:
Trying to view that url with either lynx or firefox-with-noscript
gets me an error screen
Sorry, you have to enable Javascript in order to use this.
I think there's a message here.
Tried it without noscript and wished I didn't. Is
On 30.10.2012 14:30, Natanael wrote:
Yeah, this looks like TPM with software protection instead of hardware
protection.
Rootkits can screw it up.
I guess that is why the researchers suggested an on-GPU
challenge-response protocol implementation which would not hand out the
initial SRAM state
On 10.10.2012 16:29, Jon Callas wrote:
Why not store a representation of a *key* (a hash is a representation of a
key) and then prove possession of the key? It doesn't need to be certified. I
can store that key on as many computers as needed via a keychain or something
like it.
Lemme throw
On 05.10.2012 10:58, Guus Sliepen wrote:
I found a benchmark here:
https://github.com/cjdelisle/cjdns/blob/master/rfcs/benchmark.txt
So it seems that is not as slow as I suspected: it can forward packets at a
rate of 7 Gbit/s on an Opteron 6128.
I think you have misread. The benchmark