Ditto,
But don’t tell the Australian Government, it’s probably on their back door
request list…;)
> On 8 Nov 2018, at 01:26, Bear Giles wrote:
>
> FWIW I distrust encrypted drives using hardware encryption. This came out
> just a few days ago:
>
FWIW I distrust encrypted drives using hardware encryption. This came out
just a few days ago:
https://thehackernews.com/2018/11/self-encrypting-ssd-hacking.html: Flaws
in Popular Self-Encrypting SSDs Let Attackers Decrypt Data.
On Tue, Nov 6, 2018 at 10:15 PM Nicholas Papadonis <
Interesting. How about this for a start?
http://nickpapadonis.com/images-share/summerian-ancient-mesopotamia-ancient-lock.jpg
http://nickpapadonis.com/images-share/anunnaki1.jpg
http://nickpapadonis.com/images-share/summerian-Winged_Human-headed_Bulls.JPG
On Sun, Nov 4, 2018 at 7:21 PM
On 03/11/2018 10:11, Hanno Böck wrote:
On Sat, 3 Nov 2018 12:28:02 +0500
Марк Коренберг wrote:
Try openssl cms ( as newer alternative to s/mime)
cms is not newer than s/mime, it's the underlying message format of
s/mime.
According to this
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
> Nicholas Papadonis
> Sent: Saturday, November 03, 2018 13:03
> https://security.stackexchange.com/questions/182277/is-openssl-aes-256-cbc-encryption-safe-for-offsite-backup
Thanks. Yes, that's talking about the CBC
Hi Nick
Have You tried The FooKey Method ? https://foocrypt.net/the-fookey-method
Also,
I will be sourcing public addendum's as addendum's to my submission into the
Parliamentary Joint Committee on Intelligence and Security [
Comments
On Sat, Nov 3, 2018 at 5:56 PM Bear Giles wrote:
> > I'm considering encrypting a tar archive and optionally a block file
> system (via FUSE) using either utility
>
> Linux has good support for encrypted filesystems. Google LUKS.
>
> BTW a tar file starts with the name of the first
> I'm considering encrypting a tar archive and optionally a block file
system (via FUSE) using either utility
Linux has good support for encrypted filesystems. Google LUKS. Most (all?)
distros allow you to install on an encrypted filesystem and with a little
bit of research you can have encrypted
comments
On Fri, Nov 2, 2018 at 3:09 PM Michael Wojcik
wrote:
> > From: openssl-users on behalf of
> Nicholas Papadonis
> > Sent: Friday, November 2, 2018 14:29
>
> > I read
>
> Where? It's hard for us to determine the quality of your source, or your
> interpretation of it, if we don't know
On Sat, 3 Nov 2018 12:28:02 +0500
Марк Коренберг wrote:
> Try openssl cms ( as newer alternative to s/mime)
cms is not newer than s/mime, it's the underlying message format of
s/mime.
According to this
https://www.openssl.org/docs/man1.0.2/apps/openssl.html
it only supports deprecated cipher
Try openssl cms ( as newer alternative to s/mime)
пт, 2 нояб. 2018 г. в 23:30, Nicholas Papadonis :
>
> Security Experts,
>
> I'm considering encrypting a tar archive and optionally a block file system
> (via FUSE) using either utility. Does anyone have comments on the best
> practices and
Hi,
Malleability means that an attacker who is able to modify your
encrypted data can - given some partial knowledge about the plaintext -
do some modification of the ciphertext that will lead to specific
modifications in the plaintext.
This can e.g. mean that if the attacker knows your
> From: openssl-users on behalf of Nicholas
> Papadonis
> Sent: Friday, November 2, 2018 14:29
> I read
Where? It's hard for us to determine the quality of your source, or your
interpretation of it, if we don't know what it is.
> that the OpenSSL AES-CBC CLI mode is prone to a malleable
Security Experts,
I'm considering encrypting a tar archive and optionally a block file system
(via FUSE) using either utility. Does anyone have comments on the best
practices and tools for either?
I read that the OpenSSL AES-CBC CLI mode is prone to a malleable attack
vector and it's CLI
14 matches
Mail list logo