for files I use rosecrypt
and I use gpg for mail
and tor for Internet
I live Diceware. Truly
Edward Snowden made yet another remarkable phrases among many others.
Shift your thinking from passwords to passphrases
or
A five-word passphrase, in contrast, would be cracked in just under six
months and a six-word passphrase would take 3,505 years, on average, at a
trillion guesses a sec
For encryption, the more random the passphrase is, the stronger the
encryption. For a root password this might not matter as much. But if you
have someone trying to brute-force it, then random becomes very valuable
indeed. Allow me to refer to the Diceware FAQ:
http://world.std.com/%7Ereinh
It would I think. With VPN provider it always comes down to one thing: is it
reliable and cn you trust it not to log? Not an easy question. Here an
interesting thread on the two ->
http://www.webcacher.org/silkroad1-forums-anonymous/2013-10-15/Discussion/Security/wc.VPN%20vs%20Bridge%20vs%20
Would it be ok to remove the VPN and just connect through Bridges?
I believe you are correct and this must occur at the time of installation. I
believe it even displays a warning about the importance of doing it at that
time.
If this isn't a good idea, let me know of a better way.
oh no I was talking about making encrypted zips with it. or files in general.
What does this mean? Isn't GPA just a front-end to GnuPG? Do you mean with
signing you want to create ACII-armoured signatures or just normal .gpg
signatures?
I use gpa myself but I do wonder if its more secure to put it in GPG mode or
.asc mode when encrypting.
>When it comes to file encryption, as far as I'm aware, the most secure
methods of encryption are AES and OpenPGP. But I'm not sure.
gpg -c --cipher-algo AES256 file.txt
That's the command I use. AFAIK AES is very secure.
Also, I can recommend the riseup's website as source of information o
Tomb is pretty cool ;-)
Take care of the skeletons in your closet!
Tomb generates encrypted storage folders to be opened and closed using their
associated keyfiles, which are also protected with a password chosen by the
use
https://www.dyne.org/software/tomb/
from the dyne.org free softwar
With Diceware, the die gives you entropy. A computer is predictable if you
work out the seed for the RNG.
Maybe it would not matter as much for a root password. For encryption, it
weakens it though.
A story is easy to remember. If you think of the words as just random words
it could be done
I have a LUKS partition where I store my personal files. I also have an
encrypted USB drive where I back up my private keys (it is only 256 MoB in
size).
I used to make full disk images and store them in a LUKS partition but it
became too much work. That being said, it was useful doing this e
Regarding passphrases, the problem with using a short story is that your own
bias tends to weaken it. For instance, many people think of a popular phrase
e.g. "one does not simply walk into mordor". Some journalists might use a
phrase from their own work.
So the solution is Diceware. You get
I don't know any technical details about disk encryption except that
TrueCrypt is proprietary. I imagine that what Ubiquity sets up is secure.
When it comes to file encryption, as far as I'm aware, the most secure
methods of encryption are AES and OpenPGP. But I'm not sure.
This is the thin
For files: I move them all in an archive (7z, tar etc..) and then I encrypt
the archive with gpg. I do realize this is not very convenient but I have a
huge trust in gpg and prefer this inconvenient way over all the others I am
aware of. The passphrase is long and complex enough.
I use a VP
Truecrypt is discontinued.
Micah Lee has some interesting insights into laptop encryption. 'Evil Maid
Attack' and 'Cold Boot Attack'...
https://theintercept.com/2015/04/27/encrypting-laptop-like-mean/#attacks
Snowden explains how to reclaim your privacy.
https://theintercept.com/2015/11/12/
In Ubuntu and its derivatives, you must encrypt your HDD/home folder at the
time of installation. I'm not aware there is an encryption option afterwards.
Anybody?
alberto...@openmailbox.org, Sáb 07 Mai 2016 09:55:23 CEST:
I know about veracrypt https://en.wikipedia.org/wiki/VeraCrypt
But i am not sure if it is safe to use, as it is a fork of truecrypt
wich apperantly was compromised. http://truecrypt.sourceforge.net/
There was never news of Tr
Really? I wasn't aware of that. What would you recommend me instead :)
Don't know whether it's safe but it's not free software.
I know about veracrypt https://en.wikipedia.org/wiki/VeraCrypt
But i am not sure if it is safe to use, as it is a fork of truecrypt wich
apperantly was compromised. http://truecrypt.sourceforge.net/
What do you think? Is it safe to use? Or are there better options?
Also for encrypted text messages I am using Silence https://silence.im/
Also available at F-DROID :)
Following the last thread
https://trisquel.info/es/forum/what-are-your-favorite-command-line-programs
and also
https://trisquel.info/en/forum/whats-your-favorite-not-so-famous-application-trisquel
Now I would like to ask you what methods and programs do you use to encrypt,
your Hard Drive,
26 matches
Mail list logo