I used to use Truecrypt to encrypt little enclosures so I wouldn't have to worry about my files so much when I, say, put them on a USB stick or backed them up to the cloud. There was a whole... thing with Truecrypt and now it's hard to say if I should use it anymore. Is there another program that's going to work well for this purpose? [more inside]
I have just discovered that I have two public PGP keys from 1996 and 1997. I recovered the private keys, but I've forgotten the passphrase. Can this be defeated? [more inside]
Recently I noticed a lot of controversy about whether Truecrypt is secure or not. It looks like their webpage is raising concerns about it, even to the point of suggesting that people migrate their data away from it. Arstechnica and others are following the story. What's going on? Might this be a hoax? Are truecrypt encrypted flashdrives not safe? If not, what level of security do they provide, if any? What would be a good alternative if we are to migrate away as quickly as possible?
At work, I can digitally sign and encrypt emails using digital certificates on my ID (and a card reader attached to my laptop). It integrates decently with Outlook and Acrobat. It's 2014. What are my PKI options for personal use? [more inside]
I've only worked in a small business (15-20 employees) since I got out of school, and I've handled the technological necessities since I started because nobody else could. I've handled things on an as-needed basis: troubleshooting problems, setting up new computers, maintaining an iron grip on software installations, setting up the network and administering simple network devices, etc. However, I'm completely self-taught, and I have no idea if my hacked-together system looks anything like a properly-implemented corporate IT system. So I want to know what one looks like. Specifically, I'd like to know if there are any resources I can check out on my own that paint the picture of what I should be trying to achieve. NOTE: I'm NOT averse to hiring an outside IT firm or consultant to help with specification and implementation. However, I don't want to be at the mercy of a firm's "knowledge" and my own ignorance; you can waste a lot of money that way, regardless of scenario. [more inside]
I want to back up some of my media files to various cloud storage sites (box, Dropbox, Google drive and skydrive.) I don't want them to easily see the file names or types. [more inside]
I have a portable drive w/an encrypted partition that I cannot get to mount on a laptop running Ubuntu 12.04. It is not visible to Disk Utility, either. Can anyone walk me through accessing its contents?
I know there are a variety of options out there, but I'm having a hard time sifting through the information myself. [more inside]
Is there any software that allows for encryption of home directories in OSX, a la original FileVault? [more inside]
Does anyone know of a method to remove encryption from DVD (movie) ISOs? I have OSX and Windows at my disposal, and can install any flavor of Linux if it will help solve my problem. [more inside]
Everywhere on the web there is discussion of B&N's great deal on the Nook HD+ for Father's Day. I took the bite and picked up the 16GB (comes w/micro sd port). So far, so good. My questions are: 1) Is there full tablet AES encryption for these? 2) Since B&N finally opened up the Nook and it's now compatible with Google Play's App Store, is there really a reason to root it? And a question about iMessage alternatives. (More inside) [more inside]
Is there a reliable disk encryption tool for Linux that is simpler for a nOOb to install than TrueCrypt? I've failed in getting TC to work, but have two older Western Digital MyBook drives that I'd like to protect. [more inside]
I'm an avid user of Gmail and other Google services, but I'm increasingly uncomfortable keeping my entire email history on someone else's servers. Can I keep a week's worth of messages on the server and encrypt everything else? What are some other Gmail privacy compromises? [more inside]
This envelope with a letter inside was found inside a large decaying bound edition of Shakespeare auf Deutsch in a junk shop in Bushwick that was only apparently open for a few months before disappearing. The letter, postmarked 15 March, 1939 - was sent to Paris by a Mr. Henri Wolf. The contents of the letter appear to be German shorthand. Included was small piece of what looks like code, there's nothing else on the back.The letter, envelope, postcard, etc in question are at this imgur album. Hivemind: What the hell is this?
The best and simplest way to communicate between a smallish number of (known) people, on a few different devices, with encryption? [more inside]
How can I electronically send confidential/private information to other people as conveniently but securely as possible? [more inside]
I have a program that stores information in a database. Because this program doesn't have an API, any automation has to be done by writing directly to the database. Some of the database columns are encoded, so in order to write into them I need to know the encoding method. Can you help me figure it out? Examples inside. [more inside]
I'm looking for a good Linux distribution to run from a USB stick for virus scanning on Windows computers. Difficulty - these computers have their hard drives encrypted with TrueCrypt. [more inside]
Help me understand how encryption works when there's just one device involved. [more inside]
I'd like to make certain documents at work (mostly PDFs) only openable to logged-in domain members based on group membership. Watermarking with account credentials would be a plus. [more inside]
When uploading my files to the cloud, are they automatically encrypted before they leave my computer?
When uploading my files to major cloud services (Microsoft SkyDrive, Google Docs and Google Picasaweb), are they automatically encrypted before they leave my computer? [more inside]
Looking for a community/forum where I can learn more about networking, code, security, and OS-independent CS topics
I'm looking for a forum where I can ask questions about networking, security, coding, operating systems, web design, etc. There are many of these out there, but I'd like to find a single community which covers all these topics more or less equally (so it isn't a Linux forum with a small section on BSD, or a coding forum with a small section on networking). I'd like it to be the sort of forum where users stay around for several years as they learn and contribute at different levels, with high literacy and education-to-spam levels. Could I have your recommendations please?
Espionage/Police Procedural Filter: how do the police, or CIA, or FBI, MI5, MI6, private eyes, or whoever do their job in a world of encryption, cloud storage, and teeny tiny little storage devices? [more inside]
After reading through lots of tips and tricks on backing up data on here, I am close to a backup system that really works for me. However, can anyone help me with two things: securing an offsite backup, and backing up a bootcamp partition? [more inside]
If I wanted banks or companies like LastPass to hire me to be on their security team to make systems safer and to block out hackers, what websites/books/resources should I dive into to go from n00b to pr0 ?? [more inside]
Need some guidance on message-digest based password generation algorithms. [more inside]
A number of technology experts have criticized the iPhone's implementation of in-built hardware encryption. Apparently, circumventing it is a trivial matter of docking it to an Ubuntu system and making a drive image. For someone who knows what he is doing, it would take only a few minutes. How secure, however, is the "Erase all Content and Settings" option? If I understand correctly, this works by simply wiping the encryption key thus rendering all data useless to an intruder. More inside. [more inside]
What are the easiest-to-administer alternatives to BitLocker for file or hard drive encryption on a Windows 7 laptop? [more inside]
How do I securely implement a cryptographic challenge-response in software if the software needs my AES key to create the challenge? [more inside]
I’m going to buy a laptop soon that may end up holding sensitive data. I need to make sure that, if it is stolen, it’s nearly impossible to get the data off the hard drive. I’m a newbie at dealing with workstation security and drive encryption, so please talk me through my options and best practices. I’m willing to pay more for a laptop designed for this purpose if that exists. [more inside]
Insurance data is unencrypted. Should this be reported? How? [more inside]
When people attach a "pgp signature key" to their e-mails, what does that do exactly? What is to keep me from copying their pgp key and forging e-mail headers? [more inside]
I'm tasked with attempting to build a secure virtual appliance. Problem is, I'm trying to stop people from gaining root access to the appliance via single user mode. This leads to a need for disk encryption, any ideas on how to create encrypted disk that wouldn't require someone to put in a password (plug in usb, interact with the boot process) to boot and still be relatively secure?
How can I view an old Microsoft Word document that is password protected, when I cannot remember the password? [more inside]
I have severe 1Password/Lastpass confusion. Does one supercede the other or are they meant to be used concurrently, in an ideal situation? I'm confused whether they perform the same function or not. Please help me organize my stuff! [more inside]
How are passwords stored in systems that require the user to enter specific digits of their password?
How are passwords stored in systems that require the user to enter specific digits of their password? I am familiar with encryption techniques such as MD5 hashes, but I can't see a way in which a system would store the entire encrypted password, and still be able to authenticate individual characters, unless the password is stored in plain text, which seems unlikely for a bank. [more inside]
Are HDMI cables a requirement for watching commercial Blu-Ray movies? If I put a Blu-Ray drive in my computer, will I be able to watch Blu-Ray movies on a monitor that is hooked up via some non-HDMI cable? (DVI, VGA, whatever) [more inside]
is there a mobile call encryption solution for absolutely untechnical people? [more inside]
How should a business that's about security set up its own secure communications? [more inside]
Have 2 Windows 7 Pro computers. PC1 is my primary workstation, and PC2 I've been using with the TV for WMC/Hulu. I wanted to start using PC2 to backup the data on PC1, but PC2 is always logged in to record tv or play recordings. How do I ensure that data that I backup to PC2 is only visible/modifiable to PC1? [more inside]
I need to password protect a section of the website I built (Mac OS X, Dreamweaver CS4) for my daughter's very small nursery school. Our web host is suggesting we buy a SSL certificate. The information I'm interested in protecting is the names, addresses, phone numbers and email addresses of about 60 people - do I go with 128-bit or 256-bit encryption? 256-bit is more than twice the cost of 128.
How safe are my passwords? [more inside]
Has anybody got ZRTP encrypted voice calls working with their own XMPP server? [more inside]
Can TrueCrypt be used to encrypt a Windows Mobile 5.0 device? [more inside]
Why does wifi require a password to provide secure communication? [more inside]
The MacFusion project is, for all intents and purposes, dormant. MacFUSE is nearly so. EncFS for OSX appears to have issues with later builds. What other alternatives are there for file-level (as opposed to block- or filesystem-level) encryption in OSX? [more inside]
LastPass, the password storage service, says that all encryption occurs on my computer, so that the only way to see the passwords is with my encryption key. Is there a way for someone to prove this, or do we have to take them at their word? If it's the latter, does the incentive for LastPass to tell the truth outweigh the incentive for the alternative? [more inside]
Are there any alternatives to Verisign for encrypted email for MacOSX? [more inside]
I figured this crowd would have the answer bookmarked somewhere. There is a specific issue of a web comic that has the story of a guy, who after his first date with a girl, sends her an encrypted note for her to decrypt. They continue to date and despite her asking, he never gives her any decrypting hints. When she finally breaks the code, it's him asking her to marry him. I thought it was an XKCD comic, but I couldn't find it via Google searches, so perhaps it's another site. My last resort is to go thru each XKCD comic one by one, but if you know what I'm talking about please give me a heads up. Thanks.