[IMG] Looks like a good list of steps that people should begin adopting as best practices. Index | Surveillance Self-Defense All digital tools,...
Anyone have experience with phone encryption? I used silent phone for a while but they retired the texting system so I ve been looking for a...
Secure Messaging Scorecard | Electronic Frontier Foundation If you care about SECURE Messaging, you need to look at this Page on the EFF Site.......
I know this isn't breaking news and I'm sure those of us who are aware of and use TOR have been all but positive this was going on, but I just...
[ATTACH] The Motorola T7200 was a great radio that was discontinued due to it's encryption features as well as it's dual mode feature that allowed...
Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is...
gpg manpage Name gpg -- encryption and signing tool Synopsis gpg [--homedir name] [--options file] [options] command [args] DESCRIPTION gpg is...
Quick'n easy gpg cheatsheet to create a key: gpg --gen-key generally you can select the defaults. to export a public key into file public.key:...
The problem [IMG] The NSA is exploiting weak links in Internet security to spy on the entire world, twisting the Internet we love into something...
You may have noticed that all SM urls are now displaying as https:// in your browser. Depending on the browser, you may see a little lock or...
Separate names with a comma.