How can one tell if a binary is safe to give sudo permissions for to an untrusted user?

sudo is sometimes used to give untrusted or “semi-trusted” users the ability to perform certain tasks as root, while not giving them unlimited root access. This is usually done via an entry into /etc/sudoers, specifying which… Continue reading How can one tell if a binary is safe to give sudo permissions for to an untrusted user?

Does File-Based Encryption offer comparable security to Full-Disk Encryption on Android?

Between version 4.4 and 9, Android supported Full-Disk Encryption (FDE). On Android 7, a new system called File-Based Encryption (FBE) was introduced, and was subsequently made mandatory on Android 10.

The primary upside cit… Continue reading Does File-Based Encryption offer comparable security to Full-Disk Encryption on Android?

How can I protect the confidentiality, integrity and authenticity of my communication if I am victim of a Man-in-the-Middle attack?

Consider a scenario where my ISP attempts to use a Man-in-the-Middle attack against me to read and possibly modify my Internet traffic.

What can I do to access the Internet and still ensure the integrity and confidentiality… Continue reading How can I protect the confidentiality, integrity and authenticity of my communication if I am victim of a Man-in-the-Middle attack?