Which is preferable compress and encrypt or just encrypt and no compression in purely security perspective and not in resources or efficiency? [duplicate]

I want to know what attack am I exposed to if I implement one of the two method. I’m pretty sure both of them are not 100% fool-proof and both of them are expose to traffic-analysis attack if I do sent the files through the internet. I wan… Continue reading Which is preferable compress and encrypt or just encrypt and no compression in purely security perspective and not in resources or efficiency? [duplicate]

Is throwing powered on laptop into a fish tank effective against forensic [closed]

Let’s say someone has a full disk encrypted laptop powered on when the adversary tries to break into her home to seize her laptop. If she simply put her powered-on laptop into a fish tank nearby, would it be effective against forensic inve… Continue reading Is throwing powered on laptop into a fish tank effective against forensic [closed]

How to protect files in use on a system powered on from physical theft or tampering?

I’m in the process of figuring out an encryption strategy for a personal Linux system.
My laptop is almost always on, or in sleep mode, except for longer travels.
My main threats are theft of my laptop while powered on, and evil maid.
It i… Continue reading How to protect files in use on a system powered on from physical theft or tampering?

AEAD: Authenticating a digest of my data instead the data itself

Relevant question for Python:

Stack Exchange: https://stackoverflow.com/questions/75739308/aead-authentication-with-huge-input-that-doesnt-fit-into-ram
Top Answers: https://topanswers.xyz/python?q=3867

Basically: data that doesn’t fit in… Continue reading AEAD: Authenticating a digest of my data instead the data itself