How to properly store, encrypt and backup passwords for home and office use

I am in close proximity to the moment, where I will need to migrate from my old ssd and data hdd to new ones (wear and age), so I’m rethinking my environment. Please, give me suggestions about what should be improved regardin… Continue reading How to properly store, encrypt and backup passwords for home and office use

How to properly store, encrypt and backup passwords for home and office use

I am in close proximity to the moment, where I will need to migrate from my old ssd and data hdd to new ones (wear and age), so I’m rethinking my environment. Please, give me suggestions about what should be improved regardin… Continue reading How to properly store, encrypt and backup passwords for home and office use

WhatsApp Security Vulnerability

Back in March, Rolf Weber wrote about a potential vulnerability in the WhatsApp protocol that would allow Facebook to defeat perfect forward secrecy by forcibly change users’ keys, allowing it — or more likely, the government — to eavesdrop on encrypted messages. It seems that this vulnerability is real: WhatsApp has the ability to force the generation of new encryption… Continue reading WhatsApp Security Vulnerability

Security Design: Stop Trying to Fix the User

Every few years, a researcher replicates a security study by littering USB sticks around an organization’s grounds and waiting to see how many people pick them up and plug them in, causing the autorun function to install innocuous malware on their computers. These studies are great for making security professionals feel superior. The researchers get to demonstrate their security expertise… Continue reading Security Design: Stop Trying to Fix the User

CONIKS

CONIKS is an new easy-to-use transparent key-management system: CONIKS is a key management system for end users capable of integration in end-to-end secure communication services. The main idea is that users should not have to worry about managing encryption keys when they want to communicate securely, but they also should not have to trust their secure communication service providers to… Continue reading CONIKS