GeistHaus
log in · sign up

Passphrases That You Can Memorize — But That Even the NSA Can't Guess

theintercept.com

IT’S GETTING EASIER to secure your digital privacy. iPhones now encrypt a great deal of personal information; hard drives on Mac and Windows 8.1 computers are now automatically locked down; even Facebook, which made a fortune on open sharing, is providing end-to-end encryption in the chat tool WhatsApp. But none of this technology offers as much […]

7 pages link to this URL
Hypha Spike: Diceware

Pulled out from Hypha Spike: DAT 1. Source code Design Screenshot of the completed spike. Use Diceware for passphrase generation to ensure a high-entropy process. Use budo in the spikes to enable lightweight use of bundling/modules/etc. Postmortem Pulled this out into its own Spike so that it doesn’t clutter the DAT 1 spike. Starting with the Aspect Setup 1 spike, in this spike I:

0 inbound links article en CC BY-NC-SA 4.0
Email Self-Defense

Email surveillance violates our fundamental rights and makes free speech risky. This guide will teach you email self-defense in 40 minutes with GnuPG.

0 inbound links en GnuPGGPGopenpgpsurveillanceprivacyemailsecurityGnuPG2encryption CC BY 4.0
Establish your online identity using GnuPG

Creating and managing PGP keys is not a straightforward matter. Many approaches exist and if you are a whistleblower, this tutorial probably does not meet your security standards. In fact, if there's a chance you'll be captured, tortured, or killed for the information you'll encrypt, stop reading this tutorial and pray for the best. You are doing it wrong.

0 inbound links article en cryptography
Email Self-Defense

Email surveillance violates our fundamental rights and makes free speech risky. This guide will teach you email self-defense in 40 minutes with GnuPG.

18 inbound links en GnuPGGPGopenpgpsurveillanceprivacyemailsecurityGnuPG2encryption CC BY 4.0