Guardian - Secrets, lies and Snowden’s email: why I was forced to shut down Lavabit
"For the first time, the founder of an encrypted email startup that was supposed to insure privacy for all reveals how the FBI and the US legal system made sure we don’t have the right to much
privacy in the first place"
What It All Means: All Your Communications are Belong to U.S. In sum, if you use encryption they’ll keep your data forever. If you use Tor, they’ll keep your data for at least five years. If an
American talks with someone outside the US, they’ll keep your data for five years. If you’re talking to your attorney, you don’t have any sense of privacy. And the NSA can hand over you
information to the FBI for evidence of any crime, not just terrorism. All without a warrant or even a specific FISA order.
Not sure if this is saying all Tor data is collected or saying if someone uses Tor then start collecting that someone’s communication.
You don’t use the same password over and over right? Let’s be honest this is the day and age of the hacker. Eclectic Method brings you “Hackers” , Hollywood’s celebration of basement
dwelling 128 bit encryption masters. They’ll shut down before you can trace them, hack into the mainframe…
2011 Jun 20, 11:25A cautionary tale in chart form: lesson is make sure you can always upgrade your hashing algorithm or don't have security dependencies on hashing algorithms.referencehashencryptionsecuritytabletechnicalhumor
2008 Oct 14, 11:14Similar in concept to the Pirate Bay suggestion of encrypting all TCP/IP connections if both server and client support it: "Obfuscated TCP is a transport layer protocol that adds opportunistic
encryption. It's designed to hamper and detect large-scale wiretapping and corruption of TCP traffic on the Internet."internettcpencryptionsecuritygoogleprivacyopensourcecryptographynetworkssl
2008 Jul 10, 4:44More on IPETEE w/ some of the politics and commentary. "The Pirate Bay has ambitious plans to bring end-to-end encryption to all network activity..."articleencryptionprivacysecurityipcryptography
2008 Jul 10, 4:43"The goal is to implement IP-transport encryption in a way that is transparent both to the IP-layer (including nodes in the network path) and to the applications that benefit from the encryption."
Seems like a good idea to me.cryptographyencryptioninternetprivacysecurityipwiki
2008 Jun 19, 1:00"The new compression technique, called variable bitrate compression produces different size packets of data for different sounds...VoIP streams are encrypted to prevent eavesdropping. However, a team
... has shown that simply measuring the size of packetssecurityprivacyphonecompressionencryptionblogarticle
2008 Apr 9, 2:36History of Enigma in WW2: "One particular German code clerk continually used his girlfriend's name, Cillie, for his messages, and so these easy-to-guess indicators became known as "Cillies.""historyencryptioncryptographyarticlesecuritynsaenigma
2008 Mar 10, 3:20Josh Benaloh / Brian LaMacchina encryption course at University of Washington available for free. Slides and audio from the course are available. Recommended by course through my company.mathencryptioneducationsecuritycsctodo