senderek.ie
Credits for Photography
http://www.senderek.ie/footer/credits.php
Keeping an eye on. Pn photo, Fotolia.com). Franz Pfluegl, Fotolia.com). Mipan, Fotolia.com). Pressmaster, Fotolia.com). Maksym Yemelyanov, Fotolia.com). Andrea Danti, Fotolia.com). Mikael Damkier, Fotolia.com). Glenda Powers, Fotolia.com). Nito, Fotolia.com). Pro motion pic, Fotolia.com). Vege, Fotolia.com). Anyka, Fotolia.com). Maigi, Fotolia.com). Itestro, Fotolia.com). Anton Balazh, Fotolia.com). So47, Fotolia.com). AJ Design, Fotolia.com). Olly, Fotolia.com). Vjom, Fotolia.com). How To Keep A Secret.
senderek.ie
Helping Johnny To Be Free In The Digital Age
http://www.senderek.ie/articles/helping-johnny-to-be-free-in-the-digital-age.php
Keeping an eye on. Helping Johnny To Be Free. In The Digital Age. We all know that Johnny can't encrypt. And we know that since the end of the last century, since 1999 precisely. Why is it that Johnny still can't encrypt in the year 2013? Is it, because Johnny doesn't have enough money to buy good encryption software? Is it, because nobody did explain how email encryption works. In terms Johnny can comprehend? Does Johnny lack the ability to use a computer or is it his ignorance? And if Johnny happens to...
senderek.ie
How To Keep A Secret
http://www.senderek.ie/articles/how-to-keep-a-secret.php
Keeping an eye on. How To Keep A Secret. Obviously, the real-world advice "Don't tell anyone! Wouldn't work in the online world, because you have to use your secret to log into a web service and to access private information after login. Using your secret often and still keeping it private, so only you can use it, that is the challenge all web applications must live up to. And many fail in this regard. The answer is, because it is stored somewhere, and that's where things get pretty tricky. To save you t...
senderek.ie
Secure Boot For Linux Done Right
http://www.senderek.ie/downloads/secureboot.php
Keeping an eye on. Why Secure Boot Is A Good Idea. Despite the fact that Microsoft have abused the term "secure boot" for a long time to regain exclusive control over a computer's boot process, there are some very good reasons for improving the Linux boot sequence to meet privacy concerns. I will insist to call one of these improvements secure boot. In my opinion there is still a need to handle encrypted containers separately, because encrypting a whole partition does not distinguish between sensitive da...
senderek.ie
The Crypto Pi
http://www.senderek.ie/articles/the-crypto-pi.php
Keeping an eye on. This year has had some devastating news about the state of the internet infrastructure in store and came with some disillusion about the vulnerability of tools we use day by day. And BTW it had turned out, that Johnny still can't encrypt. To change that, I've put some effort into developing the crypto pi. The crypto pi is in its early stages of its infant life and although it's working and looking great, it has not got the most important ingredient for a happy life (yet), peer-review.
senderek.ie
Is HTTPS A Lost Cause?
https://senderek.ie/archive/2013/is-https-a-lost-cause.php
Keeping an eye on. Is HTTPS A Lost Cause? Following the allegations that the NSA is capable of reading encrypted communications. Many people wonder if using HTTPS is beyond help. Is any trust left in HTTPS at all? And we're not talking about forged certificates. The question is whether or not the encryption built into HTTPS can be circumvented and if so, whether or not there is a cure. The NSA's Surveillance and Attack Workbench. The NSA can redirect HTTPS traffic to a set of their own (quantum) servers,...
senderek.ie
What does a NSA backdoor look like?
http://www.senderek.ie/archive/2014/what-does-a-NSA-backdoor-look-like.php
Keeping an eye on. What Does a NSA Backdoor Look Like? For a time there was only speculation. How backdoors are being implanted to weaken encryption and to subvert trust in secure online communication. This has all changed with the latest revelations. About NSA's advanced spying capabilities, a catalogue of ready-made backdoor tools. There are a number of requirements a good backdoor has to meet to become an efficient surveillance tool for the NSA and other like-minded organisations. Fortunately, this is...