encryption

  1. Teacher

    Mining, encryption, remote access: a bug in TeamCity has become fatal for dozens of organizations

    CVE-2024-27198 opened a compromise portal for hackers. When will the administrators close it? Attackers continue to actively exploit vulnerabilities in the JetBrains TeamCity software, deploying ransomware, cryptocurrency miners, Cobalt Strike beacons, and Spark RAT remote access Trojans. The...
  2. Teacher

    TutaCrypt Encryption: When Emails Play Hide-and-seek with Quanta

    You can't intercept it now, you can't decrypt it later: Tuta has introduced a new super-secure protocol. German company Tuta, developer of the secure email service Tuta Mail with more than 10 million users, has introduced a new quantum-resistant encryption protocol — TutaCrypt. The development...
  3. Teacher

    Nevada vs. Meta: Authorities Want to Disable End-to-End Encryption for Children

    Are the authorities fighting for the safety of children or are they afraid of losing access to user data? Nevada authorities are taking drastic steps against Meta, demanding that minors restrict access to encrypted messages in the Messenger app. The initiative of the State of Nevada is aimed at...
  4. Teacher

    Europe for Encryption: ECHR opposes "Chat Control" initiative

    The Strasbourg Court has defended the right of ordinary citizens to privacy of correspondence. A recent decision by the European Court of Human Rights (ECHR) called into question laws requiring weaker encryption and longer data retention times, such as those promoted by the European Chat...
  5. Brother

    New FHE encryption technology makes data invulnerable to hacking

    Fully homomorphic encryption allows you to process data without revealing its contents. In the world of computer security, a breakthrough is being planned thanks to fully homomorphic encryption (FHE) technology, which allows programs to work with encrypted data without decrypting it. The...
  6. Tomcat

    Apple and Facebook may mandate breaking end-to-end encryption

    US Senator Lindsey Graham has introduced the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act, which allows law enforcement and tech companies to work together to protect children. The bill applies to any company offering "interactive computing services", including...
  7. Teacher

    End-to-end encryption: what is it and why do you need it

    End-to-end encryption What is end-to-end encryption and what other options are there End-to-end encryption is when messages are encrypted on your device and decrypted only on the device of your interlocutor (in English, this is called end-to-end, which can be translated into Russian as "from...
  8. Teacher

    I2P Tunnels: Garlic encryption and unidirectional data transfer

    Anonymity of I2P network participants is achieved by using tunnels. An important feature of I2P is that only the person who created it knows the length of the tunnel, its beginning and end. Each node of the network has its own incoming and outgoing tunnels, and by default it also acts as a...
  9. Father

    Fundamentals of Cryptography (Encryption)

    When people talk about crypt in general, there are some fundamental principles. One of them is the Kerkhoffs principle, which says that open source is very important in cryptography. More specifically, it provides general knowledge about the protocol design. The point is very simple: the...
  10. Hacker

    File Encryption

    Encryption is the most common and, in fact, the simplest way to protect any information. However, many might argue, then what is the efficiency and complexity of encryption? Symmetric ciphers With them, everything is quite simple. Asymmetric ciphers This is a new generation of ciphers that has...
  11. Lord777

    PGP / GPG encryption

    Protecting your data from prying eyes - in some cases it can be a matter of life and death, and relying on others for this matter means trusting them with your data. GPG encryption will help protect your correspondence from prying noses on your own . I can also advise you on the article...
  12. Lord777

    Linux Encryption: Using GnuPG

    On Linux, the universal encryption tool is Werner Koch's Gnu Privacy Guard (GnuPG) package. Its main application command (gpg) brings back the memory of Pretty Good Privacy (PGP), an encryption tool released in 1991 by Phil Zimmermann. You can learn more about GPG in the article "GPG...
  13. Carding

    Raising the Shadowsocks proxy with traffic encryption and minimal speed drop

    Shadowsocks is a free open source SOCKS5 proxy. The essence of the work is as follows: the client pretends to be a proxy server, receives incoming connections and encrypts them. After that, it sends it to the server and then releases it to the Internet. Why is it so good? All data that passes...
  14. Carding

    Traffic encryption in Linux

    There are many ways to bypass blocking sites and ensure online privacy. Terms like TOR, VPN, and proxy are well-known. You don't need any special knowledge to connect and configure them, but there are also more elegant solutions. Today I will talk about the method of bypassing locks in Linux...
  15. Carding 4 Carders

    A selection of software for data encryption

    We present to your attention a selection of suitable software for data encryption. 1) Cryptainer - a free solution that allows you to create password-protected crypto containers for both secure storage of data in the operating system and for exchanging them via email. Download: here 2)...
  16. Carding 4 Carders

    We encrypt our calls

    Almost everyone wants their confidential data not to be exposed to the threat of leakage, and even banal, the feeling that you are constantly under the hood of some uncles behind wide doors is sometimes too burdensome. Therefore, there are many ways to encrypt your calls, which, if not 100%...
  17. Carding

    Lecture: Encryption

    Lecturer: crow [00:05:13] <crow> All questions tomorrow at the end of the second part [00:08:44] <crow> Greetings to all at this lecture today, I would like to discuss the pressing issues that many people get stuck in their heads. [00:09:17] <crow> Since this lecture is an introductory...
  18. Carding

    Encryption

    What Is Encryption? Encryption is a means of securing digital data using an algorithm and a password—also called a key. The encryption process translates information using an algorithm that makes the original information unreadable; the process converts the original text, known as plaintext...
  19. Carding

    Credit Card Encryption

    What is Credit Card Encryption? Credit card encryption is a security measure used to reduce the likelihood of credit or debit card information being stolen. Credit card encryption involves both the security of the card, the security of the terminal where a card is scanned, and the security of...
  20. Rescator

    Drive Crypt Plus Pack - Full Disk Encryption

    Hello and welcome my fellow citizens! Allow me to introduce you the ultimate tutorial for unprecedented hard-drive security. DCPP proved to be one of the most reliable and secure programs ever used to by our society. Using current installation tutorial will guide you through basics that will...
Top