- Why Do We Need Privacy, And Isn’t It A Waste Of Time Anyway?
- Encryption Basics
- Generating Keys on the Command Line
- Creating a Key Pair – GUI Client
- Encryption and Email with Thunderbird
- Encryption and Gmail
- Key Signing
- WASHLUG 20140515 GPG and E-mail
- TrueCrypt, Heartbleed, and Lessons Learned
- Encrypting E-mail on Android; Importing Keys
- Sensible Security: The Schneier Model
- Hashing and Password Security
- Passwords, Entropy, and Good Password Practices
- Symmetric vs. Asymmetric Encryption
- Digital Signatures and Certificates
- Certificate Issues and Solutions
- TrueCrypt and GnuPG – An Update
- LastPass Hacked – What Does It Mean?
- ssh Introduction
- Home SSH Server
- SSH Basics
- SSH Authentication – Keys
- WASHLUG Talk on LastPass
- SSL Certificates – How They Work
- SSL Certificates – Problems
- Diffie-Hellman-Merkle Key Exchange
- Diffie-Hellman and Forward Secrecy
- TLS 1.3
- CERT Home Security Tips
- NIST Cybersecurity Framework
- Encryption and Quantum Computing
- NotPetya and Maersk: An Object Lesson
- Firefox Update
- NIST’s Quantum Cryptography Update
- LastPass Security Dashboard
- Linux Under Attack
Security and Privacy
Linux Under Attack
There is no such thing as software without vulnerabilities, so it follows that Linux, while in some ways more secure than alternatives like windows, is nonetheless vulnerable to attack. Until recently Linux was to some degree protected by “Security Through Obscurity”, which is to say that as a fringe OS it was not worth investing …