4We have recently learned about how the NSA and GCHQ have been spying on their own people and on everyone else, and I think that may make one or two people just a bit queasy. So I want to explore a little of what we can do to preserve our privacy and secure our systems. But I need to make a disclaimer: I am not a security expert by any means. My role is more that of someone who can learn some simple things and pass them on in what I hope is an understandable manner. I do hope to give you some resources to guide you if you want to dive a little deeper into this. So with that disclaimer, let’s go.
- Why Do We Need Privacy, And Isn’t It A Waste Of Time Anyway?
- Encryption Basics
- Generating Keys on the Command Line
- Creating a Key Pair – GUI Client
- Encryption and Email with Thunderbird
- Encryption and Gmail
- Key Signing
- WASHLUG 20140515 GPG and E-mail
- TrueCrypt, Heartbleed, and Lessons Learned
- Encrypting E-mail on Android; Importing Keys
- Sensible Security: The Schneier Model
- Hashing and Password Security
- Passwords, Entropy, and Good Password Practices
- Symmetric vs. Asymmetric Encryption
- Digital Signatures and Certificates
- TSL/SSL Certificate Issues and Solutions