hardware

SSDs are weird

Posted on

They are weird in the way they write data, and even weirder in the way they delete information. In the good old days of striped magnetic recording, one could delete a file and rest assured its content was still there until overwritten at some (hopefully distant) moment in the future; not so on an SSD.

mobiles

Check Your Android VPN

Posted on

Granting permissions to apps takes a certain level of trust—trust that an app is honest about the parts of your phone’s hardware and operating system it has access to, and what it does with the data therein. Trust is especially crucial with VPN apps, the point of which is to obfuscate your mobile internet activity from unwanted […]

security

Security of Password Managers

Posted on

There’s new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage on the host computer. That is, does the password manager accidentally leave plain text copies of the password lying around memory? Don’t forget to read the Comments!

security

Password Managers: Under the Hood

Posted on

Password managers allow the storage and retrieval of sensitive information from an encrypted database. Users rely on them to provide better security guarantees against trivial exfiltration than alternative ways of storing passwords, such as an unsecured flat text file. In this paper we propose security guarantees password managers should offer and examine the underlying workings […]

privacy

What is private browsing?

Posted on

When you want to hide something that you do online, you use a private browsing mode like Incognito, Private Browsing, or InPrivate. However, do you know how private you are when you use this way of browsing the web? Can others still see what you are doing online? Also, do you know which browser is best at protecting […]

email

Secure Email Providers

Posted on

There have been numerous privacy scandals with large email providers over the past few years, prompting many to look for the best secure email that respects user privacy. Why switch to a secure email provider? With so many different types of users, there is no single “best secure email” service that will be the top […]

mobiles

Phone Hacking Fears and Facts

Posted on

The lack of security built into phone networks leaves callers vulnerable to snooping, but the growth of encrypted communications will help protect privacy. Apple’s ongoing standoff with the government over passcode-protected iPhones is still raising unprecedented alarms over smartphone security and privacy.  The good news: Although the SS7 system will indeed work for spying on […]

anonymity

The Evolution of Darknets

Posted on

To prevent the problems of customer binding, and losing business when darknet markets go down, merchants have begun to leave the specialized and centralized platforms and instead ventured to use widely accessible technology to build their own communications and operational back-ends. Instead of using websites on the darknet, merchants are now operating invite-only channels on […]

VPN

Illegal Websites

Posted on

Everything should have a starting point, and it all began with “Deep Web” and “Dark Web”.  Deep Web is something big that you can’t imagine, which is hidden in the dark side of the internet whose contents are not indexed by any standard search engines. According to the reports, only a 4% of the web is […]

software

Hashcat

Posted on

Hashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking. Think your 12 character passwords are still strong enough? One […]