Charming animated short on The Power of Privacy by Andrea James via ![]()
The Power of Privacy from Matthias Hoegg on Vimeo.
Listen on Narro
Confusion over what the dark web is shouldn’t be a barrier to defenders realizing the benefits of information gathered from these anonymous communities.
Listen on Narro
Confusion over what the dark web is shouldn’t be a barrier to defenders realizing the benefits of information gathered from these anonymous communities.
WordPress.com now lets you write and collaborate in Google Docs by Romain Dillet (@romaindillet) via ![]()

Image by techcrunch.com
First Impressions by me:
The first edition of this add-on is really basic but it works smoothly and I am sure that in the near future new features will be added and in few months we all use it very often. Not only to just write a simple “link” post as this one.
For example, I would like to have more features related to image managing, the possibility to insert Tags directly from Docs and other useful commands that I usually use (post format, excerpt, etc…). But… I know… it’s just the first version of the add-on…. And it is really better than the email publishing that I used till few months ago.
Listen on Narro
Spencer Kelly, presenter of the BBC’s Click technology programme, discusses Indian jugaad, South Korea’s jellyfish-hunting robots, and how self-driving cars are the future
Listen on Narro
Ten years of innovation, lesson No. 6: Yes, you can teach an old dog new tricks.
Are you looking for the safest version of Linux? The best for your tasks?
Ask yourself why do you seek a Linux operating system with high performance in terms of security and test one of those Linux OS proposed in the link above.
I think they are the best Linux distributions today …. or does anyone have any better suggestion? If so, please write a comment below! Thank you.
If you use TAILS you are certainly interested to better know HEADS because Heads isn’t simply another Linux distribution, it merges physical hardening of particular hardware platforms and flash protection attributes with a Linux boot loader in ROM as well as custom Coreboot firmware.
The key factor in Heads is represented by its steady monitoring of the boot process that allows detecting if the firmware has been changed by malware.
If this first check certifies that all is unchanged, heads uses the TPM as a hardware key to decrypt the hard disk.
The certified integrity checking of the root filesystem is really effective against exploits but it doesn’t secure the system against each possible attack but it is able to effectively divert many types of attacks against the boot process and physical equipment that have usually been ignored in conventional setups, hopefully increasing the issue beyond what most attackers are willing to spend.