Tag Archives: encryption

How To Use VeraCrypt On Linux by https://is.gd/HFNBWZ

For years, TrueCrypt was the encryption tool of choice for Linux users. It worked well, and it did everything you could ever want. Then one day, the project was discontinued. Ever since then, Linux users have been scrambling to find an encryption tool that works as well.

For most, the best tool to use is VeraCrypt. The main reason that VeraCrypt stands out from the rest of the new encryption tools is that it is a “fork” from the old TrueCrypt code. This means if you’ve used TrueCrypt for years but want something that is actively maintained, you can install VeraCrypt on Linux and everything will continue to work.

from https://is.gd/HFNBWZ

Selected by Galigio via Computer Borders

Could Privacy Law Limitations kill the Internet Dream?

Is Privacy a fundamental human right? Your personal answer to this question is the starting point to think about the current Internet legislation and to evaluate if the recent legal restrictions on civil rights could represent the “end of the Internet Dream.” A clear and motivated opinion about this issue is a strategic keypoint for all those people who, as me, operate everyday in one of the many Internet branches as consultants, lawyers, programmers, marketing experts, investors or, more often, as common users.

Dan Gillmor, via BACKCHANNEL, has recently underlined that a liberal legislation should not restrict end to end encryption, because it represents the best safeguards for tomorrow’s freedom. A standard use of fragile encryption, imposed by Law, will not only interfere with privacy, but will also heavily tamper with Internet global security.

o-INTERNET-PRIVACY-facebook

Image by quotesgram.com

On the other hand, Dan Patterson, via TECHREPUBLIC, has reported two different conversations with UN reporters who affirmed that strong encryption allows privacy and privacy is the corner stone of truth, especially for reporters, because it helps to “validate the veracity of information.”

Consequently, to preserve our privacy in our daily living it would be useful to:

  • Use Privilege VPN or  HTTPS connections when you surf Internet;
  • Use Encrypted Storage for your data, especially if you cannot avoid using cloud-based services;
  • Watch the Legislator: contact the MP/Politician who represents you and express your point of view, each time a restrictive Law proposal is under discussion.

As Citizens, the real challenge we have for the next months is represented by the influence we will be able to exercise on new Laws that should find a legal equilibrium between anti-terrorism surveillance and the need of protecting citizen’s personal information allowing the use of VPN/HTTPS connections and Encrypted Storage.

Link

Why the fear over ubiquitous data encryption is overblown

Link

Post-Quantum Encryption No Longer A Laughing Matter

I2P a real versatile anonymizing network for Linux and Windows

This week for our Freeware Page, we tested I2P a freeware which let you to surf internet without revealing your IP and encrypt your data. As described on the I2P Homepage, this freeware is a “anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties”. During out test we used bothXP and Ubuntu because I2P is a java file even is it seems to be a exe file and it could be used on all the Linux OS. On Windows XP it is very simple to use I2P but at the beginning it is really slow and for this reason we suggest to keep it run for about twelve hours because this freeware needs to build its own network and for this it takes some hours. When ready you have to setup all the software you want to filter through it. For this reason, we setted Firefox (Preferences-> Advanced -> Network -> Settings) Manual Proxy Configuration to HTTP Proxy as localhost, port 4444. Then we put a tick on “Use this proxy server for all protocols” and we finished indicating “No proxy for” as localhost, 127.0.0.1. After some seconds we discovered that our IP was now in the northern part of the France (far away from our real location). To setup I2P it is necessary to point Firefox on http://localhost:7657/index.jsp because, by default, I2P tries to launch Internet Explorer also when it works on Linux. After a week of tests we can say that I2P is a little bit slower than TOR but it can easily be integrated on your browser, mail client, chat and others programs. For our (limited) experience I2P is the most complete anonymizing network we know. To conclude, as already discussed also on this post none or nothing can create a perfectly anonymous software but I2P can help to better improve our privacy. Recommended! AddThis mp3 link