luks_07

How to manage disk encryption passphrases and key slots

Disk encryption is one method you may use to enhance the physical security rating of your computer. From my experience, it is rarely used, which is a shame because it is one of the most effective safeguards against unauthorized physical access to data stored on a computer. Disk encryption, which can be full disk, or per partition, may be configured during or after installation, but the most effective is full disk during installation. The following Linux distributions listed on this website, have support for configuring full disk encryption during installation: When disk encryption is enabled on any of these distributions, the installer will prompt you for a passphrase which will be used to lock or encrypt the disk. The image below was taken during an installation of Fedora 13. ...
Android

How Android Security Stacks Up

AndroidToday's smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago. Because of this, they're a treasure trove of personal information--and likely the next battleground for computer security. What makes smart phones attractive--the ability to customize them by downloading applications--is what makes them dangerous. Apps make the mobile phone a real computer, and Apple's App Store has been a key factor in the phone's success. But apps also make smart phones a target for cyber criminals. ...
Artificial Intelligence

Scientist Invents a Digital Security Tool Good Enough for the CIA — And for You

A British computer hacker equipped with a "Dummies" guide recently tapped into the Pentagon. As hackers get smarter, computers get more powerful and national security is put at risk. The same goes for your own personal and financial information transmitted by phone, on the Internet or through bank machines. Now a new invention developed by Dr. Jacob Scheuer of Tel Aviv University's School of Electrical Engineering promises an information security system that can beat today's hackers -- and the hackers of the future -- with existing fiber optic and computer technology. Transmitting binary lock-and-key information in the form of light pulses, his device ensures that a shared key code can be unlocked by the sender and receiver, and absolutely nobody else. He will present his new findings to peers at the next laser and electro-optics conference this May at the Conference for Lasers and Electro-Optics (CLEO) in San Jose, California. ...
Mozilla

Mozilla Debates Whether to Trust Chinese CA

FirefoxSometimes geeky technical details matter only to engineers. But sometimes a seemingly arcane technical decision exposes deep social or political divisions. A classic example is being debated within the Mozilla project now, as designers decide whether the Mozilla Firefox browser should trust a Chinese certification authority by default. Here's the technical background: When you browse to a secure website (typically at a URL starting with "https:"), your browser takes two special security precautions: it sets up a private, encrypted "channel" to the server, and it authenticates the server's identity. The second step, authentication, is necessary because a secure channel is useless if you don't know who is on the other end. Without authentication, you might be talking to an impostor. ...