public marks

PUBLIC MARKS with tag encryption

This year

NaCl: Networking and Cryptography library

by wabaus
NaCl (pronounced "salt") is a new easy-to-use high-speed software library for network communication, encryption, decryption, signatures, etc. NaCl's goal is to provide all of the core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations. NaCl advances the state of the art by improving security, by improving usability, and by improving speed.

Privacy Tools

by wabaus & 2 others
Tools for privacy on devices & across the Internet.

2015

Own-Mailbox, the first 100% confidential Mailbox.

by ghis & 1 other (via)
You can create 100% self-hosted mailboxes. Own-Mailbox allows you to easily send and receive confidential emails with an already existing email address, from any computer in the world. Strong private key encryption with Gnu Privacy Guard. Private Link Message method, allows you to send a private message even to people who don't use encryption, by sending them a temporary and filtered HTTPS link. Private Folder: make your most private data accessible only from home, not from Internet. Easy access to logs, so you can check no one is accessing your emails without your consent. Integrated Framasoft services, to provide you with private large file sharing, event scheduling, shared spreadsheet and documents. Optional P2P backup, so even if your Own-Mailbox is offline temporarily you don't lose any email from your self-hosted addresses as long as you maintain 70% up ratio. If you cannot plug your Own-Mailbox to a stable Internet Connection anymore, plug it in mini-usb to your computer, access your old and new emails with our recovery software. 16GB storage, possibility to extend memory or do backup via USB drive/HDD. Very low power.

Vault by HashiCorp

by ghis (via)
Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Vault presents a unified API to access multiple backends: HSMs, AWS IAM, SQL databases, raw key/value, and more.

Soverin

by ghis
For years we’ve trusted the postman to deliver our mail without reading it. Why should this be different for email?
 Soverin is the honest email service that doesn’t sell your data.

2014

2010

Five Best VPN Tools - Vpn - Lifehacker

by ghis
VPN software lets you join private networks as though you're sitting at a local computer on that network, giving you access to shared folders and tons more handy stuff. Here's a look at five of the most popular VPN tools.

2009

jCryption - JavaScript data encryption

by dzc & 1 other
javascript HTML-Form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form.

2008

TrueCrypt - drive and file encryption

by wabaus & 34 others
Super secure drive and file encryption for Windows/Mac/Linux

Cold Boot Attacks on Encryption Keys - Center for information technology policy

by rike_
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.

Jasypt 1.4 released: encrypt your configuration files - Spring Framework Support Forums

by ddelangle (via)
Jasypt 1.4 has been released. Jasypt (Java Simplified Encryption) [http://www.jasypt.org] is a library aimed at providing developers a simple way to add encryption capabilities to their projects including: password digesting, text/binary encryption, Hibernate transparent encryption and Spring Security (ACEGI) integration.

2007

JCMatt software -- File Buddy

by jdrsantos
File Waster (Formerly File Buddy) Protects your files from prying eyes with the most secure encryption technology available today.

PUBLIC TAGS related to tag encryption

***to-read*** +   administration +   applets and demos +   backup +   bsd +   certificate +   crypto +   cryptography +   disk +   download +   efs +   email +   file +   filesystem +   firefox +   free +   freeware +   gpg +   hacking +   howto +   javascript +   lang:en +   linux +   management +   my-install-notes +   ntfs +   online +   open-source +   opensource +   osx +   p2p +   password +   pgp +   php +   privacy +   rsa +   securite +   security +   security old +   sécurité +   software +   ssl +   storage +   tools +   tutorial +   ubuntu +   web +   web2.0 +   windows +   xml +  

Active users

wabaus
last mark : 16/03/2017 20:16

84GHz
last mark : 28/10/2015 15:24

ghis
last mark : 08/07/2015 21:59

kemar
last mark : 10/11/2010 15:29

piouPiouM
last mark : 04/01/2010 23:19

webs
last mark : 09/12/2009 11:36

dzc
last mark : 28/08/2009 13:18

vrossign
last mark : 17/08/2009 07:19

rike_
last mark : 07/03/2008 19:48

ddelangle
last mark : 01/02/2008 13:42

jdrsantos
last mark : 31/07/2007 06:57

pyros
last mark : 06/06/2007 06:55