public marks

PUBLIC MARKS with tag encryption


NaCl: Networking and Cryptography library

by wabaus
NaCl (pronounced "salt") is a new easy-to-use high-speed software library for network communication, encryption, decryption, signatures, etc. NaCl's goal is to provide all of the core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations. NaCl advances the state of the art by improving security, by improving usability, and by improving speed.

Privacy Tools

by wabaus & 2 others
Tools for privacy on devices & across the Internet.


Own-Mailbox, the first 100% confidential Mailbox.

by ghis & 1 other (via)
You can create 100% self-hosted mailboxes. Own-Mailbox allows you to easily send and receive confidential emails with an already existing email address, from any computer in the world. Strong private key encryption with Gnu Privacy Guard. Private Link Message method, allows you to send a private message even to people who don't use encryption, by sending them a temporary and filtered HTTPS link. Private Folder: make your most private data accessible only from home, not from Internet. Easy access to logs, so you can check no one is accessing your emails without your consent. Integrated Framasoft services, to provide you with private large file sharing, event scheduling, shared spreadsheet and documents. Optional P2P backup, so even if your Own-Mailbox is offline temporarily you don't lose any email from your self-hosted addresses as long as you maintain 70% up ratio. If you cannot plug your Own-Mailbox to a stable Internet Connection anymore, plug it in mini-usb to your computer, access your old and new emails with our recovery software. 16GB storage, possibility to extend memory or do backup via USB drive/HDD. Very low power.

Vault by HashiCorp

by ghis (via)
Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Vault presents a unified API to access multiple backends: HSMs, AWS IAM, SQL databases, raw key/value, and more.


by ghis
For years we’ve trusted the postman to deliver our mail without reading it. Why should this be different for email?
 Soverin is the honest email service that doesn’t sell your data.



Five Best VPN Tools - Vpn - Lifehacker

by ghis
VPN software lets you join private networks as though you're sitting at a local computer on that network, giving you access to shared folders and tons more handy stuff. Here's a look at five of the most popular VPN tools.


jCryption - JavaScript data encryption

by dzc & 1 other
javascript HTML-Form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form.


TrueCrypt - drive and file encryption

by wabaus & 34 others
Super secure drive and file encryption for Windows/Mac/Linux

Cold Boot Attacks on Encryption Keys - Center for information technology policy

by rike_
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.

Jasypt 1.4 released: encrypt your configuration files - Spring Framework Support Forums

by ddelangle (via)
Jasypt 1.4 has been released. Jasypt (Java Simplified Encryption) [] is a library aimed at providing developers a simple way to add encryption capabilities to their projects including: password digesting, text/binary encryption, Hibernate transparent encryption and Spring Security (ACEGI) integration.


JCMatt software -- File Buddy

by jdrsantos
File Waster (Formerly File Buddy) Protects your files from prying eyes with the most secure encryption technology available today.

PUBLIC TAGS related to tag encryption

***to-read*** +   administration +   applets and demos +   backup +   bsd +   certificate +   crypto +   cryptography +   disk +   download +   efs +   email +   file +   filesystem +   firefox +   free +   freeware +   gpg +   hacking +   howto +   javascript +   lang:en +   linux +   management +   my-install-notes +   ntfs +   online +   open-source +   opensource +   osx +   p2p +   password +   pgp +   php +   privacy +   rsa +   securite +   security +   security old +   sécurité +   software +   ssl +   storage +   tools +   tutorial +   ubuntu +   web +   web2.0 +   windows +   xml +  

Active users

last mark : 16/03/2017 20:16

last mark : 28/10/2015 15:24

last mark : 08/07/2015 21:59

last mark : 10/11/2010 15:29

last mark : 04/01/2010 23:19

last mark : 09/12/2009 11:36

last mark : 28/08/2009 13:18

last mark : 17/08/2009 07:19

last mark : 07/03/2008 19:48

last mark : 01/02/2008 13:42

last mark : 31/07/2007 06:57

last mark : 06/06/2007 06:55