Many people think of security and privacy as two different concepts, which is true, but many times when referring to the internet they go hand in hand. When a lot of people talk about their privacy on the internet they also are referring to security, or vice versa. Security Security has been a concern ever since the Stone Ages. The only difference is that we now have the internet to take into account. Security on the internet is a hard problem to solve primarily because the internet protocol suite (TCP/IP) was not built with security in mind. Back in
Information Technology, IT Security, and Preston Hood. Advanced Research Projects Agency Network, ARPANET, Cryptography, Encryption, Internet, Privacy, Privacy by Design, Privacy by Policy, Security, and TCP/IP.
If you have never heard of the term “cryptocurrencies” then please read my other article Cryptocurrencies A Possible Alternative to Traditional Banking before you read this one. Why Cryptocurrencies Are Critical To Our Freedom Cryptocurrencies bring a simple choice to people today and that is the choice to be in control of your money or for a bank to be in control. At this point in time I don’t think Bitcoin and other cryptocurrencies are at the point where everyone should go out and invest all of their money into, that would be foolish, but that does not mean
Information Technology, IT Security, and Preston Hood. Anonymity Networks, Bitcoin, Bitcoins, BitTorrent, Cryptocurrencies, Cryptography, Five Eyes, FVEY, Governments, and Tor.
If you have never heard of the term “cryptocurrency” let me break it down for you. In this case the word “crypto” is used as a reference to Cryptography which involves the use of mathematics, computer science, and electrical engineering to secure data. And as you should know the word “currency” usually refers to money as a medium of exchange. When you put the two together it means currencies that use Cryptography to secure the transactions and to control the creation of new units. What Cryptocurrencies Are In the most basic definition cryptocurrencies are currencies that use Cryptography to
Information Technology, IT Security, and Preston Hood. Bitcoin, Bitcoin Mining, Bitcoins, Cryptocurrencies, Cryptocurrency, Cryptography, Digital Signatures, Dogecoin, Hashing Algorithms, Litecoin, Mastercoin, MazaCoin, miners, Mining, Namecoin, Private Keys, Public Keys, scrypt, SHA-256, and Transaction Block Chains.
Some of you might have heard about an attack called a cold boot attack. This attack is a side channel attack that is performed by stealing the encryption keys out of a systems DRAM and/or SRAM that has an encrypted hard drive. How It Works A cold boot attacks are pretty simple to preform, but for the group of people who figured it out, it was no walk in the park. The reason cold boot attacks work is because usually none of the information that is stored in your RAM is encrypted and therefore the attackers are able to gain
Information Technology, IT Security, and Preston Hood. Bitlocker, Cold Boot Attack, Cryptography, dm-crypt, DRAM, Encryption, File Vault, RAM, SRAM, and TrueCrypt.
As some of you might have heard the 10 year old on-the-fly encryption (OTFE) software TrueCrypt was discontinued on May 28, 2014 by its anonymous developers. On May 28th of 2014 TrueCrypt’s website started forwarding visitors to sourceforge.net, which is a source code repository for free and open source software. Apparently the TrueCrypt developers discontinued this software project because of Microsoft ending support for Windows XP, and because the new OS’s already have built in encryption options. The TrueCrypt developers are recommending that you migrate your data that is encrypted by TrueCrypt to “virtual disk images supported on your platform”.
As you may have heard there are many different security agencies and people trying to spy on our every move. Luckily there is still hope for our society. We need to use VERY strong mathematics (cryptography) to put an end to mass surveillance at least at the network level. We can use tools such as the Onion router (Tor), I2P, and Freenet for avoiding someone monitoring your upstream and to provide end-to-end encryption (as long as you don’t exit the Tor network). We also need to use tools such as PGP and OTR messaging to protect our communications that might
Information Technology, IT Security, and Preston Hood. AT&T, Cryptography, Five Eyes, Freenet, FVEY, GCHQ, I2P, iPhones, NSA, OTR Messaging, PGP, RedPhone, Security, Tails, TextSecure, Tor, Whistleblowers, and WikiLeaks.