Skeptical Looks at Cryptography
We cannot have cyber security without cryptography! Confidentiality requires encryption of the sensitive data. Integrity is important, hash functions let us detect inappropriate modification of data and system configurations. Authentication of users and hosts can be done in many ways, and the more secure methods involve hash functions, encryption, or some combination of the two. […]
How Not to be Jeremy Clarkson (At Least with Your Email)
You sent what you thought was an innocent email or tweet. Now you’re in trouble. How did this happen? How can you avoid it? How do you fix it? Here are the six rules you need to follow to keep your job. Right now, Jeremy Clarkson (one of the hosts of the world’s most widely view […]
Want Safe Cloud-Based E-Mail? I’m Avoiding Web Mail.
I was reminded of some cloud security issues recently while helping family restore their e-mail connectivity. Where they live, Frontier is pretty much the only practical choice for landline phones plus high-speed Internet. Their performance is quite good, and I have found them to have the most technically savvy customer service of any major provider […]
The Dark Mail Alliance is a Promising Cloud-Based Email Project
”We believe email is fundamentally broken in its current architecture.” That’s the CEO of Silent Circle, a former and hopefully future provider of secure cloud-based email, talking about the Dark Mail Alliance project that Silent Circle and Lavabit are working on. Lavabit suddenly shut down with little explanation and no warning in August. It became […]