All posts tagged encryption

TODO - tested and working, though my most recent Lubuntu experimentation has problems I'm still troubleshooting.

At best, my computer hangs when prompting for a password. I think this is related to the 4.4.14 kernel but have not confirmed this.

Projects >


These instructions are a lot easier than they seem, and a smart and patient beginner will be able to follow them!

  • These notes were made from instructions from Slackware "current", as of 2016-11-05, and have been tested on Slackware 14.2, and 14.2 32bit.
  • These notes were made on an everyday system with one hard drive which I completely formatted for this purpose.

    • If you are a new user, it is strongly recommended that you remove all hard drive's your using and do this on a spare unused/empty drive.
  • This concept and these notes build a full-disk Slackware installation which also uses LVM. You can safely ignore the entire LVM post and just follow this one.

Continue Reading

TODO - add additional notes

eCryptfs honey badger

encryption >

(on Wikipedia)

A cryptographic filesystem.

A fantastic concept and program which I used heavily for a long time across multiple Linux distributions.

  • Be aware that attacks on people, hardware and implementation are the go-to methods for defeating encryption. Some points:

    • A legal or physical threat, lies and other social engineering.
    • A hardware or software keylogger. Are you typing your password on a keyboard and computer you control?
  • eCryptfs-mount.sh is my helper script.

Continue Reading

Internet > Remote controlling software >

SSH being enabled is also known as having "shell access" enabled. It's generally considered a risk for various reasons, most notably because runaway processes can be an issue.

  • Secure Shell

Continue Reading

Tor logo

Software > Web browsers >
Internet security >

(on Wikipedia)

Tor can be thought of like a secure proxy.

I experimented with it during my research on Replacing Firefox.

UPDATE: Tor has been subverted for some time. I know when and how, with confirmation, but not by whom.

It must not be used for high-level security requirements (governmental, military, international) and probably even mid-level requirements (corporate, police). Little people using it as a proxy are fine.

Don't do anything illegal with it if you're within three degrees of a Bad Guy. So.. don't use it for anything illegal. Remember that PRISM records everything, so that, once flagged, you can be found retroactively guilty (even by association) for past internet usage.

Continue Reading