Jump to content

Search the Community

Showing results for tags 'encryption'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 24 results

  1. The RIAA and other music groups recently accused youtube-dl and related stream-ripping tools of circumventing YouTube's 'rolling cipher' protection. While that may sound complex, anyone can download full audio and video files from YouTube, using nothing more than a web browser. It's surprisingly easy and we failed to spot any ciphers. Downloading audio and video from YouTube is generally not allowed, as the video service clearly states in its terms of service. Despite this restriction, there are numerous ‘stream-ripping’ tools available on t
  2. Senator Wyden puts surveillance nerve-center on blast It's said the NSA drew up a report on what it learned after a foreign government exploited a weak encryption scheme, championed by the US spying agency, in Juniper firewall software. However, curiously enough, the NSA has been unable to find a copy of that report. On Wednesday, Reuters reporter Joseph Menn published an account of US Senator Ron Wyden's efforts to determine whether the NSA is still in the business of placing backdoors in US technology products. Wyden (D-OR) opposes such e
  3. This article has been updated with a comment from Facebook. The governments of seven countries are calling on Facebook and other tech firms to do the technically impossible - to weaken encryption by giving law enforcement access to messages, whilst not reducing user safety. The governments of the U.S., U.K., Australia, New Zealand, Canada, India and Japan have issued the joint statement which pleads with Facebook specifically, as well as other tech firms, to drop “end-to-end encryption policies which erode the public’s safety online”. The govern
  4. The FBI will be able to snoop on your free Zoom calls, unless you pay for the company’s premium service, which offers end-to-end encryption. In brief Zoom is building end-to-end encryption for its video calls, but only for its premium users. The decision to keep free calls encrypted was in order to comply with the FBI. Zoom may allow users to verify their ID to get access to such encryption in the future. Communications company Zoom has no intentions of adding end-to-end encryption to Zoom calls for its free users, in
  5. source Flaws in Popular SSD Drives Bypass Hardware Disk Encryption By Lawrence Abrams November 5, 2018 01:56 PM 8 Researchers have found flaws that can be exploited to bypass hardware decryption without a password in well known and popular SSD drives. In a new report titled "Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)", researchers Carlo Meijer and Bernard van Gastel from Radboud University explain how they were able to to
  6. Yahoo plans to enable end-to-end encryption for all of its Mail users next year. The company is working with Google on the project and the encryption will be mostly transparent for users, making it as simple as possible to use. Alex Stamos, CISO at Yahoo, said that the project has been a priority since he joined the company a few months ago and will be a key way to make online life safer for millions of users. Yahoo is using the browser plugin Google released in June that enables end-to-end encryption of all data leaving the browser. Stamos said Yahoo is working to ensure that its system works
  7. By Edward Snowden In every country of the world, the security of computers keeps the lights on, the shelves stocked, the dams closed, and transportation running. For more than half a decade, the vulnerability of our computers and computer networks has been ranked the number one risk in the US Intelligence Community’s Worldwide Threat Assessment – that’s higher than terrorism, higher than war. Your bank balance, the local hospital’s equipment, and the 2020 US presidential election, among many, many other things, all depend on computer safety. And yet, in the
  8. Encryption Software (free upload to 20 MB file), encrypt file using from password (ASCII) or without password 'Same PC'. Using 'Same PC' there is no password needed but the file can decrypted from same computer only. Download: https://www.microsoft.com/en-us/p/encryption-software/9p9v2m2pdm92?activetab=pivot:overviewtab Website:; http://www.softcleaner.in/soft-cleaner-safe Version: 108.31.2019.11 License: Free
  9. PastJeff

    NordLocker giveaway on Twitter

    Homepage: https://nordlocker.com/download/ Available on Windows and MacOS.
  10. The common belief that encryption enables bad behavior primarily used by thieves, international terrorists, and other villainous characters is simply not true. Here's why. Encryption engenders passionate opinions and reactions from a variety of government regulators, technologists, and privacy and security advocates. It's become the de facto standard of online commerce and communication, embraced by technocrats and security pros everywhere. Conversely, some governments routinely seek to destabilize encryption through legislation, regulation, or dictatorial
  11. NEW YORK (AP) — U.S. Attorney General Bill Barr said Tuesday that increased encryption of data on phones and computers and encrypted messaging apps are putting American security at risk. Barr’s comments at a cybersecurity conference mark a continuing effort by the Justice Department to push tech companies to provide law enforcement with access to encrypted devices and applications during investigations. “There have been enough dogmatic pronouncements that lawful access simply cannot be done,” Barr said. “It can be, and it must be.” The attorney
  12. Last week, Attorney General William Barr and FBI Director Christopher Wray chose to spend some of their time giving speeches demonizing encryption and calling for the creation of backdoors to allow the government access to encrypted data. You should not spend any of your time listening to them. Don’t be mistaken; the threat to encryption remains high. Australia and the United Kingdom already have laws in place that can enable those governments to undermine encryption, while other countries may follow. And it’s definitely dangerous when senior U.S. law enforcement offi
  13. There’s a story in the Washington Post “Cybersecurity 202” newsletter that confirms that the Department of Justice is capitalizing on the techlash in order to build up congressional support for the DOJ’s long-desired goal of legislation that will restrict your freedom to encrypt your data and communications. The Post reports that, according to assistant attorney general for national security John Demers, the DOJ has given up hope that tech companies will “voluntarily” backdoor their own encryption, as the agency had been pressing them to do since around 2016. Instead, the DOJ is
  14. To comply with new laws \ Last month, Apple announced that it would hand over management of its Chinese iCloud data to a local, state-owned firm in China called Cloud Big Data Industrial Development Co (GCBD) at the end of February in order to comply with new laws. Now, Reuters is reporting that Apple will also hold iCloud encryption keys for Chinese users in China itself, raising new concerns about government access. The new policy does not affect any iCloud users outside of China. As Reuters notes, that compliance means Chinese authorities will ha
  15. Lifetime licence for Kryptel 8.0 Kryptel is an encryption tool that provides fast, reliable, and failure-resistant protection of sensitive data using industry standard AES 256-bit encryption. Easy-to-use drag-and-drop interface combined with advanced encryption technologies makes military-strength data protection affordable for everyone. Other features of Kryptel include encrypted backups, secure file deletion (shredding), data compression, batch encryption capabilities, and integration into Windows’ right-click context menu. It even comes in a portable version you can run on
  16. Researchers believe a new encryption technique may be key to maintaining a balance between user privacy and government demands. For governments worldwide, encryption is a thorn in the side in the quest for surveillance, cracking suspected criminal phones, and monitoring communication. Officials are applying pressure on technology firms and app developers which provide end-to-end encryption services provide a way for police forces to break encryption. However, the moment you provide a backdoor into such services, you are creating a weak point that
  17. Dino8

    Gpg4win 3.11

    What is Gpg4win? Gpg4win enables users to securely transport emails and files with the help of encryption and digital signatures. Encryption protects the contents against an unwanted party reading it. Digital signatures make sure that it was not modified and comes from a specific sender. Gpg4win supports both relevant cryptography standards, OpenPGP and S/MIME (X.509), and is the official GnuPG distribution for Windows. It is maintained by the developers of GnuPG. Gpg4win and the software included with Gpg4win are Free Software (Open Source; among other things free of charge for all c
  18. I noticed that even though I put HTTPS in my URL-bar, whenever I click a link nsaneforums would force HTTP_ again. Now everyone should only post when HTTPS is on for security reasons, else "they" know your username and what you posted. There are many browser addons that force HTTPS to be on, however the EFF approved HTTPS Everywhere is the most popular one. Sadly by default it doesn't recognize nsaneforums, so here is how to add a new rule: When you do this you always will use HTTPS on nsaneforums, protect your username and make your
  19. If you want to secure the data on your computer, one of the most important steps you can take is encrypting its hard drive. That way, if your laptop gets lost or stolen—or someone can get to it when you're not around—everything remains protected and inaccessible. But researchers at the security firm F-Secure have uncovered an attack that uses a decade-old technique, which defenders thought they had stymied, to expose those encryption keys, allowing a hacker to decrypt your data. Worst of all, it works on almost any computer. To get the keys, the attack uses a well-known approach ca
  20. from the with-an-eye-on-undermining-all-encrypted-messaging-services dept The DOJ's war on encryption continues, this time in a secret court battle involving Facebook. The case is under seal so no documents are available, but Reuters has obtained details suggesting the government is trying to compel the production of encryption-breaking software. The request seeks Facebook's assistance in tapping calls placed through its Messenger service. Facebook has refused, stating it simply cannot do this without stripping the protection it
  21. Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost and stolen – from threats both virtual and physical. On top of pains from unwanted access to sensitive information, penalties have become more severe and more frequent for non-compliance with regulations on financial, medical and personal data. No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leak
  22. [Poster Comment: Personally I don't understand why they would need encryption since they had no protection in the age of film, which could be and was confiscated or destroyed and could be stolen. Just because the medium has changed there doesn't need to be an expensive system put in place that would cost everyone more, not just the professional photographers. And their cards could still be stolen.] A year after photojournalists and filmmakers sent a critical letter to camera makers for failing to add a basic security feature to protect their work from searches and hacking, little
  23. malakai1911

    Comprehensive Security Guide

    Comprehensive Security Guide NOTE: As of 1/1/2019 this guide is out of date. Until parts are rewritten, consider the below for historical reference only. i. Foreword The primary purpose of this guide is to offer a concise list of best-of-breed software and advice on selected areas of computer security. The secondary purpose of this guide is to offer limited advice on other areas of security. The target audience is an intermediately skilled user of home computers. Computer software listed are the freeware versions when possible or have free versions av
  24. Though Encryption is not a new topic, you might have heard it online, while doing purchases, etc. Whats App messages are protected with end-to-end encryption. Your credit card details, id& password, payment information are transferred over an encrypted network. You might have already read these things on various sites and services. So, every time you read about or heard of encryption, what was the first thing that came to your mind? Most of the people would think that encryption is complex, has something to do with security and only computer programmers or geeks can understand
×
×
  • Create New...