Archive

Posts Tagged ‘encryption’

Jolla status report

January 26th, 2014 No comments

Jolla Logo After the excitement about the new GNU/Linux Sailfish OS phone Jolla and having tinkered around for a couple of days I come to the, – unfortunate, – conclusion, that the phone is not end-user ready (yet).

Although the OS offers an intuitive, fast and clever handling of the functions, many core functions are yet missing.

Watching the community reports and how desperate many are looking for a well working, nicely developed and secure smartphone, I hope that the Jolla team will come up with an update of the missing features soon.

TEEM EM TA MROFTALP NEVES

January 28th, 2011 No comments

Encryption bug in Apple Mail (… or feature?)

November 15th, 2010 1 comment

Hi Steve

When using s/mime encryption, which is nicely integrated in the users keychain, with IMAP configured accounts in mail.app, the app does not encrypt the mail and stores it (e.g. as draft) unencrypted on the server before it has been sent.

An attacker can either read the unencrypted mail, if he has access to the server (sysadmin), or in case the IMAP connection is unencrypted, read the unencrypted message on the nodes/routers.

Please fix this.

Take care & best, lx

Freedom activist security mesures

March 25th, 2008 No comments

The Washington Post” and “der Standard” have reported today, that chinese hackers have tried to break into tibetan activist organisations networks and computers to steal encryption keys. Encryption keys are used to sign and encrypt electronic messages like E-Mails. China operates the world’s largest and most restrictive “Firewall” to censor internet communication and obscure information. Further it is known that in China a certain hacker group called “Titan Rain”, that is most probably financed and supported by the chinese government has been attacking the Pentagon and the german “chancelor house. Many tibetan organisations and activists notice a higher amount on suspect trojans and viruses. But thanks to the operation of Free Software such as the GNU/Linux operation system and Free Sowftware applications, such as GnuPG for encryption and the Tor Project for anonymous internet, the damage has been kept low.

I urge tibetan activists, journalists and news reporters to use encryption technology to secure and assure internet communication. To bypass the chinese firewall (e.g. to access the internet from Lhasa) it is most advisable to use Tor or similar anonymiser software. (see my blog post from the 18th of march 2008).

Internet Censorship