Do You Use Encryption?

The launch of Mega is putting a big emphasis on encryption, but it’s not like that kind of security is anything new. It’s just a pain sometimes. Do you ever go out of your way to encrypt your files? Do you think it’s worth the effort? The risk of losing that password and being screwed? Do you have any urge to start? More »

Mega Uses Random Data From Your Mouse and Keyboard To Beef Up Its Already Insane Encryption (Updated)

Kim Dotcom’s newly launched Mega is determined not to get screwed over by the Feds the way MegaUpload did, and the trick is encryption, lots of encryption. Mega’s really going that extra mile too; it’s using your random mouse and keyboard data to strengthen your crypto keys. More »

How Mega’s Clever Encryption Will Protect You, But Mostly Kim Dotcom

Almost exactly one year ago, MegaUpload unexpectedly went down in flames. Now, Kim Dotcom’s new venture, plain old “Mega” is rising from the ashes, and we’ve taken you inside for a sneak peek. But things will be different this time. Why? Dotcom’s prepped this baby against all manner of attack, and its encryption is the first line of defense, for him and for you. More »

Chrome 25 extends encrypted search to everyone, not just signed-in users

Chrome users with something to hide have heretofore been required to sign in to Google to keep their omnibox searches hidden from prying eyes — but today’s Chrome 25 beta update changes that. Now all searches are automatically encrypted, whether you’re signed in or not. It’s certainly not the first browser to implement such a security feature — Firefox 14 switched to HTTPS for all searches last year — but it’s a welcome change all the same. With web voice recognition and security whitelists on the docket as well, the latest version of Chrome is setting up to be quite the must-have, especially for those who want to keep their Justin Bieber search results to themselves.

Filed under: ,

Comments

Source: Chromium Blog

How the Most Important Code of WWII Was Cracked

The breaking of the Enigma Code is one of the most interesting stories in the history of computing—but it’s not necessarily easy to get your head around. Fortunately, this video provides an amazingly straightforward explanation of how the code was cracked. More »

These Rugged, Encrypted Pocket Drives Keep Your Data Locked Up Safe

There are plenty of external drives floating around at CES, but Rocstor’s offer up a rugged casing and secure encryption in a surprisingly sleek package. More »

How Crypto Keys Can Be Stolen Across the Cloud

Most people are happy to give their neighbours a spare house key in case of emergencies, but you probably wouldn’t want to give them your digital passwords. Now security researchers have shown that you may not have a choice, at least when it comes to cloud computing. More »

Researchers Reveal Massive Encryption Faults in Android Apps Used by Millions

A team of computer science researchers have revealed that Android apps used by as many as 185 million people can expose online banking and social network credentials, as well as emails and IM content. More »

iTwin SecureBox adds hardware encryption to your Dropbox account

iTwin SecureBox adds hardware encryption to your Dropbox account

“The cloud,” you’ve probably heard about it by now. It’s this vast intangible place where you can put things. Things like emails and notes and files. But you’ve probably also heard about how vulnerable stuff in the cloud is and about how nefarious hackers can hijack your accounts to do terrible, terrible things with your data. Well, for the paranoid out there, iTwin is offering SecureBox, a hardware-based encryption system that can sync up with your Dropbox account. After plugging in your iTwin key you’ll be presented with the SecureBox folder — simply drag and drop your files there and they’ll be encrypted and uploaded. To view them again you’ll need one half of the iTwin and the AES 256-bit encryption key it contains. If you’re looking for even more security you can add an optional password, adding two-factor authentication to your SecureBox, which already lives behind DropBox’s own two-factor authentication system. You can pick up an iTwin yourself at the source for $99 or download the feature as a software update if you already have the prerequisite USB key.

Continue reading iTwin SecureBox adds hardware encryption to your Dropbox account

Filed under: , ,

iTwin SecureBox adds hardware encryption to your Dropbox account originally appeared on Engadget on Tue, 16 Oct 2012 11:49:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceiTwin  | Email this | Comments

FCC to allow encryption of basic cable, with a few strings that Boxee approves of

Boxee box

As you might expect, the cable industry has been taking measures to protect its business by asking the FCC to allow encryption of basic cable — something that has never been done and that many have rightly opposed. The FCC responded by releasing new rules on Friday and while cable operators will be able allowed to encrypt all their channels, it isn’t without a few strings. The Boxee blog voiced its approval of those strings, which basically amounts to a requirement that when an operator encrypts, it also needs to make basic channels accessible via IP — with or without some hardware in your home — so that Boxee and others can still tune in. The other, less interesting stipulation, is that you might be entitled to at least one free set-top box or CableCARD for up to five years, depending on what package you subscribe to or if you are on Medicaid. The free hardware will only be for existing customers who apply within four months of when your provider rolls out the basic cable encryption. The real loser here are those few who actually use the Clear-QAM tuner in their TV, or perhaps those that use HTPC software that’ll never get an update.

Filed under: ,

FCC to allow encryption of basic cable, with a few strings that Boxee approves of originally appeared on Engadget on Sun, 14 Oct 2012 18:14:00 EDT. Please see our terms for use of feeds.

Permalink Boxee  |  sourceFCC Report and Order (PDF)  | Email this | Comments