Pages: 1 2 ...3 ... 5 ...7 ...8 9 10 11 12 ... 14

  2014-09-06

Book review: "No place to hide" by Glenn Greenwald

  21:14, by Hagai Bar-El   , 411 words
Categories: Sources
I just finished reading the book "No Place to Hide", by the journalist Glenn Greenwald. The book talks about the revelations from Edward Snowden on the actions taken by the NSA, as well as about their implications. more »

  2014-09-05

Capturing PINs using an IR camera

  16:40, by Hagai Bar-El   , 97 words
Categories: Security
This video demonstrates how an IR camera, of the type that can be bought for a reasonable price and attached to a smart-phone, can be used to capture a PIN that was previously entered on a PIN pad, by analyzing a thermal image of the pad after the fact.… more »

  2014-08-19

Protecting network neutrality: both important and hard

  06:14, by Hagai Bar-El   , 2362 words
Categories: Security Policies
The term "network neutrality" is mentioned very often lately. Here is my take of what network neutrality is, and on why it is difficult to regulate and enforce. more »

  2014-07-24

TrueCrypt alternatives?

  22:23, by Hagai Bar-El   , 660 words
Categories: IT Security, Products
It has been a while since the announcement on the demise of TrueCrypt, and a solution for all those people that grew used to relying on it, in the shape of a complete replacement is not yet evident. more »

  2014-05-30

The status of TrueCrypt

  07:40, by Hagai Bar-El   , 564 words
Categories: IT Security, Products
I wish I had known where TrueCrypt stands now, but I don't. I follow TrueCrypt and regularly endorse it  ever since I discovered it and wrote this post nine years ago. TrueCrypt was, and may still be, the most sensible and presumably-secure volume and… more »

  2014-04-09

OpenSSL "Heartbleed" bug: what's at risk on the server and what is not

  22:56, by Hagai Bar-El   , 1223 words
Categories: IT Security, Cyber Security, Counter-media
A few days ago, a critical bug was found in the common OpenSSL library. OpenSSL is the library that implements the common SSL and TLS security protocols. These two (similar) protocols facilitate the encrypted tunnel feature that secure services -- over… more »

  2014-04-03

Bitcoin does not provide anonymity

  22:22, by Hagai Bar-El   , 762 words
Categories: Security Engineering, Security Policies, Security, Counter-media
When people discuss Bitcoin, one of its properties that is often considered is its presumable anonymity. In this respect, it is often compared to cash. However, it shall be recognized and understood that Bitcoin is not as anonymous as cash; far from it,… more »

1 2 ...3 ... 5 ...7 ...8 9 10 11 12 ... 14