How to install Tor on Debian and Ubuntu
A quick guide on how to install Tor from the official Tor Project repositories.
A quick guide on how to install Tor from the official Tor Project repositories.
Harden the security of your LXC containers by mapping the container's root user to nobody on the host!
Synology made a brain-dead decision that undermines privilege separation, a fundamental concept in IT security.
Do not use Apple's "Hide My Email" together with ProtonMail, or your real address can leak.
Why you shouldn't use SKS, and what to use instead.
A guide to easily prevent ZFS leaks.
In today's article, I'd like to talk about the pros and cons of sideloading, playing devil's advocate, offering a counter-argument and finally a possible solution to allow it in a secure fashion. Craig Federighi, Apple's current Senior Vice President of Software Engineering said in the Web Summit 2021: "Sideloading is [...]
Apple just released iOS 14.8, which comes as a surprise considering we're expecting iOS 15 any day now. Since iOS 6, Apple released every new version of iOS in mid-September, and we expect no different this year. So, why release iOS 14.8 on September 13th? What's even more interesting is, [...]
If you read my previous blog post about an undocumented ProtonMail feature, and how I've been receiving spam, well, then you know that I've been receiving spam from the same attacker. The spammers are including a nefarious link, as one would expect. But here's the interesting part: They're using the [...]
I had some thoughts about password hashing and password strength, and would like to share those with you. First we'll look into hashing and then into the topic of commonly used passwords, password strength, and possible ways to enforce strong passwords.