This question is “old like the World”, we use to say in my Country. How can we trust of a secrecy protocol or implementation that the worldwide community can’t study, test and modify? Who may assure us that the rules of the game are clear and there’s a full respect of them?
When we are going to use a closed encryption protocol or implementation for our communications we can only trust on the service. It’s like telling a secret to our best friend: we choose someone we trust and we tell him our secret but, in fact, who knows if he will respect our privacy. Maybe our best friend may approach his cousin and say: “Hey, can you keep a secret?” and obviously the answer is “Yes!”.
It’s a common way to think that enhanced computer security is a practice for paranoids or for criminals that have something to hide.
That’s an absurd common place! If you encrypt the hard drive of your PC or you use a secure communication system it’s probable that you will be well know as a strange computer guy or worse… a suspect criminal.
I’ve developed, waiting for the event Reset the Net ,a collection of wizards to simplify the use of encryption on GNU/Linux.
With Two Cents Crypto Frontend (TCCF) you can easly
- create encrypted partitions or external disks
- create encrypted storages in a regular files and mount them
- encrypt and decrypt single files with a password
- use asymmetric encryption to securely communicate with electronic mail for example
- secure delete files and entire partitions or disks
The script runs in bash shell.
You have to simply run
$ /bin/bash tccf.sh
or, if you want, you can run any of the scripts separately if you don’t want to navigate through menus
but first of all, download the entire suite here: DOWNLOAD
I’M NOT RESPONSIBLE OF ANY DAMAGE OCCURRED USING TCCF SUITE.
iSEC Partners, Inc. has conducted an assessment on the source code of TrueCrypt 7.1a disk encryption suite.
Testing the open source code, searching for bugs, vulnerabilities, backdoors and defining if the code is well written, iSEC has published a detailed report about the security of TrueCrypt available for download in PDF format at this address: LINK.
Results highlight that TrueCrypt suite does not contain backdoor or other maliciously implemented code to exploit and lessen the security of the cryptographic environment.
Unprotected wi-fi networks with Internet gateway are everywhere. Wardriving is becoming easier and connecting to an unprotected net doesn’t imply anymore that you have to go with your laptop under the building; you just need to joke with your smartphone and no one will notice that you are pirating your neighbor’s wifi.
That’s not all sugar!