EM Client

EM Client

Most folks usually write something when they want to complain - I do as well (LOL) - but I also like to say Thank You when you get a real good and well supported piece of software. Neil Martin Just a note to say thanks for building a damn good email client to replace Outlook.

Profs prep promising privacy-protecting proxy program... Yes, it is possible to build client-server code that safeguards personal info

Profs prep promising privacy-protecting proxy program... Yes, it is possible to build client-server code that safeguards personal info

In a paper scheduled to be presented on Thursday at the USENIX Networked Systems Design and Implementation conference , co-authors Frank Wang (MIT), Ronny Ko and James Mickens (Harvard) describe a system called Riverbed – not to be confused with an identically named IT company – that consists of a proxy service to oversee the handling of data locally and on remote servers.

Confessions of a private spy

Confessions of a private spy

Of course, Weinstein hired Black Cube - an organisation staffed by ex-Mossad operatives and a favoured plaything of some of the less savoury individuals stalking the planet - to spy on McGowan.

How I’m (slowly) moving off the cloud with Nextcloud

How I’m (slowly) moving off the cloud with Nextcloud

Now, open up the ddclient configuration file: sudo nano /etc/ddclient.conf Next, replace the content of the file with the following: protocol=dyndns2 use=web server=domains.google.com ssl=yes login= generated_username password=' generated_password ' test.example.com Replace generated_username and generated_password with the username and password you copied down earlier.

University Buys 14.4 Petabyte Bandwidth to Boost ‘Anonymous’ Torrent Client

University Buys 14.4 Petabyte Bandwidth to Boost ‘Anonymous’ Torrent Client

The Tribler lab at Delft University of Technology has sold part of its Bitcoin stash to purchase bandwidth for its anonymous torrent client. Professor Johan Pouwelse, leader and founder of the Tribler project, informs us that his lab at Delft University of Technology has bought 14.4 petabytes of Internet bandwidth.

Distributed PKI: Development and Use Cases

Distributed PKI: Development and Use Cases

Cryptography, the black box we believe can help The REMME team came up with the open source PKI (d) protocol concept to secure communications, we were sure that the primary use case would be human authentication.

What if Facebook was a brick and mortar company

What if Facebook was a brick and mortar company

This only comes to about 50 people so to avoid looking like a loner in front of Darren you start listing people who aren't really friends but rather people you know.

[Thread] dnscrypt-proxy on iOS · Issue #42 · jedisct1/dnscrypt-proxy

[Thread] dnscrypt-proxy on iOS · Issue #42 · jedisct1/dnscrypt-proxy

I’m a dev and I want to spend my time on development, not on fighting with copycats. The mentioned Mike’s OB and many other devs that were making opensource projects for iOS stucked with exactly the same problem.

Assistance and Access Bill

Assistance and Access Bill

Please use the contact details on this page to email your Senators and Representatives in the Australian Parliament. It is recommended that you use your own email client to send submissions as anything sent from here could potentially be marked as spam.

Secure P2P chat

Secure P2P chat

Here I will show you how to setup encrypted peer-to-peer chat and make your communication private and secure with use of Husarnet, Avahi and Pidgin.

Feds took woman’s iPhone at border, she sued, now they agree to delete data

Feds took woman’s iPhone at border, she sued, now they agree to delete data

According to the agency's most recent figures (Fiscal Year 2017), out of 397 million international travelers, only 30,200 digital border searches were conducted—or approximately 0.007 percent.

Developing privacy-aware applications with Python and I2P

For example, this is how you connect to "udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p", send HTTP GET request and read the response (it is "i2p-projekt.i2p" web server): remote_host = "udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p" reader , writer = await i2plib .

Report: Israeli spyware helping dictatorships track dissidents, minorities

Report: Israeli spyware helping dictatorships track dissidents, minorities

The investigation, based on 100 sources in 15 countries, including many current and former employees of the Israeli companies producing the cyber products, concluded that the Israeli regulatory bodies that are supposed to ensure that exports aren’t used for illegal or immoral purposes by the client governments are not stopping the sales even when there is clear evidence of abuse.

3 Ways to Check if Your Gmail Account Has Been Hacked

3 Ways to Check if Your Gmail Account Has Been Hacked

These tips will be useful to all Gmail users including those without any current problems as it is always a good idea to keep an eye on your email accounts and to know how to monitor unusual activities.

Mozilla wants to estimate Firefox's Telemetry-off population

Mozilla wants to estimate Firefox's Telemetry-off population

Firefox users who are concerned about the collection and sending of Telemetry data to Mozilla can turn off the functionality in the browser's options. The add-on is automatically installed and designed to inform Mozilla whether Telemetry is enabled in the browser.

James Stanley

James Stanley

Ricochet is instant messaging software that communicates over Tor, authenticates peers by their Tor onion address, and communicates directly peer-to-peer (via Tor hidden services) without any centralised servers involved.

DNS over TLS - Thoughts and Implementation

DNS over TLS - Thoughts and Implementation

In simple words, when you get the details of your DNS over TLS resolver, such as IP address and hostname, you should also get an SPKI pin that your client can use to verify that this is the original server public key.

The Current Status of WireGuard VPNs – Are We There Yet?

The Current Status of WireGuard VPNs – Are We There Yet?

WireGuard builds on these principles of simplicity and straightforward code that is well documented, and it brings it to VPNs. The goal of the project is be a simple VPN service that can be readily integrated directly into operating systems, with the aim of being faster and safer than current solutions.

How to Forward Gmail to Another Email Address Automatically

How to Forward Gmail to Another Email Address Automatically

For web-based services such as Yahoo!, Gmail accomplishes this by allowing you to forward all the messages you receive to any other email address you choose. Click the Gear icon at the top right corner of the Gmail screen and select Settings from the drop-down menu that appears.