Librem 5 Development Kits: we are getting there! – Purism

Librem 5 Development Kits: we are getting there! – Purism

So once the PCBs finally arrived, on the same day we set up all the machines and worked until 5 a.m. to make the first 10 “golden sample” prototypes of the development base boards:

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

The paper outlines that some SSD drives (including Samsung and Crucial) do not actually encrypt the data properly, and that they can be easily by-passed without a system password.

Apple says its T2 chip can prevent hackers from eavesdropping through your MacBook mic

Apple says its T2 chip can prevent hackers from eavesdropping through your MacBook mic

In a new security document published today, and reported on first by TechCrunch, Apple is giving us a glimpse at some of the chip’s capabilities, specifically its ability to prevent hackers from eavesdropping through your laptop microphone.

Ledger Nano S Limited Edition Review – CryptoLauren

Ledger Nano S Limited Edition Review – CryptoLauren

This company has created software devices specially designed for the safe storage of popular cryptocurrencies. Ledger provides the most robust devices for the secure storage of your cryptocurrency. They have developed a remarkably secure structure, placing themselves at the top of the digital wallet options.

The Titan M Chip Powers Up Pixel 3 Security

The Titan M Chip Powers Up Pixel 3 Security

In order to use it to protect keys, that’s a reasonable thing to do, but you know there’s still going to be the risk of attacks like Spectre, Meltdown, and Rowhammer,” says Will Drewry, principle software engineer at Google, referring to prominent examples of pernicious hardware-based attacks.

Cyborg Unplug

Cyborg Unplug

2.4Ghz detectorDetects and disconnects (disconnection feature outside US only) most common classes of wireless surveillance deviceLED alertSends email alerts to an account you configureUS plug standard, with Euro adaptor for travellersWirelessly tunnel multiple devices (phones, laptops, tablets) through a VPN you configure, no need for extra software on any deviceShare files from a USB stick over the network, with no need for third-party apps (like DropBox)With no settings applied, functions as pocket-sized travel routerFree, 24/7 high-speed VPN service.

You Gave Facebook Your Number For Security. They Used It For Ads.

You Gave Facebook Your Number For Security. They Used It For Ads.

They found that Facebook harvests user phone numbers for targeted advertising in two disturbing ways: two-factor authentication (2FA) phone numbers, and “shadow” contact information. However, until just four months ago, Facebook required users to enter a phone number to turn on any type of 2FA, even though it offers its authenticator as a more secure alternative.

Librem 5, the world’s first ethical, user-controlled smartphone, makes steady progress for initial shipping beginning April 2019 – Purism

Librem 5, the world’s first ethical, user-controlled smartphone, makes steady progress for initial shipping beginning April 2019 – Purism

With all the advancements Purism is making with the hardware, software, development kits, and services, during testing two silicon bugs were discovered in the Librem 5’s CPU, manufactured by NXP, that affects power management and power consumption.

Tails 3.9 is out

Tails 3.9 is out

You can now install additional software automatically when starting Tails. When installing an additional Debian package from Tails, you can decide to install it automatically every time: Read our documentation on installing additional software. Update Tor Browser to 8.0, based on Firefox 60 ESR.

Computer Security Education

Computer Security Education

There are few options available that are truly "free" (open-source), affordable, and provide suitable processing power to run "secure" operating systems like Qubes-Whonix, because specific hardware requirements like VT-d and VT-x are necessary for compatibility with future software releases.

Why is Google selling potentially compromised Chinese security keys?

"Google released their own version of a security key, and while we have received the question if we were part of this production, these devices are not manufactured by Yubico," the company said.

Getting Started With Linux

Getting Started With Linux

Install Linux on a virtual machine and run it within a window on your current desktop or notebook computer. If the command fails with a message about running out of space, then you need to use a larger USB thumbdrive!

Hardware Acceleration is Here for Routers Using OpenVPN

Hardware Acceleration is Here for Routers Using OpenVPN

This article focuses on a VPN router that likely has hardware acceleration enabled (the Asus RT-AC86U 2018), and tests various configurations to make sure that the feature is working.

The Intel Management Engine: an attack on computer users' freedom — Free Software Foundation — working together for free software

The Management Engine1 (frequently abbreviated as ME) is a separate computer within Intel computers, which denies users control by forcing them to run nonfree software that cannot be modified or replaced by anyone but Intel.

The Internet of Things Needs Food Safety-Style Ratings for Privacy and Security

The Internet of Things Needs Food Safety-Style Ratings for Privacy and Security

To that end, Consumer Reports announced last year it would begin working with non-profit privacy research firm Ranking Digital Rights (RDR) and nonprofit software security-testing organization Cyber Independent Testing Lab (CITL) on a new open source standard intended to help make internet-connected hardware safer.