linuxmagazine, to security
@linuxmagazine@fosstodon.org avatar

From this week's Linux Update: Matthias Wübbeling shows you how to protect your data and operating system from prying eyes with @veracrypt https://www.linux-magazine.com/Issues/2024/279/VeraCrypt

skribe, to coursera
@skribe@aus.social avatar

I'm doing some research for my WiP by retaking the Coursera Cryptography course. I think it hasn't been updated in the 10 or so years since I last did it.

The lecturer actually references TrueCrypt as an example of disk encryption. TrueCrypt was abandoned in 2014 for reasons unknown. It's considered unsafe.

ravirockks, to random

Latest piece of guidance from the NSA and friends on securing the software supply chain has dropped.

This edition is on OSS and SBOMs.
https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3613105/nsa-and-esf-partners-release-recommended-practices-for-managing-open-source-sof/

kkarhan,
@kkarhan@mstdn.social avatar

@ravirockks Because code releases for are pointless if one can't verify the released code is actually what is being released as .

Something was rightfully criticized for back in it's days.

In , noone trusts anyone and thus being able to let everyone see and reproduce code as well as it is vital to security.

Same with on how to build something from source: It's vital to be able to do so for longterm-maintainability.

wildrover, to random German
@wildrover@digitalcourage.social avatar

Mal eine Frage an alle die sich mit auskennen. Gibt es einen relevanten Unterschied zwischen und ?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • magazineikmin
  • Youngstown
  • osvaldo12
  • khanakhh
  • slotface
  • tacticalgear
  • InstantRegret
  • ngwrru68w68
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • everett
  • rosin
  • provamag3
  • Durango
  • GTA5RPClips
  • ethstaker
  • modclub
  • mdbf
  • cisconetworking
  • anitta
  • Leos
  • cubers
  • normalnudes
  • tester
  • megavids
  • lostlight
  • All magazines