ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Sind VPNs legal? Verständlich erklärt - CHIP | #CyberSecurity #Privacy #Encryption

Sind VPNs legal? Verständlich erklärt

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=VPN

 

 
Gust MEES's insight:
Sind VPNs legal? Verständlich erklärt

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=VPN

 

 
No comment yet.
Scooped by Gust MEES
Scoop.it!

Verschlüsselungs-Anwendung VeraCrypt geprüft: Lücken gefunden und geschlossen | #Encryption 

Verschlüsselungs-Anwendung VeraCrypt geprüft: Lücken gefunden und geschlossen | #Encryption  | ICT Security-Sécurité PC et Internet | Scoop.it
Sicherheitsforscher haben ein Audit von VeraCrypt durchgeführt und mehrere kritische Schwachstellen entdeckt. Die abgesicherte Version 1.19 ist bereits erschienen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

Gust MEES's insight:
Sicherheitsforscher haben ein Audit von VeraCrypt durchgeführt und mehrere kritische Schwachstellen entdeckt. Die abgesicherte Version 1.19 ist bereits erschienen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA Can 'Easily' Break Cellphone Encryption, Report Says

NSA Can 'Easily' Break Cellphone Encryption, Report Says | ICT Security-Sécurité PC et Internet | Scoop.it
A new report suggests the U.S. National Security Agency (NSA) has the technical capacity to crack the most commonly-used cellphone encryption technology.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

- - http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...

 

http://www.scoop.it/t/securite-pc-et-internet/?q=NSA

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims | ICT Security-Sécurité PC et Internet | Scoop.it
"Black-box" testing uncovers several ways the NSA could tap the popular service.

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 


Via Gust MEES
Gust MEES's insight:

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 26, 2013 5:39 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


                         ===> Nobody Is Perfect!!! <===


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, June 26, 2013 5:42 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

Critical flaws found in open-source encryption software VeraCrypt

Critical flaws found in open-source encryption software VeraCrypt | ICT Security-Sécurité PC et Internet | Scoop.it

A new security audit has found critical vulnerabilities in VeraCrypt, an open-source full-disk encryption program that's the direct successor to the widely popular, but now defunct, TrueCrypt.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

Gust MEES's insight:

A new security audit has found critical vulnerabilities in VeraCrypt, an open-source full-disk encryption program that's the direct successor to the widely popular, but now defunct, TrueCrypt.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Exclusive: Secret contract tied NSA and security industry pioneer

Exclusive: Secret contract tied NSA and security industry pioneer | ICT Security-Sécurité PC et Internet | Scoop.it
SAN FRANCISCO (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S.
Gust MEES's insight:

 

Learn more:

 

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Revealed: how Microsoft handed the NSA access to encrypted messages

Revealed: how Microsoft handed the NSA access to encrypted messages | ICT Security-Sécurité PC et Internet | Scoop.it
Documents show company collaborated closely with NSA and FBI to help agencies intercept data
Gust MEES's insight:

 

Learn more:

 

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Privacy

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic