GPG makes me want to cry
I’m currently reading Creating the perfect GPG keypair and it makes me want to cry. Keeping them master key on an encrypted USB stick. Where will I keep it? How will I make sure I won’t loose it over...
View ArticleSecure Mail, Secure Chat
Harald recently posted these three links on Google+:Operational PGPMutt, Gmail, and GPG and VimChatting in Secret While We're All Being WatchedUpdateson Google+: HowTo: Privacy & Security Conscious...
View ArticleGmail, Gnus and GPG
I wrote some instructions for setting up Gmail, Gnus and GPG. I used Emacs 24.5 and GPG 2.0 for this tutorial.If you’re on Windows I installed gnupg 1.4 using Cygwin and it worked just as well.If...
View ArticleFIDO U2F
Ich habe mal vor einiger Zeit mit der Bestätigung in zwei Schritten von Google angefangen, für Google, Dropbox, Gandi. Das ist eine App auf dem Telefon und zeigt Nummern an. Will ich mich bei einem der...
View ArticleMan in the Middle
I wonder…The authenticity of host 'alexschroeder.ch (192.121.170.192)' can't be established. RSA key fingerprint is 3f:fa:ee:ae:af:f4:37:9e:c5:ff:b6:85:8b:14:44:0e. Are you sure you want to continue...
View ArticleEncryption Hard
So, I’m trying find the public key of somebody I need to email. But it won’t work. Here’s what I get when searching for a key from the command line:alex@Megabombus:~$ gpg --search-key alex@gnu.org gpg:...
View ArticleMonit
Every now and then, the Monit certificate will expire. Notes to myself:cd /etc/ssl/localcerts sudo openssl req -new -x509 -days 365 -nodes -config monit.cnf -out monit.pem -keyout monit.pem sudo chown...
View ArticleOnline Again
I was sitting in a very nice hotel on Lord Howe Island and wondering why my iPhone no longer connects to my homepage, alexschroeder.ch, where as all my other sites seem to be fine, eg. oddmuse.org...
View ArticleSecurity Focused Operating System
@scottmortimer: Most security folks know about Kali Linux, but there are quite a few alternative security-focused Linux distributions out there.Parrot is a GNU/Linux distribution based on Debian and...
View ArticleInformation Security Practice
Christina asked a question on her blog, Infosec and Data Privacy:On a scale of 1 to 10, where do you rate your personal infosec practices? Name three practices you do to define that level.If you rated...
View Article