Logo Background

» Encrypted

  • Encrypted Social Network Vies For Disgruntled Facebook Users
    By on November 30, 2013 | Comments Off  Comments


    angry tapir writes “With the look of Google Plus and Facebook-like elements, a new social network named “Syme” feels as cozy as a well-worn shoe. But beneath the familiar veneer, it’s quite different. Syme encrypts all content, such as status updates, photos and files, so that only people invited to a group can view it. Syme, which hosts the content on its Canada-based servers, says it can’t read it. “The overarching goal of Syme is to make encryption (more…)

  • Tor Tests Undetectably Encrypted Connections In Iran
    By on February 10, 2012 | Comments Off  Comments

    Sparrowvsrevolution writes “Ahead of the anniversary of Iran’s revolution, the country’s government has locked down its already-censored Internet, blocking access to many services and in some cases cutting off all encrypted traffic on the Web of the kind used by secure email, social networking and banking sites. In response, the information-freedom-focused Tor Project is testing a new tool it’s calling ‘obfsproxy,’ or obfuscated proxy, (more…)

  • The Beginnings of Encrypted Computing In the Cloud
    By on June 11, 2010 | Comments Off  Comments

    eldavojohn writes “A method of computing from a 2009 paper allows the computing of data without ever decrypting it. With cloud computing on the rise, this may be the holy grail of keeping private data private in the cloud. It’s called Fully Homomorphic Encryption, and if you’ve got the computer science/mathematics chops you can read the thesis (PDF). After reworking it and simplifying it, researchers have moved it away from being true, fully homomorphic (more…)

  • Forensics Tool Finds Headerless Encrypted Files
    By on April 30, 2009 | Comments Off  Comments

    gurps_npc writes “Forensics Innovations claims to have for sale a product that detects headerless encrypted files, such as TrueCrypt Dynamic files. It does not decrypt the file, just tells you that it is in fact an encrypted file. It works by detecting hidden patterns that don’t exist in a random file. It does not mention steganography, but if their claim is true, it seems that it should be capable of detecting stenographic information as well.”

    (more…)