More security help for you: Hashing. So now what is hashing? In cryptography a hash function is a one-way mathematical operation that takes an arbitrary block of data and returns a fixed-size bit string. For today we’re going to use hashes to extend the strength of a password and reduce the possibility of getting compromised. So what exactly does a hash look like? Continue reading Hashing It Out.
Here’s another security life lesson for you: please, please, please use 2-FA whenever possible, and by that I mean Two Factor Authentication, not the crazy stimulant drug. It’s more likely than not that you’ve used at least a few forms of 2-factor authentication in your lifetime, you just didn’t know the terminology for it. So what is 2-factor authentication (2-FA) and why is it so important? Continue reading Use 2-FA, Everyday.
Security life lessons: Entropy and Passphrases.
All your life you’ve been conditioned into making passwords that are hard to remember but easy for computers to randomly guess. Continue reading Passphrases and Entropy
Next time someome asks you, “What would Jesus do?” remember that flipping tables and chasing people with whips is entirely in the range of possibilities of things that Jesus would do according to Matthew 21:12.
I haven’t become big enough of a public figure to be accused of being Illuminati yet, but when that day comes I’ll probably laugh and take it as a compliment. Historically, the name refers to the Bavarian Illuminati, an Enlightenment-era secret society founded on May 1, 1776. The society’s goals were to oppose superstition, obscurantism, religious influence over public life and abuses of state power. If you’ve got a problem with those goals then I really don’t know what to say to you.
So as a security/privacy/cryptography enthusiast I’ve got this to say about the Hillary Clinton email scandal:
“If you’re going to keep secrets, don’t be so damn sloppy about it.” Continue reading On Hillary Clinton’s Email Server:
With Mike Tyson getting into the Bitcoin ATM business the question everyone is dying to have answered is: “are these ATMs programmed in Lisp?”
It’s Real: http://miketysonbitcoin.com/
The #1 rule of millennial social media is a modern day “Always Be Closing” and an attempt to be able to sell others on the idea you’re a cool, hardworking, fun person.
That rule is “Always Be Curating.”
It doesn’t matter if on the inside you’re torn and broken.
Outside and online it’s nightclubs, parties, fancy meals and fancy cars.
No showing weakness.
It may not be showing the entire truth of you, but it’s not lying either:
No bad scenes here, just sunshine and sunny days.
Don’t forget a picture of your cat.
?OTRv2? Your contact is requesting to start an encrypted chat. Regain your privacy today. Please install ChatSecure (aka Gibberbot; Android/iOS), Pidgin (Win/Linux), Adium (Mac) or other OTR encryption-enabled app. OTR works with any compliant XMPP server.
Status: Compliant (X)