Decloaking VPN traffic: New critical vulnerability
Remember all the people calling me a tinfoil hat wacko for insisting on open source routers? There is a new critical VPN vulnerability from Leviathan
Remember all the people calling me a tinfoil hat wacko for insisting on open source routers? There is a new critical VPN vulnerability from Leviathan
Cloudflare just revealed on their blog that back in November a sophisticated hacker, likely a nation state, got access to some of their servers. [1]
There’s this fancy word called “Mandatory Access Control” or MAC. Don’t be fooled by how big a word it is, it’s simple. It just decides
Corporations protecting themselves from random citizens is security.Citizens protecting themselves from large corporations or corrupt governments is privacy. Privacy is everything associated with security PLUS
If you absolutely must do 2FA on your android device (because you prefer to scan QR code pictures over effortlessly copying and pasting the backup
KeePass XC is a free and open source password manager that stores its database locally on your computer. It works on Linux, Windows, or MacOS.
2FA or 2-Factor Authentication is a great security tool if you use an open source tool with method called TOTP. On the other hand, if