Friday, February 24th, 2017
Cryptographic hash functions like SHA-1 are a cryptographer’s swiss army knife. You’ll find that hashes play a role in browser security, managing code repositories, or even just detecting duplicate files in storage. Hash functions compress large amounts of data into a small message digest. As a cryptographic requirement for wide-spread ...
Posted in Internet, Privacy, Security | No Comments
Friday, February 3rd, 2017
At DuckDuckGo, our vision is to raise the standard of trust online. To that end, we strive to understand what people know about online privacy and how they use the privacy features available to them. This report focuses on the feature in web browsers commonly referred to as “Private Browsing.”
“Private ...
Posted in Internet, Privacy | No Comments
Wednesday, November 16th, 2016
Sometimes Linux users can be smug about their system's security. And sometimes a major hole that's been hiding in Linux since about version 2.6 opens up and in you fall.
The security hole this time is with how almost all Linux distributions implement Linux Unified Key Setup-on-disk-format (LUKS). LUKS is the ...
Posted in Internet, Linux, Privacy, Security | No Comments
Tuesday, November 8th, 2016
Browser extensions have become a standard part of the most popular browsers and essential part of our lives for surfing the Internet.
But not all extensions can be trusted.
One such innocent looking browser add-on has been caught collecting browsing history of millions of users and selling them to third-parties for making ...
Posted in Internet, Privacy | No Comments
Tuesday, October 4th, 2016
Users are still dealing with the Yahoo's massive data breach that exposed over 1 Billion Yahoo accounts and there’s another shocking news about the company that, I bet, will blow your mind.
Yahoo might have provided your personal data to United States intelligence agency when required.
Yahoo reportedly built a custom software ...
Posted in Internet, Privacy | No Comments