How to Sabotage Encryption Software (And Not Get Caught) Anthony Pell 1 min read 03/17/2015 In the field of cryptography, a secretly planted Now one group of crypto experts has published an appraisal of different methods of weakening crypto systems, and the lesson is that some backdoors are clearly better than othersThe link for this article located at Wired is no longer available. Must Read ArticlesTails 6.1 Released with Security, User Experience Enhancements 1 - 2 min read 27 March 2024Tails 6.1 has been released as the latest version of the renowned Linux distribution focused on privacy and anonymity. This critical analysis willHighlights & Takeaways from SCALE 21x: A Community Event Beyond Linux 2 - 3 min read 26 March 2024The Southern California Linux Expo (SCALE) 21x is a massive community-run open-source and free software conference. This year's event showcasedUbuntu LTS Gets 12 Years of Legacy Support: An Analysis for Security Practitioners 2 - 3 min read 26 March 2024Canonical has announced extending Ubuntu's long-term support (LTS) to 12 years, providing security coverage from the initial release. While regular Prev:You need to apply the OpenSSL patches today, not tomorrow Prev: You need to apply the OpenSSL patches today, not tomorrow Next: Yahoo puts email encryption plugin source code up for review Next: Yahoo puts email encryption plugin source code up for review