Skip to content

The Eclectic Light Company

Macs, painting, and more
Main navigation
  • Downloads
  • Freeware
  • M-series Macs
  • Mac Problems
  • Mac articles
  • Macs
  • Art

privacy

How long would it take for Apple to break into your iPhone?

Dan Guido’s careful analysis provides the answers that we, and law-enforcement, wanted to know.

February 17, 2016 General, Macs, Technology

The Steam Christmas breach: more details and a call to action

It turns out that Steam’s leak of personal data was very large, did contain sensitive personal information, and was the result of a denial of service attack. Has it been reported, though?

December 31, 2015 General, Macs, Technology

Unexpected Christmas presents: how Steam served the wrong user data

A single point of failure which discarded all privacy protection is hardly an example of good design.

December 27, 2015 General, Macs, Technology

Who will bear the brunt of backdoors in encryption?

Backdoors will be exploited, and can only result in unintentional consequences. They would put the economy and society at risk.

December 21, 2015 General, Macs, Technology

How modern encryption works: iOS encryption, and AES

T T Read More

Accessible explanations of how AES encryption is performed, and how encryption works in iPhones and iPads.

November 24, 2015 Macs, Technology

An open challenge on encryption: show us

Twenty years ago, law enforcement agencies wanted backdoor access to encrypted communications. Look what happened.

November 21, 2015 General, Macs, Technology

Rhetoric of the impossible: Paris and privacy

Rather than blathering on about surveillance, our politicians had better start preparing their excuses.

November 19, 2015 General, Life, Macs, Technology

Encryption: how Logjam can defeat secure connections

Could your HTTPS and VPN be so easy to crack that a well-prepared hacker could open your secure connections?

November 16, 2015 General, Macs, Technology

Safe from prying eyes: a free script app for robust encryption

A free open source droplet for robust encryption and decryption, and explanation of the AppleScript code.

November 13, 2015 General, Macs, Technology

Encryption: secure at the command line

How to build commands to robustly encrypt and decrypt files on your Mac.

November 10, 2015 Macs, Technology

Posts navigation

Previous 1 … 20 21 22 23 24 Next
Blog at WordPress.com.
Footer navigation
  • Free Software Menu
  • About & Contact
  • Macs
  • Painting
  • Downloads
  • Mac problem-solving
  • Extended attributes (xattrs)
  • Painting topics
  • SilentKnight, Skint, silnite, LockRattler, SystHist & Scrub
  • DelightEd & Podofyllin
  • xattred, Spotcord, Metamer & xattr tools
  • 32-bitCheck & ArchiChect
  • XProCheck, T2M2, Ulbow, Consolation and log utilities
  • Cirrus & Bailiff
  • Taccy, Signet, Precize, Alifix, UTIutility, Sparsity, alisma
  • Versatility & Revisionist
  • Text Utilities: Nalaprop, Dystextia and others
  • PDF
  • Keychains & Permissions
  • Updates
  • Spundle, Cormorant, Stibium, Dintch, Fintch and cintch
  • Long Reads
  • Mac Troubleshooting Summary
  • M-series Macs
  • Mints: a multifunction utility
  • VisualLookUpTest
  • Virtualisation on Apple silicon
  • System Updates
  • Saturday Mac Riddles
  • Last Week on My Mac
  • sysctl information
Secondary navigation
  • Search

Begin typing your search above and press return to search. Press Esc to cancel.

  • Subscribe Subscribed
    • The Eclectic Light Company
    • Join 5,809 other subscribers
    • Already have a WordPress.com account? Log in now.
    • The Eclectic Light Company
    • Customize
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...