Skip to content

The Eclectic Light Company

Macs & painting – 🦉 No AI content
Main navigation
  • Downloads
  • Freeware
  • M-series Macs
  • Mac Problems
  • Mac articles
  • Macs
  • Art

privacy

Wanted: people of vision

Often branded a consummate logistician without vision or inspiration, Tim Cook has demonstrated that here he can see far further than the politicians.

February 19, 2016 General, Life, Macs, Technology

Should you use a PIN or a password to secure your iPhone?

Which is better – a 6 digit PIN, or a shorter alphanumeric password – for protecting your iPhone?

February 17, 2016 General, Macs, Technology

How long would it take for Apple to break into your iPhone?

Dan Guido’s careful analysis provides the answers that we, and law-enforcement, wanted to know.

February 17, 2016 General, Macs, Technology

The Steam Christmas breach: more details and a call to action

It turns out that Steam’s leak of personal data was very large, did contain sensitive personal information, and was the result of a denial of service attack. Has it been reported, though?

December 31, 2015 General, Macs, Technology

Unexpected Christmas presents: how Steam served the wrong user data

A single point of failure which discarded all privacy protection is hardly an example of good design.

December 27, 2015 General, Macs, Technology

Who will bear the brunt of backdoors in encryption?

Backdoors will be exploited, and can only result in unintentional consequences. They would put the economy and society at risk.

December 21, 2015 General, Macs, Technology

How modern encryption works: iOS encryption, and AES

T T Read More

Accessible explanations of how AES encryption is performed, and how encryption works in iPhones and iPads.

November 24, 2015 Macs, Technology

An open challenge on encryption: show us

Twenty years ago, law enforcement agencies wanted backdoor access to encrypted communications. Look what happened.

November 21, 2015 General, Macs, Technology

Rhetoric of the impossible: Paris and privacy

Rather than blathering on about surveillance, our politicians had better start preparing their excuses.

November 19, 2015 General, Life, Macs, Technology

Encryption: how Logjam can defeat secure connections

Could your HTTPS and VPN be so easy to crack that a well-prepared hacker could open your secure connections?

November 16, 2015 General, Macs, Technology

Posts navigation

Previous 1 … 22 23 24 25 26 Next
Blog at WordPress.com.
Footer navigation
  • Free Software Menu
  • About & Contact
  • Macs
  • Painting
  • Downloads
  • Mac problem-solving
  • Extended attributes (xattrs)
  • Painting topics
  • SilentKnight, Skint, SystHist, silnite, LockRattler & Scrub
  • DelightEd & Podofyllin
  • xattred, SpotTest, Providable, Spotcord, Metamer & xattr tools
  • 32-bitCheck & ArchiChect
  • XProCheck, T2M2, LogUI, Ulbow, blowhole and log utilities
  • Cirrus & Bailiff
  • Precize, Alifix, UTIutility, Sparsity, alisma, Taccy, Signet
  • Versatility & Revisionist
  • Text Utilities: Textovert, Disclipper, Nalaprop, Dystextia and others
  • PDF
  • Keychains & Permissions
  • Updates
  • Spundle, Cormorant, Stibium, DropSum, Dintch, Fintch and cintch
  • Long Reads
  • Mac Troubleshooting Summary
  • M-series Macs
  • Mints: a multifunction utility
  • VisualLookUpTest
  • Virtualisation on Apple silicon
  • System Updates
  • Saturday Mac Riddles
  • Last Week on My Mac
  • sysctl information
Secondary navigation
  • Search

Begin typing your search above and press return to search. Press Esc to cancel.

  • Subscribe Subscribed
    • The Eclectic Light Company
    • Join 9,023 other subscribers
    • Already have a WordPress.com account? Log in now.
    • The Eclectic Light Company
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...