Vulnerabilities in PGP-encrypted email plug-ins

Member from group of European security researchers twitted today that critical vulnerabilities in PGP/GPG and S/MIME email encryption was found. Full details will be published in a paper on Tuesday 15 May 2018 at 07:00 AM UTC.

EFF reported that they already establish connection with the research team running this investigation.

Continue reading “Vulnerabilities in PGP-encrypted email plug-ins”

Why you need to stop using the same Passwords

In December of 2016, Yahoo announced it had uncovered a massive data hack, compromising more than 1 billion user accounts. This was in addition to an earlier 2014 data breach, which had affected over 500 million users. While users may scream for blood when such a breach happens – usually blaming the owners of the affected websites – the real culprit can likely be found in their own bathroom mirrors.

You see, many data breaches are caused by one seemingly innocent common factor: computer and mobile device users reuse their passwords on multiple websites at an alarmingly high rate.

Continue reading “Why you need to stop using the same Passwords”

Online Privacy Guide for Journalists 2017

Many veteran journalists, but not only these, surely noticed that we are all of a sudden bombarded again from all-over with mentions of Watergate. Books like George Orwell’s 1984 are on display at bookstores and an air of danger to freedom of speech and freedom of the press is spreading slowly like a dark cloud over the Western Hemisphere, Continue reading “Online Privacy Guide for Journalists 2017”

#1 Help3d: Practical 3D printing-Micro Sanding Block

3d printed sanding paper block

Starting new 3d printing posts by offering you a really handy and practical things to print.

We will search the web and offer new and interesting files to print by using our test settings.

Like proud owners of cheap Prusa i3 ProB, we will try to provide photo and if possible video support for each model we presenting.

This month our model comes from EasilyBuild, and the file is uploaded at thingiverse.com.

Continue reading “#1 Help3d: Practical 3D printing-Micro Sanding Block”

What is Minebox? Blockchain bringing back our data from the “CLOUD”

It is time to get your data back? Instead of storing files in the public cloud, the Minebox acts as your personal cloud, which is dedicated for you, and you only. It is secured, safe and reliable. Promoted as the most powerful NAS ever. Pre-order for Minebox 8TB/16TB is open now.

Minebox NAS is smart data storage box that Continue reading “What is Minebox? Blockchain bringing back our data from the “CLOUD””

HP totally implemented planned obsolescence in their toner policy

TonersPeople with inkjet printers have all considered, if not tried, clone inks from third-party vendors. It’s way cheaper, often by as much as 90 percent. Printer companies do not like hearing this, but most of the printer users playing with various brands of clone inks for 20 years and they never experienced any of the problems that you commonly read about in forums, like clogged heads or ruined warranties. “Only use the brand name meant for the printer!”

Until recently, you could buy a new printer for the cost of replacement ink. It’s obvious that the printers were the loss Continue reading “HP totally implemented planned obsolescence in their toner policy”

Top Security test checks for your Browser

Internet SecurityWhen you visit a website, you are allowing that site to access a lot of information about your computer’s configuration. Combined, this information can create a kind of fingerprint — a signature that could be used to identify you and your computer. “Browser fingerprinting” is a method of tracking web browsers by the configuration and settings information they make visible to websites, rather than traditional tracking methods such as IP addresses and unique cookies. Some companies use this technology to try to identify individual computers. How secure is your browser from attack from Internet. Here are our favorite free online Continue reading “Top Security test checks for your Browser”

Exploring the new territory By Manfred Karrer

bitsquare-home2

With the recent Bitfinex heist models for decentralized exchanges have received a bit more attention as usual.

This is a repeating pattern happening every few months after a major incident.

And it goes back to business as usual after people are entertained by the next soap opera.
So I do not expect that the majority of cryptoland citizens will radically change their behavior. And that has several understandable reasons.
But beside that, Continue reading “Exploring the new territory By Manfred Karrer”

Analyzing metadata in UK

devildetails_590_463
Jeff Parker, Cagle Cartoons, Florida Today and the Fort Myers News-Press

Collecting metadata “can be more intrusive than traditional communications data,” Scotland Yard’s deputy assistant commissioner has admitted to Ars.

Neil Basu made his comment during a briefing session on law enforcement requirements for investigatory powers. The UK government claims that the new Internet connection records (ICRs) at the heart of the Investigatory Powers Bill are “only” metadata, and therefore no more intrusive than traditional communications data.

However, this contradicts the view of many experts who believe Continue reading “Analyzing metadata in UK”

OpenBazaar get on the main network

images.duckduckgo.comOpenBazaar is now released on the mainnet and is ready for real transactions. You can download the program on the OpenBazaar website.

Anyone with a computer and internet connection can easily install the OpenBazaar software and begin trading with anyone else in the world – for free – without permission. The believe in  decentralized, P2P trade network is going to fundamentally change commerce for the better.it’s a decentralized peer-to-peer network for trade that uses Bitcoin. That trade happens directly between buyers and sellers with no one in the middle – and no fees or restrictions on trade. Continue reading “OpenBazaar get on the main network”

Future of money with Andreas M. Antonopoulos

Andreas Antonopoulus with Barcelona Bitcoin Community and Bitcoin Meetup Organisers
Andreas Antonopoulos with Barcelona Bitcoin Community

Like small part of the world bitcoin community, we were really surprised to find that Andreas Antonopoulos will make short stop to Barcelona for a scheduled meetup of Barcelona Bitcoin Community(BBC) during his European tour 2016.

Persons like Andreas are the gifted parents for any new and radical idea. They are ready to donate their time and energy to shape this idea and present it to the community in understandable way. People like him can understand the future, and then explain it to the rest of us in close, simple and efficient way. Continue reading “Future of money with Andreas M. Antonopoulos”

Barcelona Bitcoin Community and Andreas Antonopoulos-Thoughts on the future of money- FabLab Barcelona 24th March 2016

AA and BBCBarcelona Bitcoin Community proudly presents next Bitcoin meetup in FabLab Barcelona with special guest Andreas Antonopoulos. The meeting is scheduled for 24th of March 2016 and will take place at our great hosts from FabLab Barcelona.

Language (talk and Q&A): English
Free entrance with previous reservation.

Andreas Antonopoulos is a technologist and serial entrepreneur who has become one of the most well-known and well-respected figures in bitcoin. He is the author of “Mastering Bitcoin”, published by O’Reilly Media and considered by many to be the best technical guide to bitcoin.

As an engaging public speaker, teacher and writer,  Andreas makes complex subjects accessible and easy to understand. As an advisor, he helps Continue reading “Barcelona Bitcoin Community and Andreas Antonopoulos-Thoughts on the future of money- FabLab Barcelona 24th March 2016”

Ubuntu Core-Snappy is here. Let’s Internet of Things revolution starts now

SnappyUbuntu Core, also known as Snappy, is a stripped down version of Ubuntu, designed to run securely on autonomous machines, devices and other internet-connected digital things. From homes to drones, these devices are set to revolutionise many aspects of our lives, but they need an operating system that is different from that of traditional PCs.

Continue reading “Ubuntu Core-Snappy is here. Let’s Internet of Things revolution starts now”

Related Images:

USB butt-plug-Breakthroughs in rectal data hosting

il_570xN.920400774_7oo9

We found intriguing method to hide your important files:

USB – Micro SD card reader, butt plug and data storage dongle! Back that data up like a boss! Show’em the files you be work’n with

Price 27.32 + shipping
Never forget those important files again, don’t keep them with you, keep them IN you!

Continue reading “USB butt-plug-Breakthroughs in rectal data hosting”

Windows 10 and How to say farewell to your privacy?

Windows 10

Back in November Microsoft confirmed Windows 10’s worst kept secret: its extensive telemetry (or ‘spying’ as it has been labelled) cannot be stopped. What no-one realised until now, however, is just how staggering the extent of this tracking really is…

Blowing the lid on it this week is Voat user CheesusCrust whose extensive investigation found Windows 10 contacts Continue reading “Windows 10 and How to say farewell to your privacy?”

Bitcoin TicrCube presented at Barcelona Mini Maker Fair

TicrCube_500pxInteresting project can be found this year at Barcelona Mini Maker fair 2016.
The purpose of the TicrCube is to display the current Bitcoin price in a local currency. Many Bitcoin enthusiasts (including ourselves) check the Bitcoin price several times per day online or via smartphone apps, but currently no dedicated device exists to do this effortlessly. The TicrCube is wireless and intended to stay at the user’s office desk or workstation, but it could brought along outdoors. The device connects to the local WiFi network or hotspot of the user, polls the Bitcoin price Continue reading “Bitcoin TicrCube presented at Barcelona Mini Maker Fair”

Related Images:

Digital Security software for 2016

images.duckduckgo.com

We have made this in 2015…. And yes – in 2016 we will repeat that and publish our updated list with software we think is good to share it with everyone who cares about the way they communicate in Internet or just want to keep data safe and unreachable from all the bad guys out there. We will split the helpful Software and Continue reading “Digital Security software for 2016”

TrueCrypt audit completed with status-Safe to be used

TrueCrypt-Audit-Part-Two-Is-On-Its-Way-473806-2

Last year many users of the encrypting software TrueCrypt was asking only one question: TrueCrypt, secure or insecure?

A group of Ten auditors from the Fraunhofer Institute for Secure Information Technology has conducted a six-month audit of TrueCrypt under contract from the German Government. The researchers have expressed a Continue reading “TrueCrypt audit completed with status-Safe to be used”

Why privacy matters, even if you have “nothing to hide”?

privacy

A commentator on a recent post about the DEA installing license plate scanners on the nation’s interstate highways asks, “If you aren’t doing anything illegal why would you care if someone captures your license plate number?”

Another commentator Continue reading “Why privacy matters, even if you have “nothing to hide”?”

15 Reasons Why Dating A Geek Is Worth It

geek

In the wide world of dating, there are many options. Do you go for the flashy guy with the smooth smile, or the dude in the corner typing away on his laptop? The following are reasons why I think my fellow females should pay more attention to the quiet geeks and nerds, and less attention to the flashy boys.
1.) Sex. Yep. Sex. I’m not really familiar with this myself, Continue reading “15 Reasons Why Dating A Geek Is Worth It”

Access will check if your smartphone has been tracked

Amibeingtracked.com
Amibeingtracked.com

Tell Telefónica to respect your privacy and come clean about tracking headers.

The authors of this report are Nader Ammari, Gustaf Björksten, Peter Micek, and Deji Olukotun.

In the age of internet for many users, mobile devices provide the only way of going online. The devices serve as gateways to  information, resources, and innovation, but they can also leak intimate details about the Continue reading “Access will check if your smartphone has been tracked”

External link to Are You a Bad Developer? Take this Quiz to Find Out!

Are You a Bad Developer? Take this Quiz to Find Out!

There’s a saying that “a great programmer can be as 10 times as good as a mediocre one”. No one really wants to be labeled as a bad developer, but the sad reality is that a lot of developers aren’t even aware that they’re bad. So, the question is: Are you a bad developer? Take this quiz to find out here on www.codementor.io. Continue reading Are You a Bad Developer? Take this Quiz to Find Out!

Deep Dream processing of your photos

479351

The brain behind Deep Dreamer was developed at Google as a tool to try and understand how neural networks work. Google open sourced the code, allowing anyone with the know-how to create these images. However, setting up the code on a server is not a trivial task. We’ve become fascinated with how deepdream processes our photos, and wanted to make it easy for anyone to explore.

Continue reading “Deep Dream processing of your photos”

Hacking ethics or Fucking ethics?

assholesItaly
Screen Shot from Hacking team webside

Why good hackers are going in prison and the bad ones are making business legally?

Here is the story of one of the most greedy and heartless companies in the world, hidden behind the name – Hacking Team. Read this article from Cora Currier and Morgan Marquis-Boire published in The Intercept

Continue reading “Hacking ethics or Fucking ethics?”

Bitsquare has launched a crowd funding round using Lighthouse-Part 2

crowdfunding

Latest updates from Bitsquare website:

” There are many centralized bitcoin exchanges to choose from. All have different advantages and disadvantages so you can decide which one fits your needs best.

Why would we need another one? Continue reading “Bitsquare has launched a crowd funding round using Lighthouse-Part 2”

Voxel8 3d Printer for microelectronics and forging chips designs

Voxel8 exists to disrupt the design and manufacture of electronic devices by providing new functional materials with a novel 3D printing platform. Desktop 3D printers today are constrained to printing thermoplastics or UV resins. Continue reading “Voxel8 3d Printer for microelectronics and forging chips designs”

Bitsquare-Bitcoin Decentralized Exchange-Part 1

Bitsquare
Our friends from Bitsquare just passed alpha testing and their Decentralized Bitcoin Exchange is near to the Grand Opening and ready to meet your trades requirements in one new form.
There have been many discussions in the forums about how to build a pure P2P based solution but there is still no real decentralized bitcoin exchange available yet. That’s where Bitsquare comes in. Continue reading “Bitsquare-Bitcoin Decentralized Exchange-Part 1”

Home Webcam hacking reports from BigBrotherWatch

mon

The Daily Mail has revealed that people could be being watched in their own homes or at work as hackers are targeting webcams and uploading the live footage to the internet. The warning comes from the Information Commissioner’s Office (ICO), which is urging people to upgrade their passwords from the default setting. Continue reading “Home Webcam hacking reports from BigBrotherWatch”

Swift Road-The new Dark market bazaar coming in December 2014

If you miss Silk Road 2, don’t worry, Swift Road is coming in December. That’s right — that Swift, as in Taylor.

12-11-2014 15-02-21

After the mega security fail of SpaceX engineer Blake Benthall and Silk Road 2 the dark side is ready to strike back. Let check what mistakes Blake  made so FBI busted him :

Continue reading “Swift Road-The new Dark market bazaar coming in December 2014”

Latest IT advices from Edward Snowden

In the latest TV appearance Edward Snowden advised web users to “get rid” of Dropbox and social networks such as Facebook and Google, too.

Such services only insist on encrypting user data during transfer and when being stored on the servers. Other services he recommends instead, such as SpiderOak(Please check our previous posts where we already posted an article for SpiderOak in Shanomag.com earlier this month), encrypt information while it’s on your computer as well.

SNDN
Photo “Wired”

Continue reading “Latest IT advices from Edward Snowden”

External link to DropBox sharing your files with NSA? No problem-Snowden-endorsed file-sharing service SpiderOak is here to help

DropBox sharing your files with NSA? No problem-Snowden-endorsed file-sharing service SpiderOak is here to help

When our personal data is compromised by government Intelligence agencies like NSA we need to react and just change the Service provider. One of the options we have is SpiderOak and their Zero-Knowledge’ Privacy Promise. SpiderOak creates an easy way to sync data between your phones, laptops, and tablets. You can drag and drop files/folders into your SpiderOak Hive folder, or – for greater control … Continue reading DropBox sharing your files with NSA? No problem-Snowden-endorsed file-sharing service SpiderOak is here to help