In their endless search for the quick fix, politicians forget that strong encryption is what keeps us safe every day. Without strong encryption, credit card and bank transactions would be open to interception and alteration as they fly across the Internet. Sadly our intelligence agencies have a hard … [Read more...]
Hacker Lexicon: What Is Perfect Forward Secrecy?
How secret do we need to be? Read this, even your banks website with "https" may not be enough. Read more... … [Read more...]
Ironic Windows Vulnerability Shows Why Backdoors Can’t Work
Remember when the FBI wanted Apple to add a backdoor to the iPhone? Well here's why Apple refused. Read the article... … [Read more...]
Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us
Encryption and the applications that use it don't just appear by magic and the complexity takes time (and money) to code and test. Apps are only recently appearing that are both unbreakable secure and easy to use. It takes a true believer to make all this happen and true believers are not your … [Read more...]
May 2016: John Patrick on Net Attitude
As Bert Goff noted in his introduction, this was John R. Patrick’s 24th presentation at a DACS General Meeting. We invite him back because we learn something new every time. Year after year, John’s presentation is always our best-attended meeting. The kicker to all this is that it really puts the … [Read more...]
Top iPhone Hackers Ask Court to Protect Apple From the FBI
Top iPhone Hackers Ask Court to Protect Apple From the FBI … [Read more...]
Secure Digital Communications – Bruce Preston
DACS guru Bruce Preston was our presenter at the November 2014 general meeting on the topic of secure digital communications. He covered a lot of technical content but made it accessible by relating it to historical and current use of the technology for encrypting data. First he got some … [Read more...]
Secure Digital Communications
Presenter: Bruce Preston Date: Tuesday, November 4, 7 p.m. Location: Danbury Hospital Auditorium Have you ever wondered how private and personal information can be exchanged between your computer and a remote site such as a bank or an on-line retailer? The answer is that it is done by way … [Read more...]