Which end-to-end encrypted email is best?

After the 2013 Snowden revelations, there has been a push to make email more private than it currently is (which is, essentially, like writing on a postcard). The big guns, Google and Yahoo, have wowed to make their respective email systems end-to-end  (E2E) encrypted but progress has been slow. The official page about the Google effort has not been updated for months (as of June 2015). In this article, I go over some options available today, while we wait for that final solution that, at this pace, might still take a while to come. (more…)

Read More

PR Gomez hacked again!

It seems that hackers never stop. Well, this time I couldn’t get it fixed anymore, so I switched the engine from Joomla, which apparently is quite liable to be hacked, into WordPress. The new pages have a nicer look and it’s easier to find the content. A few articles have lost some content in the process, but I’ll get that fixed. Let me know how you like the new look.

Read More

Lessons from the VIC cipher

In the mid-1950’s, the Soviet spy Reino Hayhanen, codenamed VIC, and his handler Rudolph Abel (in the picture) pulled off an incredible feat: they utilized a paper-and-pencil cipher that not even the FBI (the NSA wasn’t operating within US borders back then) was able to crack until Hayhanen defected and explained its inner workings. Computers already existed, and they were used primarily to crack ciphers like VIC. In this article, I go over some of its features, and how they can be used to enhance other simple ciphers.

(more…)

Read More