Last week I wrote about Linux developers evaluating a new "DOITM" security mitigation for the latest Intel CPUs. While the cost for now of engaging the Data Operand Independent Timing Mode (DOITM) functionality is minimal, following internal Int...
New research has heightened an already urgent call to abandon SHA-1, a cryptographic algorithm still used in many popular online services. A new, powerful GPG collision attack on the system which could enable attackers to fake digital certificates has been discovered.
This ComputerCurrents article discusses the features in PGP (Pretty Good Privacy) encryption software, including email, file, and disk encryption. . . .
Kurt Seifried has written an article on the basics of cryptography, as well as some tips on how to use the various crypto applications for Linux. . . .
Here is another article on the DeCESS issue by C. Scott ... "A judge's decision to ban a DVD-playing Linux program and all discussion about it outrages the free-software community." . . .
This NW article discusses the results from a recent survey, "Two years from now, companies surveyed expect e-commerce to bring in an average of 41% of their total revenue, and they'll be dedicating an average of $83 million per year . . .