Day: March 8, 2017
RT @whispersystems: Today’s Signal for Android and iPhone release includes beta support for encrypted video calling: whispersystems.org/blog/signal-vi…
@mathangcito @RohanV It was part of Quint article.
RT @whispersystems: The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal…
{ Block includes Tweeting the article and caricatures.. Hmmmmm } thequint.com/india/2017/03/… pic.twitter.com/xGsUFWwEHG
{ Block includes Tweeting the article and caricatures.. Hmmmmm }
Book: Narrative of the Life of Frederick Douglass, an American Slave
Book: Narrative of the Life of Frederick Douglass, an American Slave
Narrative of the Life of Frederick Douglass published in 1845 is probably the most popular and well written Auto Biography written by former slave and then abolitionist Frederick Douglass. The narratives are simple, plain and yet powerful. It’s a story of a boy who wants to be free.
Why India is so vulnerable to Cyber Attacks?
Why India is so vulnerable to Cyber Attacks?
In mid-August, news reports on the Scorpène leak — over 22,000 pages of sensitive data related to India’s Scorpène-class submarines was compromised — sent the Indian Navy and the government into a tizzy.
Aral Balkan — Encouraging individual sovereignty and a healthy commons
Aral Balkan — Encouraging individual sovereignty and a healthy commons
Mark Zuckerberg’s manifesto outlines his vision for a centralised global colony ruled by the Silicon Valley oligarchy. I say we must do the exact opposite and create a world with individual sovereignty and a healthy commons.
Components of Secure Home Office Network – Part II
Components of Secure Home Office Network – Part II
This is Part II of my series on designing a secure home office network. Here I am detailing the components used in that network, including software and hardware I used. This is not achieved with just one device or product, nor it’s a one size fits all.
Securing a Home Office Network
Securing a Home Office Network
Here I am going against the rule and sharing my network diagram with public. I am a security consultant and auditor, and my job mostly is to suggest best practices in data and network security to my customers. I do sometimes believe in practice what you preach.