Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] Firefox Mobile is Coming to Linux, TrueCrypt 6.3 Released

  • Subject: [News] Firefox Mobile is Coming to Linux, TrueCrypt 6.3 Released
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Fri, 23 Oct 2009 13:50:39 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Firefox Mobile on the way

,----[ Quote ]
| The current version of Fennec - which is 
| available in an early alpha form for Maemo 
| devices such as Nokia's latest N900 smartphone 
| - is based on the Firefox 3.6 rendering engine, 
| which is a step ahead of the engine used in the 
| current desktop release of the browser. This 
| technology means that when Fennec finally hits 
| 'phones, it will offer the a complete browsing 
| experience - in Lilly's words, "a browser that 
| [does] everything - JavaScript, CSS, Flash, SVG 
| [Scalable Vector Graphics], video and audio."
`----

http://www.bit-tech.net/news/bits/2009/10/22/mobile-firefox-on-the-way/1

TrueCrypt 6.3 released

,----[ Quote ]
| The TrueCrypt developers have released version 
| 6.3 of their open source, cross platform, disk 
| encryption tool. 
`----

http://www.h-online.com/open/news/item/TrueCrypt-6-3-released-836232.html


Related:

TrueCrypt 5.0 Released

,----[ Quote ]
| We are pleased to announce that TrueCrypt 5.0 has been released. Among the 
| new features are the ability to encrypt a system partition or entire system 
| drive (i.e. a drive where Windows is installed) with pre-boot authentication, 
| pipelined operations increasing read/write speed by up to 100%, Mac OS X 
| version, graphical interface for the Linux version, XTS mode, SHA-512, and 
| more.      
`----

http://www.truecrypt.org/news.php


Truecrypt 5 Linux Screencast

http://www.youtube.com/watch?v=cUqR5fTH1y4


Microsoft could be teaching police to hack Vista

,----[ Quote ]
| Microsoft may begin training the police in ways to break the
| encryption built into its forthcoming Vista operating system.
`----

http://www.vnunet.com/vnunet/news/2150555/microsoft-teaching-police-hack


UK holds Microsoft security talks

,----[ Quote ]
| "UK officials are talking to Microsoft over fears the new version of 
| Windows could make it harder for police to read suspects' computer files."
`----

http://news.bbc.co.uk/1/hi/uk_politics/4713018.stm


Symantec antivirus makes encrypted files inaccessible on Vista

,----[ Quote ]
| Microsoft is plugging the Encrypted File System (EFS) feature on
| Vista for mobile users as an important security enhancement. It's
| potentially a good thing too, in case your notebook gets stolen,
| but it's something of a nightmare scenario if popular antivirus
| programs like Symantec don't play nicely with it.
`----

http://www.geekzone.co.nz/juha/2381


Vista encryption 'no threat' to computer forensics

,----[ Quote ]
| "We're seeing the same concerns with Vista as we saw with XP over the
| idea that built-in encryption features might frustrate law
| enforcement efforts. In practice XP has not proved to be a problem
| for computer forensics and we don't think Vista will be either,"
| said Bill Thompson, director of professional development and
| training at Guidance Software.
`----

http://www.theregister.co.uk/2007/02/02/computer_forensics_vista/


Hardware-based encryption will win in the laptop market

,----[ Quote ]
| Software-based encryption required about 20 to 30 percent CPU utilization for 
| cryptographic operations. CPU utilization using a Seagate encrypting hard 
| drive was zero percent. What about overall system latency? The hardware 
| introduces almost none; you are talking microseconds.   
`----

http://www.news.com/8301-10784_3-9802700-7.html?part=rss&subj=news&tag=2547-1_3-0-20


Trusted storage specs near completion

,----[ Quote ]
| Under the new guidelines, drive encryption and decryption is performed 
| through hardware on the drive. Devices that currently use software 
| encryption will still be able to interact with trusted storage drives.
`----

http://www.theregister.co.uk/2007/06/21/trusted_computing_drafts_hdd_security/


Who do You Trust with Your Computing?

,----[ Quote ]
| Helios was speaking out against trusted computing (TC) and Digital
| Rights Management (DRM) that is humming softly at the hardware and
| software level inside YOUR computer right now. That's right! Chances
| are, it's already made it on a chip on your and my motherboards...but
| it's there. Soon, if what can happen does happen...we'll all be so
| very unhappy at being told how we can and can't operate our PCs.
| 
| Some of you may be asking, "what the heck are you talking about?
| They can't tell me how I can use my computer inside my own home".
| Unfortunately, that statement is false. DRM chips are already on a
| majority of motherboards and even built into some processors (viiv 
| anyone?). All it takes is a flip of the switch and you'll do what
| Microsoft or any other company that wants to manage your rights
| for you tells you to do whether you like it or not. That is, ofc
| ourse, unless you use Linux :)  Linux has always been about
| choice...we choose to compute in ways WE want to...not ways
| that are defined for us.
`----

http://linux-blog.org/index.php?/archives/176-Who-do-You-Trust-with-Your-Computing.html


Defense kicks off open-source encryption program

,----[ Quote ]
| "Interests within the DOD were pleased with the results of the
| initial OpenSSL validation program and have identified extensions
| to that work for greater availability of FIPS 140-2 validated
| open- source software for use within DOD IT systems," Weathersby said. 
`----

http://www.gcn.com/online/vol1_no1/43425-1.html


PGP creator: Net is like 'downtown Bagdad'

,----[ Quote ]
| Developed to help human rights activists to communicate safely via the
| net, Zimmermann's software is deployed by more than 35,000 businesses
| and millions of individuals. In the last 15 years encryption has grow 
| from a product of questionable legal status to a government-mandated
| approach to protecting sensitive ecommerce transactions.
| 
| Strong encryption used to be viewed as something 'dodgy', prompting
| the question: "what are you trying to hide". Now firms are legally
| rquired to encrypt data or risk falling foul of information disclosure
| laws and corporate governance regulations.
`----

http://www.theregister.co.uk/2006/11/21/pgp_at_15/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkrhpp8ACgkQU4xAY3RXLo5C0gCgif0qqk+hgEkdFeAjivm7IG/c
EZUAnjlgP4hW9HhKss87AMY22gkNyOno
=GXw3
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index