We focus almost exclusively on software that runs locally on linux because of all the great software that is available. But in this post we’ll take a look at a couple of web based reources for doing some pretty effective image forensics. We test drove these sites using JPEG and PNG image files with content […]
Did Google do something amazing, again? Should we even care? Is this the beginning of the end? Do we need to worry about quantum computers breaking our encryption? For the answers to these and a down-to-earth explanation of what it all means, please read on. First of all we don’t know if Google did indeed […]
Let’s now take a look at using cryptographic hashing functions in Python programs. We’ll mainly focus on the hashlib module, that provides all the common hashing functions we’re likely to need. To cover almost every use case you’ll only actually need a handful of these despite your interpreter probably supporting more. To see the hashing […]
Short or overly simple passwords are insecure. If you are using a short, memorized password then you need to change it often; if you are using a password manager use a long, complex password and you don’t need to change it as often. For short passwords do not use the first character as your required […]
There are many hashing algorithms commonly used in cryptography and they have names like SHA1, MD5 and so on. These hashing methods have advanced in the past couple of decades, and although we commonly use the older ones in our everyday lives, it’s worth briefly looking at newer and better alternatives. We explored the basic […]
How often should you change your password? Should you use a password manager? Should you store passwords in your browser? There are many common questions about passwords and password managers, so let’s take a look at a few of them. How to choose a password manager? Do you really need one? 22% of 12,500 people […]
Hashing is an essential part of modern software systems, and we’re going to explain what you need to know to use them in your programs. We’ll be focusing mainly on the terrific hashlib module in Python. We also want to stick to the most secure and most widely used cryptographic hashing functions, although there certainly […]
Passwords have been the preferred method of authenticating users since the earliest days of the Internet, and they continue to be used to this day to authenticate users. The security issues are well known, but few people consider the privacy pitfalls. Our most private digital data are protected by passwords, yet people are generally lacking […]
Smart cities hold great potential and solve all sorts of problems that our analog cities suffer from. So say the technologists that envision highly connected systems of sensors and devices that are managed by AI systems. How smoothly and efficiently our cities will be run they say, offering us many advantages based on that interconnectivity […]
China is pioneering efforts to track and surveil their citizens using AI systems with data from facial recognition systems paired with other tracking technologies. Body movement or gait analysis technology has been deployed already in Shanghai and Beijing, and perfectly complements facial recognition technology for this purpose. One company, Watrix, has software that can identify […]
The Simple Mail Transfer Protocol (SMTP) has survived to this day due to widespread use, enabling us to send email messages quickly to people all over the planet. Yet email remains a sore spot for privacy advocates and a nightmare for security professionals. Email was the first real application on the Internet, and remained the […]