Will you be my cryptovalentine?


Roses are red, violets are blue; I use free software to encrypt my online communication and so should you.
Valentine's day is this Saturday and, if you're like us, you're either trying to pick the right gift or wishing you had someone to exchange gifts with. We wish you luck with that. But there's something important that you can do regardless of your relationship status:
Ask someone you like -- romantically or otherwise -- to be your cryptovalentine. If they say yes (yikes, nervous!) use the free program GnuPG to set up private and encrypted communication with them. If one or both of you is new to GnuPG, we recommend our beginner-friendly Email Self-Defense guide. Setting up encrypted communication is a quick activity you can do together whether you are across the room or across the world. And what better way to show love than help them defend their security, privacy and freedom?
-
- Login or register to post comments
Printer-friendly version
- 5858 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Proteus Device is a secure, Linux-based handheld (not a smartphone)
The Proteus Device from XXLSEC is a handheld computer with a 5 inch touchscreen display and a secure, Linux-based operating system called PriveOS.
At first glance, it looks a lot like a smartphone. But the Proteus Device does not have a cellular modem and it’s not designed to make phone calls.
What it does have that you won’t find on most phones, is an Ethernet port.
| Why secure web-based applications with Kali Linux?
The security of web-based applications is of critical importance. The strength of an application is about more than the collection of features it provides. It includes essential (yet often overlooked) elements such as security.
Kali Linux is a trusted critical component of a security professional’s toolkit for securing web applications. The official documentation says it is “is specifically geared to meet the requirements of professional penetration testing and security auditing.“ Incidences of security breaches in web-based applications can be largely contained through the deployment of Kali Linux’s suite of up-to-date software.
|
today's leftovers
| Latte bug fix release v0.9.5
Latte Dock v0.9.5 has been released containing important fixes and improvements!
|
Recent comments
2 hours 12 min ago
7 hours 19 min ago
7 hours 24 min ago
8 hours 6 min ago
8 hours 40 min ago
9 hours 8 min ago
9 hours 15 min ago
9 hours 56 min ago
10 hours 36 min ago
10 hours 57 min ago