Date: November 05, 2012
Filed in: concepts, frontpage

Encryption algorithms: a primer

Encryption algorithms are used to secure the content of communications and stored data.  An algorithm in general is a recipe for calculations which can be performed automatically by a computer. An encryption algorithm (also called a cipher) encrypts a readable plaintext into an unreadable ciphertext. A cipher can usually also perform the reverse operation of decrypting an unreadable ciphertext into a readable plaintext.  For encryption and decryption a cipher needs a key. The security of a cipher depends on the secrecy of the used key.  Two general categories of encryption algorithms exist:

continue reading…

Date: November 05, 2012
Filed in: concepts, frontpage, opinion

Global Spying: Realistic Probabilities In Modern Signals Intelligence

A paper on the probabilities of global internet surviellance, presented in 2010 at the Defcon conference in Las Vegas, proving to be close to what becomes common knowledge today.

In this article, we will present insight to the realistic possibilities of Internet mass surveillance. When talking about the threat of Internet surveillance, the common argument is that there is so much traffic that any one conversation or email won’t be picked up unless  there is reason to suspect those concerned; it is impossible that “they” can listen to us all.

continue reading…

Date: November 05, 2012
Filed in: announcements, frontpage

Introducing ShadowLife.cc

ShadowLife focuses on Privacy – how to protect it and why it matters.

We are committed to make information about privacy enhancing strategies and technologies accessible to non-experts and to give practical advise on how to enhance one’s own level of privacy.

continue reading…