Skip to content

Security

🔐 Encryption is not a loophole

It’s a lifeline

Right now, Congress is considering legislation that could effectively ban encrypted apps by forcing companies to build dangerous backdoors into private communications.

These proposals threaten the security of journalists, whistleblowers, business professionals, and everyday users who depend on end-to-end encryption to communicate safely and confidentially. 💼🛡️

EFF is sounding the alarm. And we all should be too.

🔦 FOSS Spotlight: Cryptomator

Vault Up Your Cloud Privacy

Tired of feeling like your cloud files are just floating out there, unprotected? Say hello to Cryptomator—your personal vault for keeping sensitive data safe in the cloud, without giving up open-source freedom.

🛡️ Cryptomator provides transparent client-side encryption for your cloud storage. Whether you're using Google Drive, Dropbox, OneDrive or another service, Cryptomator keeps your files encrypted and private—before they even leave your device.

🔐 Microsoft Authenticator Users: Major Change Incoming

Microsoft Authenticator is phasing out its password autofill sync feature by July 2025

🚨 Heads up! If you rely on Microsoft Authenticator's password autofill sync to store or auto-fill your passwords, you'll lose access unless you export them NOW.

But instead of just exporting... consider upgrading your security.

💡 We recommend switching to privacy-first open-source alternatives like:
Ente Auth – End-to-end encrypted, sleek UI, cross-device sync.
Aegis Authenticator – PIN-protected, backup-friendly, fully offline.

Secure Secure Shell

Originally published on 1/4/2015 by stribika at:
https://blog.stribik.technology/2015/01/04/secure-secure-shell.html
Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:
https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices
📝 NOTE: Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.

You may have heard that the NSA can decrypt SSH at least some of the time. If you have not, then read the latest batch of Snowden documents now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.

TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.