1/9/2023 0 Comments Adium gtalk not authorizedSeveral of you asked why RedPhone and TextSecure cannot be downloaded without signing up for Google Play. How to: Use RedPhone (Android), How to: Use TextSecure (Android) For more information, see GPG Tools' own FAQ on their decision. In addition, all of these tools are "free software" in the FLOSS sense that you are still allowed to freely examine, edit and redistribute GPG Mail's underlying source code. You can just use the zero-cost part of the GPG Suite. Because our PGP guide for Mac explains how to use GPG with Thunderbird, it doesn't require that component. See Google's own guide for doing this.Īdditionally, we flagged that in October 2014, the GPG Tools team, who package GPG for the Mac OS X platform, announced that they would soon be charging for GPGMail, the part of their package that lets you use GPG with Apple's Mail application. Instead, you will need to create a new application-specific password for Thunderbird to access your Gmail account. If you use two-factor authentication with Google (and depending on your threat model you probably should!) you cannot use your standard Gmail password with Thunderbird. How to: Use PGP for Linux, How to: Use PGP for Mac OS X, How to: Use PGP for Windows PC The article expands on the level of this risk, based on your threat model. That means that the software you download could potentially be tampered with before you download it. While Pidgin's download page uses " HTTPS " and is therefore relatively safe from tampering, the website it directs you to to download the Windows version of Pidgin is currently Sourceforge, which uses unencrypted "HTTP," and therefore offers no protection. The article now explains how to disable Adium notifications so they will not be logged by the underlying operating system. How to: Use OTR for MacĪn issue was found with Adium notifications on OS X they are logged by default, meaning there is a record of Adium chats even if logging is turned off. (If you use RedHat, Fedora, OpenSUSE, or Mandriva, and know how to use alien to convert packages from deb format to rpm, you can find the deb for secure-delete here.) The article explains what to do once it's installed. Secure-delete is available for Debian, Mint, and Ubuntu but is not installed by default, so you’ll probably need to install it using your distribution’s package management software (sometimes known as a “Software Manager”). On a *nix operating system, we recommend using sfill to securely delete anything left in the free space of your drive. Please keep in mind that some feedback may take longer to incorporate than others, so if you've made a substantive suggestion, we may still be working on it! How to: Delete Your Data Securely We'd like thank everyone for all the messages you've sent and encourage you to continue providing your notes and suggestions, which helps us preserve SSD as a reliable resource for people all over the world. Many of these changes are based on reader feedback. We'll be blogging regularly here to catalog the clarifications, corrections and new information we've added to the site. One of our aims in creating Surveillance Self-Defense (SSD) is to provide a resource for combatting online spying that is quickly and consistently updated to keep track of current events and the changing capabilities of both protective tools, and the attackers they defend against.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |