links.txt

(8 KB) Pobierz
011
	Further reading on quantum computing and its effect of cryptography - NIST Reports
	http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/pqcrypto-2016-presentation.pdf
	
	N.S.A. Able to Foil Basic Safeguards of Privacy on Web
	http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?pagewanted=all

012
	Inception
	https://github.com/carmaa/inception
	
	Inception over firewire attack - video
	https://www.youtube.com/watch?v=oW2ABJ0SN88
	
	Passware Kit Enterprise - Hard Disk Decryption
	http://www.lostpassword.com/hdd-decryption.htm
	
	Windowsscope
	http://www.windowsscope.com/?page=shop.product_details&flypage=flypage.tpl&product_id=24&category_id=1&option=com_virtuemart&Itemid=34
	
	Choose the Right BitLocker Countermeasure
	https://technet.microsoft.com/en-us/library/dn632181.aspx
	
	Intel? Virtualization Technology for Directed I/O (VT-d): Enhancing Intel platforms for efficient virtualization of I/O devices
	https://software.intel.com/en-us/articles/intel-virtualization-technology-for-directed-io-vt-d-enhancing-intel-platforms-for-efficient-virtualization-of-io-devices
	
	Wikipedia - Disk encryption
	https://en.wikipedia.org/wiki/Disk_encryption
	
	Cold Boot Attack Demo - Video
	https://www.youtube.com/watch?v=vWHDqBV9yGc
	
	nullcon Goa 2015: Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video
	https://www.youtube.com/watch?v=ZHq2xG4XJXM
	
	Report - Cold Boot Attack on DDR2 and DDR3 RAM
	http://nullcon.net/website/archives/ppt/goa-15/cold-boot-attack-on-ddr2-and-ddr3-ram.pdf
	
	Evil Maid goes after TrueCrypt!
	https://theinvisiblethings.blogspot.ru/2009/10/evil-maid-goes-after-truecrypt.html
	
	Security Pitfalls in Cryptography
	https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html
	
013
	Security Pitfalls in Cryptography
	https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html
	
014
	Truecrypt v7.2 (latest full version) - Download
	https://www.grc.com/misc/truecrypt/truecrypt.htm
	
	Veracrypt
	https://veracrypt.codeplex.com/
	
	CipherShed
	https://www.ciphershed.org/
	
	DiskCryptor
	https://diskcryptor.net/wiki/Main_Page
	
	Symantec Drive Encryption
	https://buy.symantec.com/estore/clp/productdetails/pk/drive-encryption
	
	BestCrypt Container Encryption
	http://www.jetico.com/products/personal-privacy/bestcrypt-container-encryption
	
	Windows BitLocker
	https://technet.microsoft.com/en-us/library/cc766295%28v=ws.10%29.aspx
	
	Comparison of disk encryption software From Wikipedia
	https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software
	
015
	Windows BitLocker Drive Encryption Step-by-Step Guide
	https://technet.microsoft.com/en-us/library/cc766295%28v=ws.10%29.aspx
	
	What's new in Windows 10, versions 1507 and 1511
	https://technet.microsoft.com/itpro/windows/whats-new/whats-new-windows-10-version-1507-and-1511
	
	YUBIKEYS
	https://www.yubico.com/products/yubikey-hardware/
	
	Every Windows 10 in-place Upgrade is a SEVERE Security risk
	http://blog.win-fu.com/2016/11/every-windows-10-in-place-upgrade-is.html
	
016
	ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT
	https://theintercept.com/2015/04/27/encrypting-laptop-like-mean/
	
017
	Veracrypt
	https://veracrypt.codeplex.com/
	
	IsTrueCryptAuditedYet? Yes!
	http://istruecryptauditedyet.com/
	
	GERMAN GOVERNMENT AUDITS TRUECRYPT
	https://threatpost.com/german-government-audits-truecrypt/115441/
	
	Truecrypt 7 Derived Code/Windows: Drive Letter Symbolic Link Creation EoP
	https://bugs.chromium.org/p/project-zero/issues/detail?id=538&redir=1
	
	Truecrypt 7 Derived Code/Windows: Incorrect Impersonation Token Handling EoP
	https://bugs.chromium.org/p/project-zero/issues/detail?id=537&redir=1
	
	http://www.openwall.com/lists/oss-security/2016/01/11/1
	
	
	Nitrokey.com
	https://www.nitrokey.com/
	
	yubico.com
	
	
	VeraCrypt - Operating Systems Supported for System Encryption
	https://veracrypt.codeplex.com/wikipage?title=Supported%20Systems%20for%20System%20Encryption
	
	Report - UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS
	http://www.uefi.org/sites/default/files/resources/UEFI_Secure_Boot_in_Modern_Computer_Security_Solutions_2013.pdf
	
	https://sourceforge.net/p/veracrypt/code/ci/master/tree/src/Boot/EFI/Readme.txt#l19
	
	
	Veracrypt FAQ
	https://veracrypt.codeplex.com/wikipage?title=FAQ
	
018
	https://diskcryptor.net/
	
	https://www.ciphershed.org

	BestCrypt Volume Encryption
	http://www.jetico.com/products/personal-privacy/bestcrypt-volume-encryption
	
	Symantec Drive Encryption
	https://buy.symantec.com/estore/clp/productdetails/pk/drive-encryption
	
	Comparison of disk encryption software From Wikipedia
	https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software
	
019
	VeraCrypt - Beginner's Tutorial
	https://veracrypt.codeplex.com/wikipage?title=Beginner%27s%20Tutorial
	
020
	OS X Security and Privacy Guide - full disk encryption
	https://github.com/drduh/macOS-Security-and-Privacy-Guide#full-disk-encryption
	
	Use FileVault to encrypt the startup disk on your Mac - Apple
	https://support.apple.com/en-us/HT204837
	
	Report - Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
	https://eprint.iacr.org/2012/374.pdf
	
021
	Startup key combinations for Mac
	https://support.apple.com/en-us/HT201255
	
	DeepSleep - Hibernate your Mac
	http://www.axoniclabs.com/DeepSleep/
	
	pmset -- manipulate power management settings - Man Page
	https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man1/pmset.1.html
	
	Report - Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
	https://eprint.iacr.org/2012/374.pdf
	
	Report - Security Analysis and Decryption of FileVault 2 IFIP WG 11.9
	https://www.cl.cam.ac.uk/%7Eosc22/docs/slides_fv2_ifip_2013.pdf
	
	Apple Technical White Paper - Best Practices for Deploying FileVault 2
	http://training.apple.com/pdf/WP_FileVault2.pdf
	
022
	Plain dm-crypt
	https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Plain_dm-crypt
	
	LUKS support for storing keys in TPM NVRAM
	https://github.com/shpedoikal/tpm-luks
	
	Two factor authentication with Yubikey for harddisk encryption with LUKS
	https://www.howtoforge.com/ubuntu-two-factor-authentication-with-yubikey-for-harddisk-encryption-with-luks
	
	Yubikey Two-factor Authentication Full-disk Encryption via LUKS
	https://askubuntu.com/questions/599825/yubikey-two-factor-authentication-full-disk-encryption-via-luks
	
023
	The Debian Administrator's Handbook
	https://debian-handbook.info/browse/stable/sect.installation-steps.html
	
	Cryptsetup & LUKS
	https://gitlab.com/cryptsetup/cryptsetup
	
	zuluCrypt
	https://mhogomchungu.github.io/zuluCrypt/
	
	Arch - dm-crypt/Encrypting an entire system
	https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system
	
	Arch - Disk encryption
	https://wiki.archlinux.org/index.php/Disk_encryption
	
024
	Arch - Encrypted boot partition (GRUB)
	https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Encrypted_boot_partition_.28GRUB.29
	
	Two factor authentication with Yubikey for harddisk encryption with LUKS
	https://www.howtoforge.com/ubuntu-two-factor-authentication-with-yubikey-for-harddisk-encryption-with-luks
	
	Yubikey Two-factor Authentication Full-disk Encryption via LUKS
	https://askubuntu.com/questions/599825/yubikey-two-factor-authentication-full-disk-encryption-via-luks
	
025
	Report - Ten Reasons to Buy Self-Encrypting Drives
	https://www.trustedcomputinggroup.org/ten-reasons-buy-self-encrypting-drives/
	
026
	TRESOR Runs Encryption Securely Outside RAM
	https://www1.informatik.uni-erlangen.de/tresor
	
	Security Requirements and Precautions
	https://veracrypt.codeplex.com/wikipage?title=Security%20Requirements%20and%20Precautions
	
027
	http://www.peazip.org/
	http://www.kekaosx.com/en/
	https://www.aescrypt.com/
	https://www.gnupg.org/
	
028
	Key disclosure law From Wikipedia
	https://en.wikipedia.org/wiki/Key_disclosure_law
	
	veracrypt - Hidden Volume
	https://veracrypt.codeplex.com/wikipage?title=Hidden%20Volume
	
	Arch - Plain dm-crypt
	https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Plain_dm-crypt
	
	veracrypt - Plausible Deniability
	https://veracrypt.codeplex.com/wikipage?title=Plausible%20Deniability
	
	Appeals Court Upholds Constitutional Right Against Forced Decryption
	https://www.eff.org/press/releases/appeals-court-upholds-constitutional-right-against-forced-decryption
	
	https://xkcd.com/538/ - Cartoon
	
030
	KINGPIN: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
	https://www.kingpin.cc/
	
	Darkmarket
	https://www.amazon.com/Darkmarket-Misha-Glenny/dp/1847921272
	
	Hacking Godfather ?Maksik? Sentenced to 30 Years by Turkish Court
	https://www.wired.com/2009/01/hacking-godfath/
Zgłoś jeśli naruszono regulamin