The Major Advances In Password Cracking In The Past Five Years

Ars Technica has a fascinating article that describes the latest techniques hackers are using to crack passwords. From the article: A PC running a single AMD Radeon HD7970 GPU, for instance, can try on average an astounding 8.2 billion password combinations each second, depending on the algorithm used to scramble them. Only a decade ago, such speeds were possible only …

What Are The Most Popular and Least Popular PINs?

What the most popular and least popular numbers used for PINs? The answer is here. In this heatmap image above, the x-axis depicts the left two digits from [00] to [99] and the y-axis depicts the right two digits from [00] to [99]. The bottom left is 0000, and the top right is 9999. Color is used to represent frequency. …

Wickr: Send Self-Destructing, Encrypted Messages

  Wickr is a free app for the iPhone that allows you to send self-destructing, private instant messages to your friends. You can send text messages, video and audio messages. The whole transmission process is private — even the Wickr app developers cannot read the message, because they are encrypted before they leave your device. Wickr also has a feature …

Freedom Box: A Computer Built From The Ground Up With Privacy In Mind

The FreedomBox is basically a router loaded up with privacy-ensuring software. Once plugged into your home network, it will “protect your security, your privacy and your anonymity while you use the internet,” according to James Vasile, the executive director of the FreedomBox Foundation, the nonprofit which was formed to develop the technology using more than $85,000 raised on Kickstarter. The …

13

The Best Anonymous VPNs That Do Not Track You

A VPN or “virtual private network” is the easiest way to make your internet activities private. If you want to browse the web privately or share files privately, a VPN will encrypt and redirect your internet connections. This means all the data leaving your computer is encrypted, making it very difficult for hackers or eavesdroppers to monitor your internet connections. …

28

How to Buy Things Anonymously Using A Credit Card

In A Nutshell The paid service Blur allows you to create disposable credit cards (U.S. only) Entropay allows you to create virtual credit cards — I have not tested this service This anonymous credit card is issued from a European bank: AnonDebitCard Using Bitcoins is another good option — however be aware that Bitcoin transactions are only quasi-anonymous. Blur: Create …

1

Mesh Networking — A Better Internet Architecture

A Mesh Network (or Meshnet) is a type of network architecture where each computer is connected to neighboring computers, usually via Wi-Fi. Mesh Networks have a self-healing capability — they continue to work even if participating computers drop out. As a result, the network is typically quite reliable and cannot be easily shut down, as there is often more than one path between a source and …

Collaborative Cosumption May Change Our Economy

Collaborative Consumption is a phenomenon that grow to become highly important sector of our economy. Collaborative consumption is an economic model where products are shared or rented instead of owned. This model may become pervasive enough to replace the ownership-based model we have today. For good introduction to this movement, see the video above. It’s by Rachel Botsman, author of …