If you're a software developer working ethically you're almost certainly using GnuPG to sign your work. And if you've been at it for any length of time you've almost certainly been forced to switch machines. Unless your aim is to create a new identity for each machine you use (please don't) you need a simple, repeatable strategy moving GPG keys privately. Let me show you how.
A friend in Bali handed me a 1 terabyte external SATA drive recently and that's great because the device is an integral part of a 3-2-1 backup strategy I'm adopting after Apple Care suggested I make a full backup of my 15” MacBomb Pro.
The principle is simple:
3 copies, 2 different types of storage (physical and in the cloud for example) and one copy being physically separated from the othersEmanuele M. Monterosso
Of the 3 copies I needed 2 are complete. One copy is stored on MicroSD and kept with me. The other encrypted in the cloud on a Scaleway server in France. The last copy is going on the external SATA drive given to me last week which I will physically separate with and hide somewhere in Bali.
In this post I will show you how to securely store your backup data with two layers of encryption on an external drive or disk. After securing the disk we will start to automate the creation of space-efficient backups. Tools we'll be using include GNU Parted, DMCrypt, a device-mapper crypto target, and Borgmatic to automate our backups in a expressive way.
After switching from macOS to Manjaro on my MacBook Pro I was in need of a truly encrypted back-up solution. After considering a host of backup tools, including
Restic, I opted for a less mainstream tool which supports
blake2 encryption, gives you your private key, and, as an added bonus, churns out the smallest backups possible for use in cloud storage scenarios:
In this post I'll cover how to migrate encrypted Borg backups from any system which can run MinIO to a cloud services provider offering 500GB object storage for less than 6€ per month: Scaleway – a service brought to my attention by a friend and fellow After Dark user named Teo.
Read on to learn how to create Borg backups with MinIO and Scaleway.
Unless you've been living under a rock you already know the guy behind WikiLeaks, who was living at an Ecuadorian embassy in London, was recently arrested and now facing extradition to the United States – the country I'm originally from – and the country which forces tax payers to fund the second-largest stockpile of nuclear weaponry ever created.
But perhaps you didn't know that WikiLeaks was at one point hosted by Amazon. Yep, right up until political pressure caused them to take it down. Afterall, nothing says freedom like a fear of misbehavior in a country with the highest incarceration rate in the entire world. I suppose Julian Assange's situation could be worse… Maybe, had he also been practicing Falun Gong in China. But I digress. And there's no telling what's going to happen.
After hacking Android onto an HD2 previously running Windows Mobile I quickly became challenged with the task of recalling passwords for frequently used apps – apps like Telegram, ProtonMail, Binance, Snapchat you name it.
And although long-term password management may feel like a burdensome task to some a steadfast approach is critical for security and relatively painless for anyone who's been using a KeePass port the last decade.
After recently losing a USB flash drive with all my passwords on it, I was grateful for the precaution I took by storing my password data encrypted using Brad Greenlee’s PassKeeper password manager.
PassKeeper is a Windows utility that allows you to keep a list of accounts with usernames, passwords, and notes. This list is stored encrypted.passkeeper.com