Renzhi Safe v2.2.0 is released today, with some new features and enhancement. Please read the release notes here for information. The user’s guide has also been updated with description of new functionalities.
Archive for the ‘Crypto’ Category
Ok, back from an exhausting Chinese New Year holiday, year of the Dragon. I finally got some times today, and in the next few days, to work on Renzhi Safe again. I’ll work on adding some new features, those that I always wanted, and follow up with some fixes for problems that users had run [...]
According to a research team, disk encryption is hampering law enforcement, and federal agencies are unable to get at data on an encrypted disk. Contrary to what we all see in the movies and on television, cracking an encrypted drive is not a simple thing; in fact, it’s so difficult that if someone has encrypted [...]
As an update to the previous post, now California’s governor is vetoing legislation requiring police to obtain a court warrant to search the mobile phones of suspects at the time of any arrest. Read the story here. What happens to the Bill of Rights?
Police can now search your phone without warrant, at least in Florida and Georgia, and now in California as well. Read the story here, and the commentary by UCSD law professor Shaun Martin. Another reason to install Renzhi Safe on your Android device, and have your personal information locked in an encrypted safe. I know, [...]
After getting my Android phone, I was looking for an app that would allow me to create an encrypted virtual disk (or volume, or a safe), and that would allow me to put anything in it, securely. I kept looking in the Android app store for a while, there are tons of tools for managing [...]
Today, I found an old ePass3000 token in a drawer, a token that I used for developing crypto applications on Windows a while ago. Well, let’s see if that hardware works on Linux. After taking a look, it seems that this specific token is supported by OpenSC and OpenCT. Let’s install the packages first: $ [...]
As IC card’s use becomes more widespread, and even more are used for transaction, authentication, data encryption and decryption, key management of a distributed IC card system becomes a critical security issue. Although the traditional way of asymmetric key management and exchange is more secure, however, it is more complicated to manage, and requires more [...]