Just in time for xmas, Second byte of T.O.L.A. via another P.J.C.I.S. @ https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/Intelligence_and_Security/ReviewofTOLAAct
—
Regards, Mark A. Lane Be Protected, Get ….….. The FooKey METHOD : http://foocrypt.net/the-fookey-method The common flaws in ALL encryption technologies to date are : 1. Typing on a KeyBoard to enter the password 2. Clicking on the Mouse / Pointer device that controls the location of the cursor 3. Some person or device looking / recording your screen as you type the password 4. The human developing a password that is easily guess, or can be brute forced due to its length 5. Sharing the password with a third party to decrypt the data 6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself 7. The Right Wing Policies of the Liberal Party of Australia, being forced into law so they can all make it to the xmas party…! FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the above ‘BAD GUYS’ by providing you with software engineered to alleviate all the above. © Mark A. Lane 1980 - 2017, All Rights Reserved. © FooCrypt 1980 - 2017, All Rights Reserved. © FooCrypt, A Tale of Cynical Cyclical Encryption. 1980 - 2017, All Rights Reserved. © Cryptopocalypse 1980 - 2017, All Rights Reserved. |
-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users