The importance of SIM card lock

Do you use Two Factor Authentication with your mobile phone? Do you use your phone as a password recovery option? In case if you are wondering what the hell is two factor authentication, let me simplify it like this. Have you coupled your Gmail/ Facebook/ etc. account with your mobile phone in a way that you receive a ‘code’ that you should enter in the web browser? If so, read on this short note.

Continue reading “The importance of SIM card lock”

Advertisements
The importance of SIM card lock

Encrypted Volumes: Header Backup is Important!

So I’ve been reading more on cryptsetup man page and found this interesting excerpt:

If the header of a LUKS volume gets damaged, all data is permanently lost unless you have a header-backup. If a key-slot is damaged, it can only be restored from a header-backup or if another active key-slot with known passphrase is undamaged. Damaging the LUKS header is something people manage to do with surprising frequency. This risk is the result of a trade-off between security and safety, as LUKS is designed for fast and secure wiping by just overwriting header and key-slot area.

Continue reading “Encrypted Volumes: Header Backup is Important!”

Encrypted Volumes: Header Backup is Important!

Expanding a LUKS encrypted disk image

Yesterday I wrote about How to create an encrypted LUKS disk image.

Today I wanted to experiment more with it. I wanted to try resizing a LUKS volume, and after one failed attempt I found a way. If you still have the disk image of yesterday’s example, just follow me. 🙂

Continue reading “Expanding a LUKS encrypted disk image”

Expanding a LUKS encrypted disk image

How to create an encrypted LUKS disk image

This could be a great alternative if you have used TrueCrypt encrypted volumes.

I’ve been a TrueCrypt lover for a long time, even after it was allegedly killed. But now I’m starting to think that it’s not a good option for long term safekeeping of my memories. At time point in a future release of Linux if dependencies for TrueCrypt stop working that’s death to my archives.  Fortunately we have LUKS since 2004! After using LUKS for a couple of years I think it’s very reliable.

Continue reading “How to create an encrypted LUKS disk image”

How to create an encrypted LUKS disk image

How I use Facebook on Android

Once installed their app, Facebook thinks they own our mobile devices.

At first, there was the peaceful all-purpose Facebook app. And some time later they separated messaging into another app, creating the Messenger. Initially it was at user’s discretion to use Messenger or Facebook app for messaging. Initially it looked polite but lately everyone was gradually forced to install Messenger. Another app… sigh! Personally, for me messaging is just messaging. I don’t want a childlike fairyland for just sending and receiving messages.

Continue reading “How I use Facebook on Android”

How I use Facebook on Android

Remove imported (stolen) contacts from Facebook

I have reasons to believe that it rather steals contacts from your phone rather than politely synchronizing them.

Once you install Facebook, it forces you to install Messenger aside. If you don’t it will keep sending you new message notifications but not letting you read them. So you install Messenger.

Continue reading “Remove imported (stolen) contacts from Facebook”

Remove imported (stolen) contacts from Facebook