Boot loader encryption

We learned how to perform a full (root) disk encryption couple posts ago.

Today we will take some steps in order to encrypt the boot loader partition.


Read more


Encrypted emails part 2 of 2

From the previous part we learned how to create a keypair and gpg configuration file.

The last email encryption part will cover the installation and usage of an text based email client called Mutt.


Read more


Encrypted emails part 1 of 2

We revisit the email encryption one more time.

In the first part we will talk about key creation which is the first self-defense step towards overreaching and out of control goventments/regime.


Read more


Popular Tags

Recent Posts