Recent blog posts

subscribe via RSS

Step-by-Step Instructions to Get Cryptomator Going (Windows Version) (2017-05-24)

In my last post, I described Cryptomator, a free (pay what you want), open-source program that offers transparent, automatic, file-by-file encryption. Now here are detailed step-by-step instructions to get it going.

Cryptomator - Transparent File-By-File Encryption for Untrusted (Cloud) Storage (2017-05-07)

When you want to store confidential data on less trusted (cloud) storage, you need to encrypt it. Container methods, packing many files into one encrypted container file, like VeraCrypt or ZIP, have disadvantages. Cryptomator is a relatively new, free (pay what you want), open-source program that offers transparent, automatic, file-by-file encryption. Read on for more details.

Privacy-Respecting Browser Add-Ons (2017-05-02)

There are credible claims, outlined in this blog post, that many browser add-ons are sending your full browsing history to analytics companies that may sell this information to anyone willing to pay a certain sum of money. To be sure which browser add-ons are benign, I have used the technique described in this blog post to analyze the traffic generated by certain popular browser add-ons and similar products. The results seem to indicate that the more tracking protection a product claims, the more risk there is that it replaces external tracking with its own tracking.

Mitmproxy Cheat Sheet (2017-02-10)

When starting to use Mitmproxy (see also my blog post about setting it up), you need to remember a significant number of details. To help you in this, I have compiled frequently used items in “cheat sheet” style - no background explanation, but a concise list of vocabulary. Much of this is copied, selected and rearranged from . In the first sections, I’m only listing what I regularly need, while the Appendices contain the full data.

How to Set Up a Hosting Package, the Manual Way (2017-02-09)

In this post, I’m describing what it takes to set up a website and a few email addresses, if your usual web hosting company won’t do it at a reasonable price. None of these steps are unusual, but it is nice to have them written down in one place, including working examples of the syntax. The target audience are IT technicians, who might end up doing this for several domains.

Complete list of all blog posts