Pipe 3E2 Canadian Developers Are Making the Next Tails Privacy Software

Canadian Developers Are Making the Next Tails Privacy Software

by
Anonymous Coward
in security on (#3E2)
"Whether it's the NSA exploiting weaknesses in encryption software[1], the holes in Tor[2] making it less anonymous, or the major problems with Tails[3] - vulnerabilities are constantly testing the security and anonymity of computer users.

But little known Montreal-based developers at Subgraph[4] want to change all that, and have started working on a zero-day resistant[5] Operating System (OS), protecting against infiltration.

Subgraph takes the approach that overall computer security is critical to anonymity, targeting protection against zero-day vulnerabilities, the types of weakness unknown to the developers while they're writing software."

http://motherboard.vice.com/read/canadian-developers-want-to-make-the-next-tails

[1] http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
[2] http://motherboard.vice.com/blog/tor-is-less-anonymous-than-you-think
[3] http://motherboard.vice.com/read/your-secrets-are-only-as-secure-as-the-security-tools-you-use
[4] https://subgraph.com/about-us/index.en.html
[5] http://www.pctools.com/security-news/zero-day-vulnerability/

History

2014-08-04 19:03
Canadian Developers Are Making the Next Tails Privacy Software
bryan@pipedot.org
Developers in Canada are "http://motherboard.vice.com/read/canadian-developers-want-to-make-the-next-tails">working on a new security enhanced operating system.
Whether it's the NSA exploiting weaknesses in encryption software[1], the holes in Tor[2] making it less anonymous, or the major problems with Tails[3] - vulnerabilities are constantly testing the security and anonymity of computer users.

But little known Montreal-based developers at Subgraph[4] want to change all that, and have started working on a zero-day resistant[5] Operating System (OS), protecting against infiltration.

Subgraph takes the approach that overall computer security is critical to anonymity, targeting protection against zero-day vulnerabilities, the types of weakness unknown to the developers while they're writing software."<br/>
http://motherboard.vice.com/read/canadian-developers-want-to-make-the-next-tails

[1] http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
[2] http://m
quotherboard.vice.com/blog/tor-is-less-anonymous-than-you-think>
[3]
http://motherboard.vice.com/read/your-secrets-are-only-as-secure-as-the-security-tools-you-use
[4] https://subgraph.com/about-us/index.en.html
[5] http://www.pctools.com/security-news/zero-day-vulnerability/
Reply 0 comments