<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>cybersec &amp;mdash; Notes and Useful Info</title>
    <link>https://jwc.writeas.com/tag:cybersec</link>
    <description></description>
    <pubDate>Thu, 16 Apr 2026 21:57:05 +0000</pubDate>
    <item>
      <title>Articles Index and Hashtags</title>
      <link>https://jwc.writeas.com/articles-and-hashtags?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Tags: #apps | #cmb | #cosmology | #cybersec | #devel | #fediverse | #followup | #linux | #notes | #physics | #techinfo | #windows | #writeas |&#xA;&#xA;Apps | Priority To Do | Notes | Tech-Followup | WaWf list |&#xA;write.as notes | WriteFreely | Fediverse-Followup |&#xA;CMB | Cosmology | Cosmology-Followup | Physics | &#xA;Winlinks | e6430 | Cloudready | Linux |&#xA;Android Dev | Python | Symbols | WebDev |&#xA;Cipherlinks | Test | &#xA; &#xA;Note: keep this at top of blog list by updating it&#39;s date in post metadata. &#xA;!--more--&#xA;bBlog Index/b&#xA;01: Articles Index and Hashtags&#xA;Page 1&#xA;02: Apps&#xA;03: MathJax quirks/issues in Write.as&#xA;04: WSL&#xA;05: Search Test&#xA;06: Custom Javascript/CSS Coding&#xA;07: Text-Only Sites&#xA;08: DMV Tests&#xA;09: Nextcloud 16.04.1 Install on Debian 9&#xA;10: Nextcloud Docker Notes&#xA;11: Notes&#xA;Page 2&#xA;12: Nextcloud Notes&#xA;13: WA WF Code Examples&#xA;14: Phone Tips&#xA;15: Cosmology-Followup&#xA;16: Blogs Posts&#xA;17: Fediverse Followup&#xA;18: Tech Followup&#xA;19: Priority To Do&#xA;20: write.as usage notes&#xA;21: WriteFreely info, setup, and config&#xA;Page 3&#xA;22: Win1809&#xA;23: Science Projects Ideas&#xA;24: Git&#xA;25: MathJax and LaTeX&#xA;26: Latest Cosmology Results&#xA;27: WebDev&#xA;28: CyberSecurity links&#xA;29: Linux&#xA;30: e6430&#xA;31: Android Dev&#xA;Page 4&#xA;32: Cloudready&#xA;33: Winlinks&#xA;34: Ideas for More Secure or Anonymous Payments Online&#xA;35: Python&#xA;36: Test Post&#xA;37: Physics Links&#xA;38: CMB&#xA;39: Cosmology&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>Tags: <a href="https://jwc.writeas.com/tag:apps" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">apps</span></a> | <a href="https://jwc.writeas.com/tag:cmb" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">cmb</span></a> | <a href="https://jwc.writeas.com/tag:cosmology" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">cosmology</span></a> | <a href="https://jwc.writeas.com/tag:cybersec" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">cybersec</span></a> | <a href="https://jwc.writeas.com/tag:devel" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">devel</span></a> | <a href="https://jwc.writeas.com/tag:fediverse" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">fediverse</span></a> | <a href="https://jwc.writeas.com/tag:followup" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">followup</span></a> | <a href="https://jwc.writeas.com/tag:linux" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">linux</span></a> | <a href="https://jwc.writeas.com/tag:notes" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">notes</span></a> | <a href="https://jwc.writeas.com/tag:physics" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">physics</span></a> | <a href="https://jwc.writeas.com/tag:techinfo" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">techinfo</span></a> | <a href="https://jwc.writeas.com/tag:windows" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">windows</span></a> | <a href="https://jwc.writeas.com/tag:writeas" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">writeas</span></a> |</p>

<p><a href="https://write.as/jwc/apps" rel="nofollow">Apps</a> | <a href="https://write.as/jwc/priority-to-do" rel="nofollow">Priority To Do</a> | <a href="https://write.as/jwc/notes" rel="nofollow">Notes</a> | <a href="https://write.as/jwc/tech-followup" rel="nofollow">Tech-Followup</a> | <a href="https://18941969.xyz/wawf/wawf-list.php" rel="nofollow">WaWf list</a> |
<a href="https://write.as/jwc/write-as-usage-notes" rel="nofollow">write.as notes</a> | <a href="https://write.as/jwc/writefreely-setup-and-config" rel="nofollow">WriteFreely</a> | <a href="https://write.as/jwc/fediverse-followup" rel="nofollow">Fediverse-Followup</a> |
<a href="https://write.as/jwc/cmb" rel="nofollow">CMB</a> | <a href="https://write.as/jwc/cosmology" rel="nofollow">Cosmology</a> | <a href="https://write.as/jwc/cosmology-followup" rel="nofollow">Cosmology-Followup</a> | <a href="https://write.as/jwc/physics-links" rel="nofollow">Physics</a> |
<a href="https://write.as/jwc/winlinks" rel="nofollow">Winlinks</a> | <a href="https://write.as/jwc/e6430" rel="nofollow">e6430</a> | <a href="https://write.as/jwc/cloudready" rel="nofollow">Cloudready</a> | <a href="https://write.as/jwc/linux" rel="nofollow">Linux</a> |
<a href="https://write.as/jwc/android-dev/" rel="nofollow">Android Dev</a> | <a href="https://write.as/jwc/python" rel="nofollow">Python</a> | <a href="https://docs.google.com/document/d/1lDzrur_-63hRrTGavqM-cyrBdglXJilNeSWLpE2CUBE/edit?usp=sharing" rel="nofollow">Symbols</a> | <a href="https://write.as/jwc/webdev" rel="nofollow">WebDev</a> |
<a href="https://write.as/jwc/cipherlinks" rel="nofollow">Cipherlinks</a> | <a href="https://write.as/jwc/a-test" rel="nofollow">Test</a> |</p>

<p>Note: keep this at top of blog list by updating it&#39;s date in post metadata.

<b>Blog Index</b>
01: <a href="https://write.as/jwc/articles-and-hashtags" rel="nofollow">Articles Index and Hashtags</a>
<a href="https://jwc.writeas.com/page/1" rel="nofollow"><strong>Page 1</strong></a>
02: <a href="https://write.as/jwc/apps" rel="nofollow">Apps</a>
03: <a href="https://write.as/jwc/mathjax-quirks" rel="nofollow">MathJax quirks/issues in Write.as</a>
04: <a href="https://write.as/jwc/wsl" rel="nofollow">WSL</a>
05: <a href="https://write.as/jwc/search-test" rel="nofollow">Search Test</a>
06: <a href="https://write.as/jwc/custom-javascript-css-coding" rel="nofollow">Custom Javascript/CSS Coding</a>
07: <a href="https://write.as/jwc/text-only-sites" rel="nofollow">Text-Only Sites</a>
08: <a href="https://write.as/jwc/dmv-tests" rel="nofollow">DMV Tests</a>
09: <a href="https://write.as/jwc/nextcloud-16-04-1-install-on-debian-9" rel="nofollow">Nextcloud 16.04.1 Install on Debian 9</a>
10: <a href="https://write.as/jwc/nextcloud-docker-notes" rel="nofollow">Nextcloud Docker Notes</a>
11: <a href="https://write.as/jwc/notes" rel="nofollow">Notes</a>
<a href="https://jwc.writeas.com/page/2" rel="nofollow"><strong>Page 2</strong></a>
12: <a href="https://write.as/jwc/nextcloud-notes" rel="nofollow">Nextcloud Notes</a>
13: <a href="https://write.as/jwc/wa-wf-code-examples" rel="nofollow">WA WF Code Examples</a>
14: <a href="https://write.as/jwc/phone-tips" rel="nofollow">Phone Tips</a>
15: <a href="https://write.as/jwc/cosmology-followup" rel="nofollow">Cosmology-Followup</a>
16: <a href="https://write.as/jwc/blogs-posts" rel="nofollow">Blogs Posts</a>
17: <a href="https://write.as/jwc/fediverse-followup" rel="nofollow">Fediverse Followup</a>
18: <a href="https://write.as/jwc/tech-followup" rel="nofollow">Tech Followup</a>
19: <a href="https://write.as/jwc/priority-to-do" rel="nofollow">Priority To Do</a>
20: <a href="https://write.as/jwc/write-as-usage-notes" rel="nofollow">write.as usage notes</a>
21: <a href="https://write.as/jwc/writefreely-setup-and-config" rel="nofollow">WriteFreely info, setup, and config</a>
<a href="https://jwc.writeas.com/page/3" rel="nofollow"><strong>Page 3</strong></a>
22: <a href="https://write.as/jwc/win1809" rel="nofollow">Win1809</a>
23: <a href="https://write.as/jwc/science-projects-ideas" rel="nofollow">Science Projects Ideas</a>
24: <a href="https://write.as/jwc/git" rel="nofollow">Git</a>
25: <a href="https://write.as/jwc/mathjax" rel="nofollow">MathJax and LaTeX</a>
26: <a href="https://write.as/jwc/latest-cosmology-results" rel="nofollow">Latest Cosmology Results</a>
27: <a href="https://write.as/jwc/webdev" rel="nofollow">WebDev</a>
28: <a href="https://write.as/jwc/cipherlinks" rel="nofollow">CyberSecurity links</a>
29: <a href="https://write.as/jwc/linux" rel="nofollow">Linux</a>
30: <a href="https://write.as/jwc/e6430" rel="nofollow">e6430</a>
31: <a href="https://write.as/jwc/android-dev" rel="nofollow">Android Dev</a>
<a href="https://jwc.writeas.com/page/4" rel="nofollow"><strong>Page 4</strong></a>
32: <a href="https://write.as/jwc/cloudready" rel="nofollow">Cloudready</a>
33: <a href="https://write.as/jwc/winlinks" rel="nofollow">Winlinks</a>
34: <a href="https://write.as/jwc/ideas-for-anonymous-payments-online" rel="nofollow">Ideas for More Secure or Anonymous Payments Online</a>
35: <a href="https://write.as/jwc/python" rel="nofollow">Python</a>
36: <a href="https://write.as/jwc/test-post" rel="nofollow">Test Post</a>
37: <a href="https://write.as/jwc/physics-links" rel="nofollow">Physics Links</a>
38: <a href="https://write.as/jwc/cmb" rel="nofollow">CMB</a>
39: <a href="https://write.as/jwc/cosmology" rel="nofollow">Cosmology</a></p>
]]></content:encoded>
      <guid>https://jwc.writeas.com/articles-and-hashtags</guid>
      <pubDate>Sat, 03 Oct 2020 16:05:24 +0000</pubDate>
    </item>
    <item>
      <title>CyberSecurity links</title>
      <link>https://jwc.writeas.com/cipherlinks?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Application Security Resources, by Paragonie&#xA;A serious issue with aescrypt&#xA;&#xA;Myth-busting TOR&#xA;&#xA;Google made the Titan Key to toughen up your online security | Google Wants You to Use Physical Security Keys So Bad It&#39;s Willing to Sell You One |&#xA;&#xA;Protect against phone and SMS 2FA vulnerabilities:&#xA;https://www.howtogeek.com/358352/criminals-can-steal-your-phone-number.-heres-how-to-stop-them/&#xA;https://www.howtogeek.com/310418/why-you-shouldnt-use-sms-for-two-factor-authentication/&#xA;https://www.howtogeek.com/358803/what-to-do-if-you-lose-your-two-factor-phone/&#xA;&#xA;Cryptomator and Java | Cryptomator review | Cryptomator.org |&#xA;&#xA;Dan Goodin and Brian Krebs on the inadequacies of SMS-based 2FA https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/   https://krebsonsecurity.com/2018/08/reddit-breach-highlights-limits-of-sms-based-authentication/  &#xA;https://twofactorauth.org/  &#xA;&#xA;Let&#39;s Encrypt article&#xA;&#xA;5 libsodium ciphers | AEAD ciphers | Libsodium security assessment | wikipedia scrypt | &#xA;Implementations of SHA-3: Validations List by nist.gov |&#xA;&#xA;Q: For the uninformed, what&#39;s wrong with pbkdf2? [reddit thread]&#xA;A. Outdated, doesn&#39;t use memory hardness to prevent easy GPU based cracking, difficulty per attempt for crackers is unintentionally half that of the difficulty for normal users (a quirk in the math makes is more efficient to batch compute a large number of these hashes than in normal usage)&#xA;&#xA;Hashtags: #cybersec]]&gt;</description>
      <content:encoded><![CDATA[<p><a href="https://github.com/paragonie/awesome-appsec" rel="nofollow">Application Security Resources, by Paragonie</a>
<a href="https://www.reddit.com/r/privacytoolsIO/comments/b7riov/aes_crypt_security_audit_1_serious_issue_found/" rel="nofollow">A serious issue with aescrypt</a></p>

<p><a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor" rel="nofollow">Myth-busting TOR</a></p>

<p><a href="https://www.cnet.com/news/google-made-the-titan-key-to-toughen-up-your-online-security/" rel="nofollow">Google made the Titan Key to toughen up your online security</a> | <a href="https://gizmodo.com/google-wants-you-to-use-physical-security-keys-so-bad-i-1827871604" rel="nofollow">Google Wants You to Use Physical Security Keys So Bad It&#39;s Willing to Sell You One</a> |</p>

<p>Protect against phone and SMS 2FA vulnerabilities:
<a href="https://www.howtogeek.com/358352/criminals-can-steal-your-phone-number.-heres-how-to-stop-them/" rel="nofollow">https://www.howtogeek.com/358352/criminals-can-steal-your-phone-number.-heres-how-to-stop-them/</a>
<a href="https://www.howtogeek.com/310418/why-you-shouldnt-use-sms-for-two-factor-authentication/" rel="nofollow">https://www.howtogeek.com/310418/why-you-shouldnt-use-sms-for-two-factor-authentication/</a>
<a href="https://www.howtogeek.com/358803/what-to-do-if-you-lose-your-two-factor-phone/" rel="nofollow">https://www.howtogeek.com/358803/what-to-do-if-you-lose-your-two-factor-phone/</a></p>

<p><a href="https://community.cryptomator.org/t/why-is-cryptomator-written-in-java-isnt-java-insecure/37" rel="nofollow">Cryptomator and Java</a> | <a href="https://askleo.com/cryptomator-encryption-cloud-storage/" rel="nofollow">Cryptomator review</a> | <a href="https://cryptomator.org/" rel="nofollow">Cryptomator.org</a> |</p>

<p>Dan Goodin and Brian Krebs on the inadequacies of SMS-based 2FA <a href="https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/" rel="nofollow">https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/</a>   <a href="https://krebsonsecurity.com/2018/08/reddit-breach-highlights-limits-of-sms-based-authentication/" rel="nofollow">https://krebsonsecurity.com/2018/08/reddit-breach-highlights-limits-of-sms-based-authentication/</a><br/>
<a href="https://twofactorauth.org/" rel="nofollow">https://twofactorauth.org/</a></p>

<p><a href="https://choosetoencrypt.com/news/lets-encrypt-is-spreading-encryption-across-the-internet/" rel="nofollow">Let&#39;s Encrypt article</a></p>

<p><a href="https://github.com/jedisct1/libsodium/issues/554" rel="nofollow">5 libsodium ciphers</a> | <a href="https://github.com/shadowsocks/shadowsocks-org/wiki/AEAD-Ciphers" rel="nofollow">AEAD ciphers</a> | <a href="https://www.privateinternetaccess.com/blog/2017/08/libsodium-v1-0-12-and-v1-0-13-security-assessment/" rel="nofollow">Libsodium security assessment</a> | <a href="https://en.wikipedia.org/wiki/Scrypt" rel="nofollow">wikipedia scrypt</a> |
<a href="https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Validation/Validation-List/SHA-3" rel="nofollow">Implementations of SHA-3: Validations List by nist.gov</a> |</p>

<p>Q: For the uninformed, what&#39;s wrong with pbkdf2? <a href="https://old.reddit.com/r/crypto/comments/91fdkg/website_login_using_digital_signatures_derived/e2xrp9h/" rel="nofollow">[reddit thread]</a>
A. Outdated, doesn&#39;t use memory hardness to prevent easy GPU based cracking, difficulty per attempt for crackers is unintentionally half that of the difficulty for normal users (a quirk in the math makes is more efficient to batch compute a large number of these hashes than in normal usage)</p>

<p>Hashtags: <a href="https://jwc.writeas.com/tag:cybersec" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">cybersec</span></a></p>
]]></content:encoded>
      <guid>https://jwc.writeas.com/cipherlinks</guid>
      <pubDate>Tue, 25 Sep 2018 19:14:15 +0000</pubDate>
    </item>
    <item>
      <title>Ideas for More Secure or Anonymous Payments Online</title>
      <link>https://jwc.writeas.com/ideas-for-anonymous-payments-online?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Privacy.com | Amolith&#39;s messages on Privacy.com |&#xA;Lock down and protect your money.  &#xA;&#xA;Using your real card number everywhere online leaves you vulnerable. Just one security breach can expose your card number for thieves to make unauthorized purchases.&#xA;&#xA;When you use the Privacy card, you are protected.&#xA;At every place you shop, you get a unique card number that only works at each individual merchant. So if your card number becomes exposed, it can’t be used anywhere else.  &#xA;&#xA;a service that lets you create anonymous “burner” cards for purchases where you might normally use a debit or credit card. You add funds to your Privacy account and create single-use or multi-use cards with or without a spending limit. Numbers, expiration dates, and security codes are automatically generated. When giving your information to the merchant, you can provide whatever information you want and Privacy will confirm it. They operate as any other provider (Visa, Mastercard, etc.) and charge the vendor a fee for every transaction so the service is completely free for users.&#xA;\---&#xA;&#xA;Pre-paid Credit Cards - found at almost every drug store and supermarket, simply load it by paying cash upfront. The card number is untraceable and when using it to pay online, you can use any name you want. Some disadvantages:&#xA;require a minimum loading amount (usually $10 - $20)&#xA;some have a maximum loading amount&#xA;charge a fee (usually less than $5)&#xA;and in most cases, they cannot be re-loaded (even if they could, the method of re-loading could then be tied back to you)&#xA;https://top.quora.com/How-do-I-pay-anonymously-online&#xA;https://www.cogipas.com/anonymous-online-payments-explained-how-to-pay-anonymously/&#xA;&#xA;Tags: #cybersec]]&gt;</description>
      <content:encoded><![CDATA[<p><a href="https://privacy.com/" rel="nofollow">Privacy.com</a> | <a href="https://scicomm.xyz/web/statuses/103321345582688810" rel="nofollow">Amolith&#39;s messages on Privacy.com</a> |
Lock down and protect your money.</p>

<p>Using your real card number everywhere online leaves you vulnerable. Just one security breach can expose your card number for thieves to make unauthorized purchases.</p>

<p>When you use the Privacy card, you are protected.
At every place you shop, you get a unique card number that only works at each individual merchant. So if your card number becomes exposed, it can’t be used anywhere else.</p>

<p>a service that lets you create anonymous “burner” cards for purchases where you might normally use a debit or credit card. You add funds to your Privacy account and create single-use or multi-use cards with or without a spending limit. Numbers, expiration dates, and security codes are automatically generated. When giving your information to the merchant, you can provide whatever information you want and Privacy will confirm it. They operate as any other provider (Visa, Mastercard, etc.) and charge the vendor a fee for every transaction so the service is completely free for users.
-—</p>

<p>Pre-paid Credit Cards – found at almost every drug store and supermarket, simply load it by paying cash upfront. The card number is untraceable and when using it to pay online, you can use any name you want. Some disadvantages:
1. require a minimum loading amount (usually $10 – $20)
2. some have a maximum loading amount
3. charge a fee (usually less than $5)
4. and in most cases, they cannot be re-loaded (even if they could, the method of re-loading could then be tied back to you)
<a href="https://top.quora.com/How-do-I-pay-anonymously-online" rel="nofollow">https://top.quora.com/How-do-I-pay-anonymously-online</a>
<a href="https://www.cogipas.com/anonymous-online-payments-explained-how-to-pay-anonymously/" rel="nofollow">https://www.cogipas.com/anonymous-online-payments-explained-how-to-pay-anonymously/</a></p>

<p>Tags: <a href="https://jwc.writeas.com/tag:cybersec" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">cybersec</span></a></p>
]]></content:encoded>
      <guid>https://jwc.writeas.com/ideas-for-anonymous-payments-online</guid>
      <pubDate>Mon, 24 Sep 2018 23:15:07 +0000</pubDate>
    </item>
  </channel>
</rss>