This article summarizes the easiest ways to password protect or encrypt files and folders on a USB flash drive by using free software. It has solutions for Windows, Macintosh, and Linux: https://www.makeuseof.com/tag/how-to-password-protect-your-usb-stick-3-easy-ways/
I have written before about the privacy email features of ProtonMail. (See https://duckduckgo.com/?q=site%3Aprivacyblog.com+proton+mail&t=h_&ia=web for a list of my past articles.) Now the company that produces ProtonMail has announced it will provide 99.95% uptime or better. 99.95% uptime means the service will be unavailable less than an average of 8 minutes per day.
The new service level agreement (SLA) ensures that if downtime in any calendar month exceeds 0.05%, the company will issue a partial refund to all customers.
The latest ProtonMail announcement may be found at: https://protonmail.com/blog/protonmail-reliability-sla/.
A new start-up company wants you to host your own (encrypted) email messages, pictures, videos, and more where everything is under your control, not something provided by a privacy-stealing corporation.
Do you use the Gmail or Yahoo or Hotmail email services? If so, a large corporation can access your private messages for any reason at all. Or for no reason at all. The same is true for your photos, videos, contacts list, and calendar.
Your most critical data (like emails, search history, passwords, photos, and videos) is stored on massive corporate servers outside your home. Increasingly, this leaves you vulnerable to hacks, companies profiting from your data and online behavior, and mass government surveillance.
Apple has filed its formal opposition to a new bill currently being proposed by the Australian government that critics say would weaken encryption. If it passes, the “Assistance and Access Bill 2018” would create a new type of warrant that would allow what governments often call “lawful access” to thwart encryption, something that the former Australian attorney general proposed last year.
The California company said in a filing provided to reporters on Friday that the proposal was flawed. “This is no time to weaken encryption,” the company wrote. “There is profound risk of making criminals’ jobs easier, not harder. Increasingly stronger—not weaker—encryption is the best way to protect against these threats.”
Why make things easy for criminals? You can read the details in an article by Cyrus Farivar in the Ars Technica web site at: https://arstechnica.com/tech-policy/2018/10/apple-to-australia-this-is-no-time-to-weaken-encryption/.
ProtonMail, the Geneva, Switzerland-based encrypted email service, “wants you to be able to completely de-Google-fy your life,” according to CEO Andy Yen. “Come to ProtonMail, and have all the features, plus the security and the privacy that Google doesn’t provide you. So, that’s our long-term vision.”
ProtonMail is primarily different from your free email — Gmail, Yahoo!, etc. — because it encrypts your message and can’t scrape them for data. That encryption also protects them from being read by third-parties if you send an email from your ProtonMail account to another ProtonMail user. But what about encrypted docs, spreadsheets, and slideshow presentations? That’s coming, too, Yen says.
Millions of home Wi-Fi networks could be easily hacked, even when the network is protected by a strong password, thanks to a flaw in Chrome-based browsers.
Researchers at cybersecurity and penetration testing consultancy SureCloud have uncovered a weakness in the way Google Chrome and Opera browsers, among others, handle saved passwords and how those saved passwords are used to interact with home Wi-Fi routers over unencrypted connections.
Details may be found in an article by Ian Barker in the BetaNews web site at: http://bit.ly/2ClLEGv.
The governments of Australia, United States, United Kingdom, Canada, and New Zealand have made the strongest statement yet that they intend to force technology providers to provide lawful access to users’ encrypted communications. Of course, if governments can spy on your private communications via “backdoors,” it won’t be long before even enemy governments, credit card thieves, hackers around the world, and probably even your ex-spouse’s attorney will be able to do the same. Secrets don’t remain secret forever. There is no proof or even any suggestion that secret backdoors will remain secret for long.
According to an article by Juha Saarinen in the ItNews web site: