Posts Tagged ‘encryption’
by adminadam in home
A Brief Treatise on the Futility of Mainstream Political Action and the Promise of Smart Contracts and Cryptographic Governance
Before I touch on new techniques available to the aspiring political entrepreneur I would like to set the scene with a bleak but informative view of the poverty of our modern, mainly American, political system (not to exclude anyone!).
Public opinion has no statistically-significant impact on public policy in the United States, whereas special interests can block any bill they dislike whilst, more often than not, getting the OK from congress for their own bills.
Unless you are one of the power elite your vote, your political opinion doesn’t matter.
And while the creator of this video would have you believe that there are ways to fix this broken system, I view things more cynically. I would like to make corruption illegal, don’t get me wrong. But I have a feeling that a movement to do so would be co-opted. I see that power elites corrupt and undermine popular political movements and figures on the daily. I see that they control the media and manipulate and sculpt our attention, too. They do this, as Noam Chomsky described, by encouraging lively debate within narrow bands of opinion:
“The smart way to keep people passive and obedient is to strictly limit the spectrum of acceptable opinion, but allow very lively debate within that spectrum – even encourage the more critical and dissident views. That gives people the sense that there’s free thinking going on, while all the time the presuppositions of the system are being reinforced by the limits put on the range of the debate.”
Thus we are diverted from meaningful, profound discussions on a full-range of important issues. Instead, we seem to either A) partake in the spectacle of superficial, divisive debates orchestrated by Puppet Authority Figures on either delimited side of the argument, B) switch to thinking about the next pressing issue, “in other news…”, or C) take hit after hit of interminably-juicy celebrity gossip. The populous is dumb and it has been made dumb with brutal efficiency. But this is not the only reason that I have doubts about the promised, this-time-it’ll-be-different, Represent-Us Revolution, the plan for which you might be led to peruse if you watched until the end of the above video.
Let’s take a moment to review the basic situation here in America, and then I’ll tell you why I am not going to bother with this or any other mainstream progressive reformist movement for political change in the foreseeable future:
- Like they say in the video, politicians have been bought and sold for at least 40 years in the United States. The people that run the country are in bed with the people that run the largest corporations, and only the power elite get their policies enacted with anything more than a jackpot-lottery-ticket-winning success rate. We are dealing with a more-or-less self-sustaining, self-correcting system, a well-oiled machine.
- The American people are uneducated and ignorant of the workings of the machine. In fact, they are prevented from getting an education — at least insofar as they are given no regular opportunities to get exposure to nuanced, unbiased debates on wide-ranging, un-preselected topics. Americans don’t necessarily inherently value intellectual pursuits or learning in general either as far as I can tell. And yet we are impoverished not only in terms of knowledge and understanding…
- The American people are impoverished through excessive taxation (upwards of 50%) and the intentional and unchecked inflation of their currency by the Federal Reserve Banking System; hence, they have not the money or time to care about fomenting political change. Our mental and financial resources are drained in other nefarious ways as well, like through the attention-grabbing, counterproductive drug war.
- America is constantly at war — no, it’s not just with drugs — and the dispossessed (on both sides of the world) are the ones footing the bill.
- We know that if we speak out about corruption, warmongering, taxation, coercion, the broken health-care system, or the destruction of the environment, that we are more likely to be scrutinized by Five Eyes Intelligence Agencies. Although we may not care on average as Americans that we are being spied upon, Edward Snowden and others have worked tirelessly to bring it to our attention. Those that do care and are politically and technically savvy enough perhaps know better now the extent of the surveillance and understand better the design of the Panopticon, feel its chilling effects more profoundly in their bones. It is a scary time to promote and make plans for radical, political and economic deviations from the status quo. But that fear… Perhaps it is the sign that we are entering new territory. So what would moving forward actually look like?
On to the root of the issue of how to — or how not to — create change:
The problem with Occupy, the Tea Party, Revolution.us, and the next dozen yet-to-be-shouted-from-the-rooftops Movements fed up with the status quo is that their solutions regularly rely upon established practices, methods, and institutions. They march, write, phone-in, text, plead, promote, proselytize, fund-raise, and propose legislation. Surely for their supporters, seeing a Movement Member interviewed on the nightly news is exhilarating. And it happens to some extent — perhaps just enough to satisfy this need for a broad-enough-but-still-divisive rhetorical theater in the media as Chomsky described. But my problem with these movements isn’t the limited penetration they achieve into the information-feeding troughs of the average American television viewer or web surfer. My lack of faith in their projects has little do to with their paltry track records for bringing about lasting change, in fact.
My problem lies in the reliance on third-parties in general. By third-parties I mean other groups or individuals on whom the success of the movement, or the achievement of a redress of grievances, relies. Ultimately, if some vaguely socialist democratic movement, let’s say, were to gain power, overthrow and oust the power elites, fix the broken law/financial/environmental/societal system on their own terms, what would it amount to? Obviously we can assume their victory means just what I said, that they’ve achieved what they wanted. But now we’re left with another problem, if not a bigger problem: There is a new power elite, a new administration, a new congress, a new constitution, new third-parties, and new points of failure. Reading Ursula K. LeGuin’s The Dispossessed serves as a firm reminder of the necessity of constant revolution in radical political projects. All these movements, these configurations of human capital, sadly — no matter how virile, impassioned, or disciplined — suffer from the tendency in human-dependent systems towards a centralization of power. Ultimately, this leads to their decay. I — and I believe I speak for many of my readers as well — grow weary of this kind of karmic political cycle, the investment of large sums of energy, getting the ball rolling, only to have its energy siphoned off steadily in an entropic process of attrition and a cutting of supply lines for the movement. So I ask myself if there is a better way to structure our political system. But then I have problems with democracy itself, you see… The whole thing may need to be reworked. But allow me to explain…
What’s the problem with democracy?
It’s not only about centralization and corruption for me. Here’s my problem with democracy: In the first place, in a majority-rule country like ours, at most half of the country (consider especially how few people actually vote) is able to elect the representatives and enact the policies favorable to it. Secondly, those representatives are not bound by contract to deliver on their election promises. And we could even forgive their transgressions — on both sides — those voters who were duped, those elected officials prevented from carrying out ‘the will of the people’ in one way or another. The point being no one need take the blame; this system functions (if you can call it functional) with or without consent, with or without consensus, but more often than not without either in terms of the what the whole country wants. And our media have us believing that this is the best we can do. We swallow this lie and preach it to the heathens that suggest anything else might be better. Meanwhile we swim with sharks in the shark tank, trying to lobby and protest the measly scraps of food we manage to procure as we twist and turn to avoid being eaten ourselves…
Are you telling me there is a way to 1) guarantee that policies get carried out and 2) prove that consent has been obtained from all constituents? Is there a system less vulnerable to fraud, less dependent on malleable and often unscrupulous political intermediaries?
Enter smart contracts. This is what I believe we will use to obviate corruption even if we also succeed in making corruption illegal. So support revolution.us if you want to, but know that we have the tools today to start to programmatically restructure politics or even build alternative, parallel political and legal systems. Cryptographic Governance will allow us to make the shift from being reactive to being proactive in trying to fight corruption. So how does this work, and what are smart contracts?
Let’s let Andreas Antonopoulos, Bitcoin Protocol Champion Extraordanaire, begin. Note this is a highly technical intro; rest assured, further elucidation of the ramifications of what’s being said is forthcoming.
Of course, only in the last 20 seconds or so of this verbose description of smart contracts do the non-monetary applications of this Bitcoin protocol contract scripting language receive mention.
Effectively, what Andreas is saying is that wills, trusts, and other types of agreements can be encoded using this new programming language found in the Bitcoin Protocol to be carried out without (and despite) human intervention given that certain constraints are met.
While we will want to apply this technology to politics, his first example of how a financial transaction can be secured and managed automatically through a smart contract is illustrative:
Basically, amount $XXXX will be transferred from Company A to Company B IF AND ONLY IF:
- Company A signs the transaction to release the funds
- Escrow Company C signs off on the transfer, verifying Company B has fulfilled their end of the bargain and that Company A has the available funds in their wallet
- The transaction is dated after January 1, 2015, and
- The NASDAQ is at 2500 points
A will could be carried out along the same lines, and with it the deeds to an estate transferred, a hitherto encrypted message to the heirs unlocked, and the deceased’s collected private records expunged from all electronic databases, assuming an approved doctor’s death certificate has been uploaded to proofofextistence.com according to predefined criteria.
I think you can see where this is going. Any policy, the rules of governance of any entity, business or political, if they can be defined clearly enough, can be made to execute “no matter what anybody wants to happen.” To paraphrase from Andreas Antonopoulos, the diffuse power inherent in these decentralized technologies is much less corruptible than centralized power. The mayor would no longer keep the keys to the city, but would be given access to them IF AND ONLY IF. You can imagine myriad things as well, I am sure. But just for fun let’s say the mayor gets to use the mayoral limousine IF AND ONLY IF his klout score is above 80, his budget is in the black for the year, and 3 or more proof-of-existence photos of him playing with children in the park have been uploaded to the town webpage during the last 30 days. (A bit silly of a set of definitions, for sure, but that’s what the citizens of Ogdenville decided on!)
This is the world that you and I and our community members can build, leaving the oligarchs out of it. We will not wrest control from the power elites; we will innovate around them (without their permission). This is the future of bitcoin-secured smart contracts and cryptographic governance that I envision.
Take a look at a few noteworthy projects already up-and-coming in this space:
- Counterparty is a platform for free and open financial tools on the Bitcoin network. Counterparty tokens can be used for a wide range of purposes and act as their own cryptocurrency, while still running on the Bitcoin blockchain. Unlike ordinary bitcoin, custom tokens can be used to issue dividends, confer voting rights, as electronic tickets, access to content, and more. Counterparty offers multisignature wallet addresses, which require signatures from more than one Bitcoin private key in order to spend their funds, allowing for flexible consensus-building systems to be built.
- Ethereum calls itself a “platform for decentralized applications” and promises to make writing smart-contracts simple and efficient. One such fascinating project to emerge from the Ethereum-sphere is Augur, a “fully-decentralized, open-source prediction market platform, intended to revolutionize forecasting, decision making, and the manner in which information consensus is collected and aggregated”. Read more about Augur at augur.net. Etherparty is an intriguing user-friendly platform written using Ethereum to make writing smart-contracts easy for non-programmers.
- Blockstream is another project and future platform with similar goals to Counterparty and Ethereum: Making smart-contracts and digital asset management easy and secure. They plan to use a feature of Bitcoin called sidechains to create two-way pegs between bitcoin and other assets or tokens. These assets and tokens in the sidechain can be comprised of anything: digital ballots, contracts, representations of other real-world currencies, the sky is the limit. The main-selling point with Blockstream is the tie-in with Bitcoin’s superior network hashing power — something that makes Bitcoin prohibitively expensive to attack.
- Colored Coins and the Open Asset Protocol is another protocol for tying assets and digital keys to a subset of bitcoin to be transacted over the Bitcoin network. Applications include companies issuing shares in the form of ‘colored coins’, which could then be traded frictionlessly through the Bitcoin infrastructure. Also, a bank could issue colored coins backed by a cash reserve. People could then withdraw and deposit money in colored coins, and trade those, or use them to pay for goods and services. The Blockchain becomes a system allowing us to transact not only in Bitcoin, but in any currency by linking it to a set of colored coins. Additionally, locks on cars or houses could be associated with a particular type of colored coins. The door would only open when presented with a wallet containing that specific coin. This protocol is already being utilized by NASDAQ to “expand and enhance the equity management capabilities offered by its Nasdaq Private Market platform”. This will allow for greater efficiency in the issuance, transfer, and management of private company securities within the Nasdaq ecosystem.
Other noteworthy projects include:
- Lighthouse for decentralized crowdfunding (think: uncensorable, distributed community project donation pages),
- Open Bazaar for decentralized online marketplaces (think: uncensorable, distributed farmer’s markets),
- Maidsafe and Storj for secure P2P information storage (think: Dropbox but no one can spy on you or take down your data; it is distributed in encrypted shards and spread throughout the internet), and
- BitLendingClub and BTCjam for microloans to/from anyone anywhere in the world.
The future is looking pretty bright all of a sudden. But it is incumbent upon us — particularly those of us with the skills and resources available — to help build out these systems and make it happen. We need to maintain and improve upon our already-powerful open-source, cryptographic algorithms. We need to fight to encode privacy and our god-given human rights into the very fabric of the world. Edward Snowden said so himself. It is actually part of what spurred him on in divulging the crimes of the NSA and other government agencies:
“While I pray that public awareness and debate will lead to reform, bear in mind that the policies of men change in time, and even the Constitution is subverted when the appetites of power demand it. In words from history: Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography.”
[From Glenn Greenwald’s new book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State]
Snowden’s goal for us is to create a more free and equal internet. In an earlier interview with Laura Pointras, Snowden explained:
“The shock of this initial period [after the first revelations] will provide the support needed to build a more equal internet, but this will not work to the advantage of the average person unless science outpaces law. By understanding the mechanisms through which our privacy is violated, we can win here. We can guarantee for all people equal protection against unreasonable search through universal laws, but only if the technical community is willing to face the threat and commit to implementing over-engineered solutions. In the end, we must enforce a principle whereby the only way the powerful may enjoy privacy is when it is the same kind shared by the ordinary: one enforced by the laws of nature, rather than the policies of man.”
By implementing these new cryptographic systems, we may move one step further towards what Snowden envisioned: distributed and secure math-based ecosystems that enhance our privacy and allow us to innovate further in all areas — in government, in finance, in communications and journalism, etc. Even if you inherently trust our government — kudos to you for reading this far, by the way — I would argue that the price of non-action here is great: Dictators around the world, future corrupt leaders of America, they all stand to benefit if citizens are denied these tools.
Another of my idols in this space is singer/songwriter/activist Tatiana Moroz, creator of the song, “The Bitcoin Jingle” (see further below). She speaks about the importance of these new kinds of projects in liberating us. In her talk just below, she describes her journey of hope and betrayal, a tale of a loss of innocence, a growing political cynicism. She fell first for presidential candidate Dennis Kuchinich, and then later for candidate Ron Paul, only to be disappointed at their negligible impact (some would say the negligible impact they were allowed to have) in American politics. She later learned about how the Federal Reserve controls and fuels the political machine under which we suffer. But then she found a new source of hope and light in the currency and technology platform known as Bitcoin.
Although I enjoy her talk immensely, concerning the creation of the first pro-artist digital currency, Tatiana Coin — amongst other innovations and insights she shares — it’s not strictly necessary to watch till the end. [Jump to the 19:00 minute mark for the meat of the discussion on smart contracts.] I think you get it. I think you see that people are talking. People like Tatiana, Andreas, and Edward are fired up — and they want you to join in the fight. Greater transparency in government, a reigning in of corruption, proper implementation of secure protocols, the funding of important projects, the re-installation of our civil rights, and perhaps most importantly: the fueling of people’s curiosity and desire to experiment, to live in a wondrous and endlessly-fascinating world. That is their call. And that is the promise of smart contracts and cryptographic governance.
The Bitcoin Jingle, by Tatiana Moroz
1. Gilens and Page, “Testing Theories of American Politics: Elites, Interest Groups, and Average Citizens,” Perspective on Politics, 2014. http://scholar.princeton.edu/sites/default/files/mgilens/files/gilens_and_page_2014_-testing_theories_of_american_politics.doc.pdf
2. Washington Post, “Rich People Rule!” 2014.
3. Washington Post, “Once again, U.S. has most expensive, least effective health care system in survey,” 2014.
4. Forbes Opinion, “The tax code is a hopeless complex, economy-suffocating mess,” 2013.
5. CNN, “Americans pay more for slower Internet,” 2014.
6. The Atlantic, “American schools vs. the world: expensive, unequal, bad at math,” 2013.
7. Sunlight Foundation, “Fixed Fortunes: Biggest corporate political interests spend billions, get trillions,” 2014.
by adminadam in articles
Secure and backup your cryptocurrency.
Create redundant encrypted local copies of your wallet.dat files.
Create a triple-encrypted, double-obfuscated volume containing all your crypto-wallets (using 7-Zip and TrueCrypt).
Securely upload, email, share, and place this volume on the cloud.
~ LA PRIMERA ETAPA ~
The first step is to secure your crypto-stash locally:
- Sync your wallet with the bitcoin-litecoin-dogecoin-whatevercoin network.
- Encrypt your wallet with a good, strong password, either 10+ random characters or 8+ random words. Ideally, you should use 14+ random characters, despite what the bitcoin-qt wallet shows you:
~ LA SEGUNDA ETAPA ~
Your wallet is secured, however, it must be backed-up in multiple (i.e. three or more) locations.
I save an extra wallet copy in a folder in My Documents, and another copy in another folder on my external hard-drive. I also occasionally backup my important folders and my whole system on a third hard-drive.
Typically you can find your original wallet location on your computer by typing the following into the Start Menu search area:
If you type this in exactly, it should show a folder called ‘Roaming’ in your start menu. Press ENTER and it will transport you to this typically-hidden folder. Inside you should see a number of folders containing application-data, including one titled Bitcoin, and perhaps others, Dogecoin, etc. if you have them installed.
When you enter the Bitcoin folder, you will see a number of things. One is ‘wallet.dat’. This small file contains your entire stash of coins, now protected if you’ve encrypted it in LA PRIMERA ETAPA.
Each time you want to duplicate and backup this ‘wallet.dat’ file, you should do the following:
- In your Bitcoin/Othercoin wallet program, choose ‘File > Backup Wallet’.
- NAME IT: Something indicating the Coin-type and the date would be good.
- CHOOSE A DESTINATION: Somewhere safe. Multiple media types are ideal: CD’s, USB’s, Hard-drives, Floppies, etc.
~ LA TERCERA ETAPA ~
Now your stash is encrypted and well backed-up — assuming you named and backed-up your wallet.dat file in 3+ places in a way and manner in which you will not lose or forget these files exist.
The next step is an added layer (or two) of extropy needed to protect your coins from totally ridiculous calamities, such as fires, floods, earthquakes, and nuclear bombs.
If your house burns down and your physical backup media are destroyed, you’ve also then lost your ‘wallet.dat’ backup files. Coins gone. Bummer, man!
This is where the cloud can be useful, however — CAVEAT EMPTOR — there is a smart way and a dumb way to do this. I will, of course, explain the smart way. (The dumb way would be to not add any additional protections… or to make the file public… or to advertise its existence to everyone.)
TWO DISTICT PROGRAMS will be explored here as means of adding two additional layers of protection to your entire stash (multiple wallets and coin types included). They are:
7-Zip — This compression program can also encrypt and password protect each of your ‘wallet.dat’ files while adding a layer of obfuscation which would prevent outside observers from viewing filenames contained within. (It encrypts the filenames, hiding transaction logs and address lists from view.)
TrueCrypt — This creates an encrypted, password-protected volume (think: folder) in which you can store each of your now-obfuscated, now-twice-encrypted ‘wallet.dat’ files.
Steps to follow using 7-Zip for each ‘wallet.dat’ file:
- Install 7-Zip.
- Right-click the first ‘wallet.dat’ file.
- Select 7-Zip in the menu, then click ‘Add to Archive’.
- In ‘Archive:’, change the name to something unrelated to wallets and coins and doges (oh, my!).
- In the ‘Add to Archive’ window, first check that ‘Archive format:’ shows ‘7z’.
- Ensure that ‘Encryption method:’ shows ‘AES-256’.
- Check the box for ‘Encrypt file names’.
- Create a strong password that is different from the one used to encrypt the ‘wallet.dat’ file intially. Again, ideally 14+ random characters or 8+ random words. (As with all steps in this process, you’re screwed if you forget or lose this password.)
- Press OK when your password is in.
You should now have an obfuscated, double-secured ‘wallet.dat’ file. Unless you tell someone (or give someone your password), at this point no one will be able to know what-the-crap this archive is, much less gain access to it, absent, again, Mega-Serious Cracking Abilities (MSCA).
Once you have 7-Zipped all your ‘wallet.dat’ files for all your coins, proceed to the TrueCrypt phase…
Steps to follow with TrueCrypt for your collection of Wallet Archives:
- Install TrueCrypt.
- Open TrueCrypt.
- Select ‘Create Volume’.
- Ensure ‘Create an encrypted file container’ is selected, and press NEXT.
- Here we have an option to create a ‘Standard’ or a ‘Hidden’ TrueCrypt volume. For now, we will simply create a ‘Standard’ volume (Hit NEXT). Later I will detail the steps necessary to create a Hidden volume, which is particularly useful if you believe you may be forced to reveal your password to someone under duress at some point in the future. For now, we’ll just assume a hidden volume isn’t necessary because A) you “don’t have that much money”, and B) you “surely haven’t advertised that you have this special TrueCrypt volume with a bunch of crypto-money in it”.
- Choose ‘Select File…’ and browse to a location where you would like to create your TrueCrypt volume, the Desktop, let’s say. We are merely creating a container right now.
- After browsing to your chosen location, come up with something inane to name your TrueCrypt container. “photos from joey”, or something to that effect. Type that name into the ‘File name:’ field and hit SAVE.
- Hit NEXT.
- The next screen allows us to select our encryption and hashing algorithms. For first-timers, the default options AES and RIPEMD-160 are recommended. Hit NEXT.
- Next we’ll choose a size for this volume we’re creating. Let’s see, what’s a good size for a spoofed folder full of pictures from Joey? How about 14MB? Should be plenty. The wallet.dat archives are only around 40KB each. Type in an amount ranging from 5 to 20MB. Hit NEXT.
- Now we’ll choose a final password. TrueCrypt recommends a 20+ character password, with no easily-guessable whole words. Type in and then re-enter your chosen password. BEFORE YOU HIT NEXT, read about Generating Entropy:
In the next screen, TrueCrypt will ask you to ‘move your mouse around randomly’ for at least 30 seconds. The reason it is doing this is to collect random data — from your mouse movements — with which to scramble and improve the encryption of your TrueCrypt volume. Be ready to move your mouse around randomly for 30 to 90 seconds before you hit NEXT.
- Hit NEXT and begin moving your mouse around randomly. (The VOLUME FORMAT screen should be displayed now). Continue to move your mouse around for at least 30 seconds. After you are either content or tired of moving your mouse around for no apparent reason, click FORMAT. No need to edit any options here.
- After you hit FORMAT, wait for your volume to be created. NOTE: This may take a while if you chose a large volume size. When it has finished, it will show a dialog box indicating that “The TrueCrypt volume has been successfully created.” Hit OK.
- In the next screen, “Volume Created”, hit EXIT.
- Next we will browse to our TrueCrypt volume and mount it from the main TrueCrypt window. (NOTE: If you don’t have the main TrueCrypt window open any more, simply re-open TrueCrypt from the Start Menu.) From within the main window, select an available drive. If you have dozens of hard-drives or CD drives in your computer, you’ll have to choose from amongst the later drive letters in the alphabet. I’m choosing ‘M:’ for “Mega Serious”.
- Click ‘Select File…’ after choosing your drive letter.
- Browse to and select your inanely-named TrueCrypt Volume, ‘photos from joey’ — or whatever it is you called it. Hit OPEN.
- In the main TrueCrypt window, hit MOUNT.
- Enter your password and hit OK.
- If you have successfully mounted your volume, the name, size, encryption algorithm, and type will show up in the main TrueCrypt window next to the drive letter onto which you chose to mount it. You can now open the volume as you would any other drive or folder. Either double-click on the volume name from within the TrueCrypt window, or browse to your list of Hard Disk Drives in Computer and double-click on ‘Local Disk (M:)’. REMEMBER: You may have chosen a different drive letter than me. ;-)
- Now we may proceed to the final step of our Cryptocoin Backup Process…
~ LA CUARTA ETAPA ~
This stage is significantly easier than stage three.
- Now that you have your TrueCrypt volume created, encrypted, and opened, simply copy and paste (or drag-and-drop) your 7-Zipped ‘wallet.dat’ files into it. Once they are copied into this volume, you can consider them safe. Once you restart or shutdown your computer, even if the power just goes out, your files are encrypted and safe. You can also choose to DISMOUNT your volume from within the TrueCrypt window and EXIT now.
Next time you want to access your files now, remember you will have to:
- Open TrueCrypt.
- Select File…
- Select the volume and click OPEN.
- Hit MOUNT.
- Enter your password; hit OK.
- Double-click on the volume once it is mounted.
- Right click on the wallet file you want to open. Choose ‘Open Archive’ with 7-Zip.
- Enter the 7-Zip Archive password.
- You now have access to your coin wallet again. (REMEMBER: You also encrypted this file. Good on you!)
~ LA QUINTA ETAPA ~
The final stage.
Share/upload/distribute your triple-encrypted, double-obfuscated TrueCrypt Multi-Wallet Backup System Volume (just one single file now) to a few trusted friends or locations.
You can now safely store this file in your email account, your dropbox, on your smartphone, on a friend’s hard-drive, and so on. The sky’s the limit!
~ LA EXTRA ETAPA: Can you Grok it? ~
I personally can’t grok any more today. I intended to add a section on creating a special hidden volume with TrueCrypt in which to place our ‘wallet.dat’ files. For now I’m quite content with this beginner’s guide. Please see: http://www.truecrypt.org/docs/hidden-volume to read up on Hidden Volumes and try it yourself if you feel so inclined. I may choose to update this guide in the future with a Hidden Volumes tutorial section. We’ll see.
~ LOS RECURSOS QUE UTILICÉ PARA ESCRIBIR ESTA GUÍA ~
by adminadam in home
Contribute and Spread the Word.
The Calyx Institute is a new non-profit endeavor with the goal of creating a usable, fully-encrypted, privacy-centric ISP and Mobile Phone Service. It is being designed to take all legal and technical means available into account in order to preclude spying, government surveillance, or any other kind of snooping from the realm of possibilities. All email, all traffic, all calls, all sms’s — everything private.
Donate here (indiegogo).