I hereby claim:
- I am Enegnei on github.
- I am j9roem (https://keybase.io/j9roem) on keybase.
- I have a public key whose fingerprint is 9A2D 6A2A D7AF AC73 9140 F6BC 468D C5D7 814C C13F
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
Sites which may involve the transmission of very sensitive data, such as health or banking information, are marked with an ❗ to signal they should deploy HTTPS-by-default as soon as possible. If you are a popular website (such as those on the Alexa Top 500 Global Sites) which finds itself on this list - and you want to be removed - you can visit Let's Encrypt about transitioning to HTTPS. It's easy, free, and will help you learn how to protect your customers/ readers!
List now outdated, removed until further notice.
Q: What is HTTPS?
Janine Römer | [email protected]
“ The most familiar form of intelligence – so familiar that it is usually not recognized as intelligence – is open-source intelligence: information obtained from sources that are not attempting to conceal it. Open-source intelligence is almost the only form of intelligence practiced by scholars, reporters, and business people, but it also plays a major role in national intelligence. In the national case, typical open sources are newspapers, radio broadcasts, foreign government publications, propaganda, maps, and phone books. In industrial intelligence, advertisements and product literature are major sources.
Older open sources have now been joined by the Internet and the World Wide Web. Browsing the Web is practicing open-source intelligence. Google and more specialized search engines give their users access to information on an unprecedented scale. ”
- [*Privacy on the Line: The Po
Janine Römer | [email protected]
A form of online journalism which utilizes version control systems (VCS) for the purposes of contemporaneous time-stamping and tracking changes to a story.
Ideally, this model would be implemented using open-source intelligence (OSINT), open-source software (OSS), and “copyleft” or Creative Commons (CC) licensing within an open participatory network.
“2.1.2 An attacker could use a quantum computer to guess everyone's private keys.”
“It is very unlikely that quantum computing or any other field of scientific research will result in such a drastic rewriting of our understanding of the basic laws of physics.”
This is probably one of the easiest threats where he could have provided statistical analysis data, as private key collision is a very popular concern and there are numerous technical forums which have addressed it over the years.
He incorrectly states that “the private key is so large that it would take more energy than is produced by the sun in its entire lifetime to power a computer capable of guessing it.” This demonstrates a very poor understanding of not only Bitcoin, but cryptography and [quantum computing](https://www.ibm.com/communities/analytics/riskmanagement-blog/quantum-risk-management-schrodingers-dead