solrize
I'd say run a local imap server rather than dealing with the weirdness of storage shares across multiple OS's.
Were these algorithms reverse engineered and made public years ago anyway? I half remember something about that.
If we told just anyone, it wouldn't be private!!!!
Srsly any phone app is inherently insecure because the phone itself is insecure. And there's lots of metadata leakage, like the phone broadcasting its location. There is no "go to app". It all depends on what you are trying to do and who you are trying to communicate with.
The OEM ones were something like $8 for a 3-pack many years back. Seemed high but they last a while.
There are tons of them on ebay. There are a few different types, depending on your thinkpad model. I suspect the T480 uses the square post style like older T series thinkpads, but I don't know. Basically, look carefully at the pics to make sure you get the right kind.
If you want OEM ones, try lenovo.com, but they will cost more.
If this is for live disks or mirrors (not backup), LUKS is reasonable. Backup is different from mirroring since one of the things it protects you from is accidentally deleting files. If you delete a file from your main drive, it also disappears from the mirror drive, so mirrors are not backup. For encrypted backup, I've been using Borg backup which is quite well thought out, though confusing at first. The backups go on a remote server which is ok since they are all encrypted.
This looks interesting. They put electrodes on the brains of 29 neurosurgery patients and measured neuron signals while playing "Another Brick In The Wall". They were able to reconstruct the auditory signals from neuron measurements.
You mean the blog link? That's an awful lot of articles. Is there a single sentence somewhere saying what it is?
This should be worth listening to if you've had some undergrad level abstract algebra. Borcherds has a youtube channel with lots of other really good math exposition too.
What is the project anyway? It's not obvious at all.
Haven't read this yet but it looks significant. The attack relies on the presence of a fault so it's not like every ssh key everywhere is broken. But the abstract says 100s of broken keys have been found.