Linux alternatives: Mp3tag → EasyTAG

A big part of my move from Windows to Linux has been finding replacements for the applications that I had previously used day-to-day that are not available on Linux. For the major applications like my web browser (Firefox), e-mail client (Thunderbird), password manager (KeePass2) this hasn’t been a problem because they are all available on Linux as well. Heck you can even install Microsoft Office with the latest version of wine if you wanted to.

Three neat mobile security Apps (adjust your tin foil hat accordingly)

Here are a couple of neat iOS applications for the paranoid (kidding!) & security inclined. iPGMail iPGMail (currently $1.99 on the App Store) is the best OpenPGP application I’ve tried on Apple’s platform. Even within the somewhat restrictive limitations that Apple has created for application developers this particular application does everything it can to be user friendly. I would highly recommend this to anyone that wishes to send signed/encrypted e-mail from their iOS device.
How to migrate from TrueCrypt to LUKS file containers

How to migrate from TrueCrypt to LUKS file containers

With the recent questions surrounding the security of TrueCrypt there has been a big push to move away from that program and switch to alternatives. One such alternative, on Linux anyway, is the Linux Unified Key Setup (or LUKS) which allows you to encrypt disk volumes. This guide will show you how to create encrypted file volumes, just like you could using TrueCrypt. The Differences There are a number of major differences between TrueCrypt and LUKS that you may want to be aware of:

Create a virtual hard drive volume within a file in Linux

If you are not familiar with the concept of virtual hard drive volumes, sometimes called file containers, they are basically regular looking files that can be used by your computer as if they were real hard drives. So for example you could have a file called MyDrive.img on your computer and with a few quick actions it would appear as though you had just plugged in an external USB stick or hard drive into your computer.

Set up KeePass Auto-Type on Linux

If you’ve used KeePass on Windows you may be very attached to its auto-type feature, where with a single key-combo press the application with magically type your user name and password into the website or application you’re trying to use. This is super handy and something that is sadly missing by default on Linux. Thankfully its also very easy to make work on Linux. Start by installing the xdotool package On Debian/Ubuntu/etc simply run:

A quick switch to Linux Mint

As noted previously I’ve recently switched over to running Linux on all of my personal computers at home. This switch has gone surprisingly well and I will be posting about some of my experiences with that later on. In the meantime just a quick update on the distribution I’m running.

Force Thunderbird/Enigmail to use a specific signing (hash) algorithm

If you’ve had issues trying to get Thunderbird to send your PGP signed e-mail using anything other than SHA-1 there is a quick and easy fix that will let you pick whichever hash you prefer. Open up Thunderbird’s preferences On the Advanced Tab, under General click Config Editor… In the about:config window search for “extensions.enigmail.mimeHashAlgorithm” without quotes. Double click on this and enter a value.
Making the (final) switch to Linux

Making the (final) switch to Linux

It has been a bit of a long time coming but I’ve finally decided to stop procrastinating and actually attempt to move my last Windows desktop to Linux. This decision was reached after I realized that for many months now my home computing use has happened almost exclusively on my Linux powered laptop, and that I actually only ever bothered to use my Windows desktop to sync my phone and for nothing else.
Is there a safe way to put a PGP key in your Twitter bio?

Is there a safe way to put a PGP key in your Twitter bio?

After reading this I’m still not 100% sure there can ever be a completely “safe” way to do this with Twitter. That said some ways are certainly better than others… Personally I think the best of the approaches listed is to include the full key fingerprint and then to also periodically tweet the details. At least that way if an attacker does go and maliciously modify your bio there is still a chance for someone to see the good tweet as well.