-
Also like Firesheep, the hack can be defeated by an encrypted connection.
FORBES: Smartphone Data Vulnerable To Base Station Spoof Trick
-
So far, Lewman says, Tor's developers haven't figured out how that probe is able to determine what's an encrypted connection to a Tor server and what's a connection to an encrypted banking or e-commerce site, which in theory should both look to a snooping government like indecipherably scrambled Web traffic.
FORBES: Magazine Article
-
In a blog post in January, Tor executive director Andrew Lewman wrote that one of the five Iranian ISPs is now blocking publicly-known Tor nodes, even when that connection is encrypted.
FORBES: How Iran Became The World's Worst Internet Oppressor
-
Basically it's a USB security key that supposedly encrypts data stored to the thumb drive using AES, provides remote encrypted storage, creates a secure connection to the internet, and deletes your browser's cookies and history files.
ENGADGET: Mighty Key, the new secure USB snake oil?