Here’s the Deal
Slant is powered by a community that helps you make informed decisions. Tell us what you’re passionate about to get your personalized feed and help others.
Very reliable recommendations on what to buyWe built an AI that analyses the same product data you would yourself: price drops, expert reviews, user reviews, what Reddit thinks & more.
Plugs right into Amazon to save you moneyIt works as a Chrome extension, so instead of seeing the crappy sponsored products on Amazon, you can see what's actually a good use of your money.
Interested in promoting your product? Contact us
Telegram uses an open source MTProto encryption protocol that provides complete end-to-end encryption for secret chats. To show off their confidence in the protocol the company behind Telegram has organized $200,000 and $300,000 challenges to break the encryption. So far there have been no winners. See More
Unfortunately, on the desktop videos don't play, but images are viewable without visiting popular websites like imgur and Instagram. You can play YouTube videos and others within the app, so you don't need to embed code or anything. With inline bots, such as @gif, @pic/bing, @vid/YouTube, etc, you can look things up without leaving the client or chat that you're in. Simply type the name and some keywords and wait for the results to load. See More
You can set up an additional password to your account, which can be reset by your email. You don't have to use an email if you do not want to. If you lose access to your email or forget your password, you will be able to reset it via text message if your account is over seven days old and will receive it within a week (in case you recover anything before then). See More
In Supergroups, anyone along with admins can delete their messages from all sides. A message can be pinned to the top. All of the user's messages can be deleted by an administrator, and they can be banned and reported as well. Supergroups can have a public link (outside of Asia, due to high spam volumes), which is also a username. See More
LastPass provides a secure method to share a password with another LastPass user. LastPass also uses AES 256-bit encryption with routinely-increased PBKDF2 iterations and local only decryption to keep your passwords protected. Two modes of sharing passwords are available: sharing access (password is hidden) or actually sharing the password. See More
LastPass can also be used to manage and create extremely secure passwords by using one master password. The service also offers one time master passwords that you can save to be used once if your worried about signing in on an insecure computer. Most importantly LastPass is extremely secure because not even LastPass knows your master password and as a result they cannot accept any government data requests. See More
File Camouflage is an effective second level of protection. After encrypting and password protecting your sensitive information with AES, File Camouflage makes sure only your intended recipient knows there is even a file to decrypt by hiding it in a JPEG. See More
To hide a file in an image you need two things: One, that the attacker cannot find the source image i.e. it has to be an image made by the user (preferably a photograph of a visually complex scene) and never put on the internet (using the pac_tron image would render the use of steganography moot, as the attacker can merely subtract a suspect image from a copy of the source image) and two, that the file to be hidden is smaller than the cover image. With the best techniques today you can embed a file about 10% of the size of the cover image. The example in the doc hides a file 21,500% of the size of the cover image. If you use steganography improperly you get no security, esp. as governments believe senior terrorists use steganography and thus search for it very, very, carefully. See More
The encrypted file cannot be viewed without the same password inputted by the sender in the encryption process and the recipient in the decryption process. Although this password is another bit of sensitive information to transfer this may be a good solution if the sender and recipient can meet once for the password and then use password protected encrypted .zip files for future information transfers. See More
Not only does the sender need an encryption program to encrypt the file, but the recipient needs an encryption program to open it. Windows provides a basic level of encryption natively without AES, but most users craving security will want to use a more advanced utility with AES such as 7-Zip. If the recipient is not good with computers this may be difficult. See More
To pass EFF's security review TextSecure had to encrypt data in transit, the encryption had to be end-to-end, the app needed to provide forward secrecy, app's source code has to be open to independent review, users have to be able to verify contact's identities even with the service provider compromised, app's cryptographic design has to be well documented and app's source code has to have been audited in the last 12 months. See More
Uses Curve25519, AES-256, and HMAC-SHA256. The security of these algorithms has been tested over many years of use in hundreds of different applications. Messages sent via TextSecure are end-to-end encrypted, which means that they can only be read by your intended recipients. We make it easy for you to verify that you are communicating with the right people and that no MITM attack has occurred. The keys that are used to encrypt your messages are stored on your device alone, and they are protected by an additional layer of encryption if you have a passphrase enabled. See More
After selecting "Encrypt copy to .EXE," rename the file to ".EXE.TXT" in order to bypass email provider restrictions on sending .EXE files. Windows will then warn you that the file will become unusable but ignore it and continue to email the file. All the recipient needs to do upon arrival is rename the file back to .EXE and ignore the Windows warning message. Then simply open the self extracting file and type in the agreed upon password between the sender and recipient. This is a great advantage of AxCrypt because it does not force your recipient to download any software. See More
Some recipients will be cautious of opening an .EXE and may end up ignoring it. It is a good idea to inform them in advance that you will be sending an .EXE and it is safe. Another precaution is to sign the email so the recipient knows that is you. See More
AxCrypt encrypts each file with a passphrase and an optional key-file. Transferring a key-file (that AxCrypt can generate for you) on a separate medium and the password on another medium to your recipient is the most secure option. Although a strong password alone will do. The only caveat is that the password and key file must be transferred to your recipient and the most secure way to transfer it is physically. See More
Strong passwords and two step verification can provide a moderate level of protection. But Dropbox is not immune from a history of compromised accounts and other security issues. Your information in Dropbox is also not as secure from the government as it is if it were locally encrypted and hidden on your own computer with programs such as 7-Zip or File Camouflage. Dropbox will respond to government data requests according to the following principles. See More
If both the sender and the recipient enable two step verification and use strong passwords then your information should be moderately secure. Although if Dropbox accepts a government data request this security measure will be useless. See More