openrightsgroup, to privacy
@openrightsgroup@social.openrightsgroup.org avatar

"While the UK government adopted powers that could allow the private messages of everyone in the UK to be scanned, it did concede that this could not be put into practice without jeopardizing people’s security and privacy.

ORG has called for Ofcom to publish regulations that make clear that there is no available technology that can allow for scanning of user data to co-exist with strong #encryption and #privacy.“

🗣️ Pam Cowburn, ORG Head of Comms.

#E2EE

https://www.itpro.com/security/privacy/euro-police-chiefs-rekindle-end-to-end-encryption-battle-amid-continued-rollouts

EDPS, to privacy
@EDPS@social.network.europa.eu avatar

- "Everything has the potential to get better. I am happy to see increased use of end-to-end in the last 20 years and I'd like to see this continue in the next 20". Our guest is
@evacide bringing brilliant insights on &
Watch the Talk now!
👉https://europa.eu/!78kXnX

video/mp4

firefly, to privacy in Swiss authorities intervene, Proton Mail not blocked in India
@firefly@neon.nightbulb.net avatar

Everything you need to know about so-called 'Swiss Privacy' we learned decades ago from Operation Thesaurus, AKA, Operation Rubicon. We learned that CIA operations and black budget banking are actually headquartered in the Swiss underground.

Operation Rubicon
https://en.wikipedia.org/wiki/Operation_Rubicon

Crypto AG
https://en.wikipedia.org/wiki/Crypto_AG

If you trust any third-party server to protect your privacy, you're a rube. If you trust Proton Mail to protect your privacy, you're a rube getting 'crossed' by the Swiss Rubi-con. Either you own your keys and your data on your computer or else you have no privacy. Someone else's promise that your data will be 'encrypted' so they can't decipher it is a hollow pledge. If you send any form of plaintext to a remote server, no matter how much they claim to encrypt it, you have zero assurance of data privacy.

Watch the phan boiz rage outlet!

fsf, to random
@fsf@hostux.social avatar

Did someone say #encryption? Encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk #surveillance systems. Learn more with our Email Self Defense guide: https://u.fsf.org/1df

kuketzblog, to security German
@kuketzblog@social.tchncs.de avatar

Politische Überwachungsphantasien, die mit dem Vorwand gerechtfertigt werden, "schlimmste Verbrechen wie den sexuellen Missbrauch von Kindern zu bekämpfen", sind unerträglich.

Wer wirklich etwas für Kinder tun will, engagiert sich im Kampf gegen den Klimawandel, für sichere Schul- und Radwege, für Bildung, gewaltfreie Familien, Chancengleichheit und freie Entfaltungsmöglichkeiten.

Stop this bullshit! 🫵

blueghost, to email
@blueghost@mastodon.online avatar

Proton Mail automatically encrypts/decrypts messages between Proton Mail accounts via OpenPGP/PGP.

Proton Mail supports automatically encrypting/decrypting messages between Proton Mail accounts and external email accounts that support OpenPGP/PGP or GnuPG/GPG.

Instructions: https://proton.me/support/how-to-use-pgp
GnuPG: https://mastodon.online/@blueghost/111974048270035570

Website: https://proton.me
Mastodon: @protonprivacy

#Proton #ProtonMail #ProtonPrivacy #OpenPGP #PGP #GnuPG #GPG #Email #Encryption #E2EE #InfoSec #Privacy

fsf, to random
@fsf@hostux.social avatar

Did someone say #encryption? Encryption helps protect the privacy of people you communicate with, and makes life difficult for bulk #surveillance systems. Learn more with our Email Self Defense guide: https://u.fsf.org/1df

janvlug, to opensource
@janvlug@mastodon.social avatar

United Nations International Computing Centre (UNICC) has selected #Element as its #secure communications platform, following a competitive #tender process.

Element stood out as a digitally sovereign platform which offers end-to-end #encryption. Its ability to be #federated to support multiple organisations was also a key factor in the #selection process.

#UNICC will self-host Element through an Element Enterprise subscription.

https://element.io/blog/unicc-selects-element-for-secure-communications/

#UN #OpenSource #FOSS #Matrix

ErikJonker, (edited ) to security Dutch
@ErikJonker@mastodon.social avatar

I hope the UN can make it work but the federated decentralised approach makes sense. The United Nations ditches Big Tech in a bid for security | TechRadar
https://www.techradar.com/pro/the-united-nations-ditches-big-tech-in-a-bid-for-security

Polynomial_C, to Signal Catalan
@Polynomial_C@mastodon.social avatar

Europol wants to bypass and

"In a joint appeal made public on Sunday, European police forces are calling on governments to allow message encryption on communication platforms to be circumvented."

https://www.lemonde.fr/en/pixels/article/2024/04/22/europol-wants-to-bypass-whatsapp-and-signal-encryption_6669181_13.html#

video/mp4

echo_pbreyer, to random German
@echo_pbreyer@digitalcourage.social avatar

🇩🇪Jetzt fordern auch 50 NGOs und Wissenschaftler die Ablehnung der "neuen" Pläne zur #Chatkontrolle, weil sie weiterhin #Massenüberwachung vorsehen, sichere #Verschlüsselung untergraben, #Altersprüfung vorschreiben und #Anonymität zerstören: https://edri.org/wp-content/uploads/2024/04/48-NGOs-and-26-experts-warn-Mass-surveillance-and-undermining-encryption-still-on-table-in-EU-Council.pdf (englisch)

echo_pbreyer,
@echo_pbreyer@digitalcourage.social avatar

🇬🇧Now 50 NGOs and academics are also calling for the "new" plans to be rejected because they continue to provide for , undermine secure , require and destroy : https://edri.org/wp-content/uploads/2024/04/48-NGOs-and-26-experts-warn-Mass-surveillance-and-undermining-encryption-still-on-table-in-EU-Council.pdf

clarinette, to random
@clarinette@mastodon.online avatar
mattis, to humanrights
@mattis@eupolicy.social avatar

Publication on the wonderful EULawAnalysis blog, together with @Frederik_Borgesius: a short analysis of the Podchasov v. Russia case of the ECHR.
This is an important case for the role of encryption for the protection of privacy (Article 8).

For our analysis and some short comments, see the blog post: https://eulawanalysis.blogspot.com/2024/04/podchasov-v-russia-european-court-of.html

Thanks for publishing @StevePeers!

skerit, to Europe
@skerit@elevenways.be avatar
alghaff, to random

European police chiefs have come out against #E2EE, using the same old misleading arguments!

Weakening #encryption will help predators, criminals, blackmailers & scammers.

What European police chiefs want means:

❌ No Signal
❌ No WhatsApp
❌ No iMessage
❌ No Facetime

https://www.europol.europa.eu/media-press/newsroom/news/european-police-chiefs-call-for-industry-and-governments-to-take-action-against-end-to-end-encryption-roll-out

farrisswisher, to email

Is email encryption for the average person a waste of effort? I currently use tuta (formerly tutanota) and the encryption they provide either requires the recipient to also use tuta, or that I password protect an email and communicate that password to the recipient some other way. Seems like a lot of effort for basic communications.

Also I’m limited to just using their first-party clients due to their encryption being done client-side. I think after some time with them I’d be more happy using an email service that can work with any client and is committed to respecting my privacy. Anybody have thoughts on this or recommendations?

mneylon, to security

As the world relies more and more on a secure digital environment it’s bonkers to see European law enforcement pushing for a less secure internet #encryption #security

Tutanota, to random
@Tutanota@mastodon.social avatar

With the US Senate agreeing to reauthorize there has been no better time to start using end-to-end . 🔒

We don't need more . 🕵️

Please contact your representatives and say NO to warrantless surveillance!

👉 https://act.eff.org/action/tell-the-u-s-senate-stop-risaa-the-fisa-mass-surveillance-expansion

blueghost, to Signal
@blueghost@mastodon.online avatar

Signal is an encrypted messaging application that supports post-quantum cryptography.

Google Gmail is the email provider for Signal Messenger LLC, this is the company that develops the Signal messaging application and the Signal protocol.

Signal support can be contacted from within the application by going to Signal Settings (profile) > Help > Contact Us.

Website: https://signal.org

blueghost, to infosec
@blueghost@mastodon.online avatar

The 3-2-1 rule is a data backup strategy.

3 copies of the data.
2 different types of storage media.
1 copy located offsite.

Consider protecting each backup with encryption.
Consider "Harvest now, decrypt later" when selecting a storage location.

Backup: https://en.wikipedia.org/wiki/Backup
Encryption: https://en.wikipedia.org/wiki/Encryption
Harvest now, decrypt later: https://mastodon.online/@blueghost/111357939714657018

#Data #Backup #DataBackup #DataStorage #Encryption #InfoSec #InformationSecurity

blueghost, to KDE
@blueghost@mastodon.online avatar

KGpg is a frontend for GnuPG.

GnuPG: https://mastodon.online/@blueghost/111974048270035570

The default configuration in Plasma is to open in the system tray with the icon hidden.

Open: Application Launcher > KGpg > Show Hidden Icons (located next to the digital clock) > KGpg.

Close: File > Quit.
Selecting Close (the X icon in the title bar) does not close KGpg, it closes the window.

Open/Close options: https://discuss.kde.org/t/kgpg-open-close/13894

Website: https://apps.kde.org/kgpg
Mastodon: @kde

#KDE #KGpg #GnuPG #GPG #Plasma #Encryption

5am, to Signal
@5am@fosstodon.org avatar

This is a great piece by @micahflee about the significance of supporting ephemeral usernames in @signalapp and the challenges #Signal faces developing the gold standard of private messaging apps.

https://theintercept.com/2024/03/04/signal-app-username-phone-number-privacy/

#privacy #security #encryption #signal

remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

: "When stored, aggregated and analyzed, this metadata provides ample information that could potentially incriminate someone or be submitted to authorities. When WhatsApp and Facebook Messenger enabled end-to-end encryption for messages, of course it was a welcome and widely celebrated change. But it’s important to remember that not all end-to-end encryption utilizes the same standards, some implementations are more secure than others, so it’s something that shouldn’t necessarily be accepted at face value. More importantly: collecting and storing an obscene amount of metadata should invite global scrutiny, considering this data is often combined with whatever other information companies like Meta harvest about your identity (which is a lot.)

This is one of the many reasons why we need to resist giving out our phone numbers just to access an app, especially to do something as personal and intimate as private messaging. Even though users can sometimes mask their numbers with a username, their identity on the app is still fundamentally tied to their phone number. App operators have access to this, as well as user contacts. Additionally, with a simple modification to the app's source code, the contacts may also gain access in some cases. This should raise more concerns about privacy, and it makes the need for anonymity difficult to achieve." https://simplex.chat/blog/20240416-dangers-of-metadata-in-messengers.html

captainepoch, to privacy
remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

#Cybersecurity #Encryption #QuantumComputing #Algorithms: "Chen’s (not yet peer-reviewed) preprint claims a new quantum algorithm that efficiently solves the “shortest independent vector problem” (SIVP, as well as GapSVP) in lattices with specific parameters. If it holds up, the result could (with numerous important caveats) allow future quantum computers to break schemes that depend on the hardness of specific instances of these problems. The good news here is that even if the result is correct, the vulnerable parameters are very specific: Chen’s algorithm does not immediately apply to the recently-standardized NIST algorithms such as Kyber or Dilithium. Moreover, the exact concrete complexity of the algorithm is not instantly clear: it may turn out to be impractical to run, even if quantum computers become available.

But there is a saying in our field that attacks only get better. If Chen’s result can be improved upon, then quantum algorithms could render obsolete an entire generation of “post-quantum” lattice-based schemes, forcing cryptographers and industry back to the drawing board.

In other words, both a great technical result — and possibly a mild disaster." https://blog.cryptographyengineering.com/2024/04/16/a-quick-post-on-chens-algorithm/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • ngwrru68w68
  • everett
  • InstantRegret
  • magazineikmin
  • thenastyranch
  • rosin
  • GTA5RPClips
  • Durango
  • Youngstown
  • slotface
  • khanakhh
  • kavyap
  • DreamBathrooms
  • provamag3
  • tacticalgear
  • osvaldo12
  • tester
  • cubers
  • cisconetworking
  • mdbf
  • ethstaker
  • modclub
  • Leos
  • anitta
  • normalnudes
  • megavids
  • lostlight
  • All magazines