This is a great piece by @micahflee about the significance of supporting ephemeral usernames in @signalapp and the challenges #Signal faces developing the gold standard of private messaging apps.
#CyberSecurity#Privacy#Messaging#Metadata#Encryption: "When stored, aggregated and analyzed, this metadata provides ample information that could potentially incriminate someone or be submitted to authorities. When WhatsApp and Facebook Messenger enabled end-to-end encryption for messages, of course it was a welcome and widely celebrated change. But it’s important to remember that not all end-to-end encryption utilizes the same standards, some implementations are more secure than others, so it’s something that shouldn’t necessarily be accepted at face value. More importantly: collecting and storing an obscene amount of metadata should invite global scrutiny, considering this data is often combined with whatever other information companies like Meta harvest about your identity (which is a lot.)
This is one of the many reasons why we need to resist giving out our phone numbers just to access an app, especially to do something as personal and intimate as private messaging. Even though users can sometimes mask their numbers with a username, their identity on the app is still fundamentally tied to their phone number. App operators have access to this, as well as user contacts. Additionally, with a simple modification to the app's source code, the contacts may also gain access in some cases. This should raise more concerns about privacy, and it makes the need for anonymity difficult to achieve." https://simplex.chat/blog/20240416-dangers-of-metadata-in-messengers.html
#Cybersecurity#Encryption#QuantumComputing#Algorithms: "Chen’s (not yet peer-reviewed) preprint claims a new quantum algorithm that efficiently solves the “shortest independent vector problem” (SIVP, as well as GapSVP) in lattices with specific parameters. If it holds up, the result could (with numerous important caveats) allow future quantum computers to break schemes that depend on the hardness of specific instances of these problems. The good news here is that even if the result is correct, the vulnerable parameters are very specific: Chen’s algorithm does not immediately apply to the recently-standardized NIST algorithms such as Kyber or Dilithium. Moreover, the exact concrete complexity of the algorithm is not instantly clear: it may turn out to be impractical to run, even if quantum computers become available.
But there is a saying in our field that attacks only get better. If Chen’s result can be improved upon, then quantum algorithms could render obsolete an entire generation of “post-quantum” lattice-based schemes, forcing cryptographers and industry back to the drawing board.
allows #DetectionOrders to be issued very broadly - ignoring EU Council Legal Service's concerns that this is 🙅🏿 NOT compatible with human rights law prohibiting general monitoring.
When DEVONthink 3 debuted, it came with the option of creating a truly secure, encrypted database. If you have an unencrypted database and would like to convert it to an encrypted one, here is how you do it. #devonthink#security#encryption#pkmhttps://buff.ly/49CwjMl
I lost my disk #encryption password. The hand written password does no longer work. I don't know why...
I have a backup, but that disk is also crypted.
All my passwords are in a keepass database file.
This is on the cryted disk and backup.
I also have a backup on my #Fritz.box nas. But the password is ... In the manager.
I have a Fritz VPN to my Fritz box stored on my android phone.
Any recommendation on how to get back acces to the password manager database file?
Help is very welcome.
I fear I need to contact some company and pay Monet to get back my access :(
UPDATE: I could solve the issue by decrypting my very bad handwriting. And I'll now put back my keepass file onto a server a a level of backup and will print out the most important passwords instead of keeping handwritten backups.
@danielsiepmann Just suggesting these since, bit rot or something like that should be out of the question since you stated that you suddenly cannot decrypt two devices that you formerly were able to decrypt.
I did some testing on a Windows machine and tried out #Bitlocker#encryption for the first time… I'm shocked. This thing is black magic.
How did they manage to do full disk encryption that can be toggled on/off instantly? I was expecting it to rewrite the whole drive, like what would happen with LUKS on Linux OSes/utils, but no: even a whole existing C:\ drive with Win installed, you just enable encryption, it reboots in seconds instead of minutes/hours, and it's done.
@protonprivacy Bit of a long shot, but emails from Proton to my Fastmail email address with my personal domain show up as "green checkmark" in Proton webUI, but appears inside of Fastmail as a blank encrypted email. Is there something I can do on my DNS record to tell you not to send me encrypted emails?