gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

Ukraine claims it hacked Russian Ministry of Defence, stole secrets and encryption ciphers.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/ukraine-claims-it-hacked-russian-ministry-of-defence-stole-secrets-and-encryption-ciphers/

echo_pbreyer, to random German
@echo_pbreyer@digitalcourage.social avatar

🇬🇧 The #TaurusLeak is a warning of the #EUGoingDark plans!

If secure #encryption is compromised, so are top state secrets. This is about war and peace.

https://home-affairs.ec.europa.eu/document/download/26f7710a-ae4b-4616-a062-99fc93680bed_en?filename=HLG-background-document-01032024_en.pdf #Taurus

remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

#Cybersecurity #Privacy #Encryption #HumanRights: "In summary [80], the Court concluded that the retention and unrestricted state access to internet communication data, coupled with decryption requirements, cannot be regarded as necessary in a democratic society, and are thus unlawful. It emphasized that a direct access of authorities to user data on a generalized basis and without sufficient safeguards impairs the very essence of the right to private life under the Convention. The Court also highlighted briefs filed by the European Information Society Institute (EISI) and Privacy International, which provided insight into the workings of end-to-end encryption and explained why mandated backdoors represent an illegal and disproportionate measure." https://www.eff.org/deeplinks/2024/03/european-court-human-rights-confirms-undermining-encryption-violates-fundamental

Frederik_Borgesius, to security

‘One of the generals on conference call about Ukraine used non-secure line to dial in… the 38-minute phone call held over the platform WebEx that was subsequently leaked by Kremlin-controlled TV, had not been intercepted by an individual Russian spy but was most likely the result of a random sweep of insecure data on the sidelines of the Singapore airshow’ https://theguardian.com/world/2024/mar/05/individual-error-let-moscow-intercept-military-call-germany-says #encryption #security #cybersecurity #privacy #ukraine #russia #germany

ghose, to archlinux
@ghose@gts.xmgz.eu avatar

Tales from the LUKS

do you have a handy or you usually travel with? they are small, light, cheap... convenient.

it's not that you store there Top Secrets (maybe!) but in case it was lost or stolen you will feel more relaxed if the drive was securely encrypted. LUKS

implements a platform-independent standard on-disk format for use in various tools. This facilitates compatibility and interoperability among different programs and operating systems[...]

I was to write a blogpost about it, but there are plenty of them available to use LUKS encryption in any platform. Just three here:

My usb-luks are automatically detected and mounted (after pass-phrase prompt) in both :archLinux: and :debian: 🥳

Tutanota, to random
@Tutanota@mastodon.social avatar

#Encryption saves lives.

NeadReport, to Notesnook
@NeadReport@vivaldi.net avatar

The Dev for the Evernote REPLACEMENT I'm using, provides a concise and informative interview over at Ness Labs.
https://nesslabs.com/notesnook-featured-tool

"Abdullah Atta is the founder of Notesnook, an open source and end-to-end encrypted note-taking app with cross-device syncing.

Abdullah is obsessed with privacy, promising no spying and no tracking, and has designed many features to ensure your information is only accessible to who you want it to."

@notesnook

Tutanota, to privacy
@Tutanota@mastodon.social avatar

aims to stop minors from using end-to-end to protect their data. 🚫

Stand up for encryption & ! ✊

This isn't protecting the youth, it's at its finest.

We must stop NV Attorney General Aaron Ford from undermining basic practices!
👉 https://tuta.com/blog/nevada-blocks-encryption-for-minors

glynmoody, to Bulgaria
@glynmoody@mastodon.social avatar

New #EU government attempt to bulk search private messages and destroy secure end-to-end encryption - https://netzpolitik.org/2024/chatkontrolle-der-rat-will-es-nochmal-versuchen/#2024-02-22_Presidency_LEWP_CSAR_New-approach_6850 they are determined to undermine #encryption #e2ee

jos1264, to Cybersecurity
@jos1264@social.skynetcloud.site avatar
itnewsbot, to random

Nevada Sues To Deny Kids Access To Meta's Messenger Encryption - An anonymous reader quotes a report from The Register: A law firm acting on behalf... - https://meta.slashdot.org/story/24/02/27/0037240/nevada-sues-to-deny-kids-access-to-metas-messenger-encryption?utm_source=rss1.0mainlinkanon&utm_medium=feed #encryption

glynmoody, to random
@glynmoody@mastodon.social avatar

#EFF Statement on Nevada's Attack on End-to-End #Encryption - https://www.eff.org/deeplinks/2024/02/eff-statement-nevadas-attack-end-end-encryption "Encryption is the most vital means we have to protect privacy, which is especially important for young people online." (v @alecmuffett)

CenDemTech, to random
@CenDemTech@techpolicy.social avatar

Today, a district court in Nevada is hearing a case about whether Meta should have to comply with the state AG’s demand for a temporary restraining order to stop Meta from offering end-to-end #encryption (#E2EE) on Facebook’s Messenger for children in Nevada under the age of 18.

@CenDemTech opposes this unprecedented assault on children’s use of #encryption. https://cdt.org/wp-content/uploads/2024/02/2024-02-20-NV-State-Motion-for-TRO-and-Prelim-Injunction-on-OST.pdf

joeo10, to privacy
@joeo10@mastodon.sdf.org avatar

Meanwhile at the same time, Nevada is currently trying to grant a temporary restraining order to ban Meta/FB from rolling out end-to-end-encryption or #E2EE, threating #privacy and #security in the process. https://www.techdirt.com/2024/02/26/nevada-is-in-court-this-morning-looking-to-get-a-temporary-restraining-order-blocking-meta-from-using-end-to-end-encryption/

Here's @mmasnick:

"This is a full-on attack on encryption. If Nevada succeeds here, then it’s opening up courts across the country to outlaw #encryption entirely. This is a massive, dangerous attack on security and deserves much more attention."

Edent, to fediverse
@Edent@mastodon.social avatar

🆕 blog! “HTTP Signature Infinite Loop?”

I'm trying to get my head round HTTP Signatures as they're used extensively in the Fediverse. Conceptually, they're relatively straightforward. You send me a normal HTTP request. For example, you want to POST something to https://example.com/data You send me these headers: POST /data Host: example.com Date: Sa…

👀 Read more: https://shkspr.mobi/blog/2024/02/http-signature-infinite-loop/

#ActivityPub #CyberSecurity #encryption #fediverse #http

blog, to fediverse
@blog@shkspr.mobi avatar

HTTP Signature Infinite Loop?
https://shkspr.mobi/blog/2024/02/http-signature-infinite-loop/

I'm trying to get my head round HTTP Signatures as they're used extensively in the Fediverse.

Conceptually, they're relatively straightforward.

You send me a normal HTTP request. For example, you want to POST something to https://example.com/data

You send me these headers:

POST /dataHost: example.comDate: Sat, 24 Feb 2024 14:43:48 GMTAccept-Encoding: gzipDigest: SHA-256=aaC57TDzM0Wq+50We2TkCsdMDvdqON92edg7KI+Hk8M=Content-Type: application/activity+jsonSignature: keyId="https://your_website.biz/publicKey",algorithm="rsa-sha256",headers="(request-target) host date digest content-type",signature="JGQ53kEoIiMWRp9By9jajVGCOCu4n7XBeiA1uY5xLcnAxL2Y1GIgU/...=="Connection: Keep-AliveContent-Length: 751

In order to verify the contents of the message, I need to do three things:

  1. Check the SHA-256 hash of the message matches the content of the "Digest" header.
  2. Check the timestamp is somewhat fresh.
  3. Check the signature matches.

The first is simple: base64_encode( hash( "sha256", $request_body, true ) ).
The second is a matter of opinion. I might be happy to receive messages from the distant past or far in the future. For the sake of a little clock drift, let's allow 60 seconds either way.
The third gets complicated.

First, I need to get the public key published at keyId="https://your_website.biz/publicKey".

Next, I need to know which algorithm is being used to sign the headers: algorithm="rsa-sha256"

Then, I need to know which headers - and in what order - are being signed: headers="(request-target) host date digest content-type"

So I create a string using the received details which matches those headers in that specific order:

(request-target) POST /dataHost: example.comDate: Sat, 24 Feb 2024 14:43:48 GMTDigest: SHA-256=aaC57TDzM0Wq+50We2TkCsdMDvdqON92edg7KI+Hk8M=Content-Type: application/activity+json

I can verify if the signature - signature="JGQ53kEoIiMWRp9By9jajVGCOCu4n7XBeiA1uY5xLcnAxL2Y1GIgU/...==" matches by:

openssl_verify(    $headersString,     $signature,     $publicKey,     $algorithm);

If that's TRUE then all is well.

But can you spot the implicit problem?

How do I get your server's public key?

I just GET https://your_website.biz/publicKey - but if your server uses something like Authorised Fetch then I have to sign my request to you.

Which means your server will need to validate my signature by obtaining my public key. Which it will get by signing a request and sending it to me. Which, before I return my public key, I will need to validate your signature by obtaining your public key. Which I will get by signing a request... and so on.

This deadlock loop is documented. The usual way around it is either for the sending server to use an instance-specific signature which can be retrieved by an unsigned request, or to allow any unsigned request to access a user's public key.

I get why things happen this way - I just wish it were easier to implement!

https://shkspr.mobi/blog/2024/02/http-signature-infinite-loop/

#ActivityPub #CyberSecurity #encryption #fediverse #http

maxleibman, to privacy
@maxleibman@mastodon.social avatar

If you believe the good guys need to have a way to get around encryption, you either haven’t thought about it enough, or you’re not one of the good guys.

https://mastodon.lawprofs.org/@riana/111982802756354530

#encryption #privacy #E2EE #RightToBearMath

KestrelSWard, to random

That is IT. FUCK GOOGLE. If you’re not going to provide technical support with a real live person then fuck you I’m going somewhere else. I’ve had this account for over a decade and now I can’t get into it on my new phone because YOUR STUFF IS BROKEN. And there’s no way to contact a real person in real time for help with any of the products!!

I’m so mad and I’m so frustrated with this whole phone upgrade. So fuck Apple too.

BWPanda,

@KestrelSWard I've not used either, but @privacyguides recommends @protonmail. So I'd personally go with them.

They don't list @mailfence as a recommendation, apparently because MailFence doesn't support '#encryption at rest': https://github.com/privacytools/privacytools.io/issues/1908#issuecomment-627154266

Which looks to still be the case in 2024: https://restoreprivacy.com/email/reviews/mailfence/

#ProtonMail #MailFence #PrivacyGuides #privacy

Tutanota, to space
@Tutanota@mastodon.social avatar

Congrats to for the successful landing of ! 🌑🚀

Do you know what else is out of this world? Our upcoming post-quantum solution for protecting your . ⚛️

You can learn more about this quantum leap👇
https://tuta.com/blog/post-quantum-cryptography

YourAnonRiots, to Cybersecurity Japanese

⚡ Apple's #iMessage is getting a major security upgrade with PQ3, a new post-quantum cryptography protocol that protects against future attacks from quantum computers.

https://thehackernews.com/2024/02/apple-unveils-pq3-protocol-post-quantum.html

#encryption #cybersecurity #privacy

majorlinux, to apple
@majorlinux@toot.majorshouse.com avatar

Now my messages are ready for the quantum leap

Apple seems to have joined Signal in future-proofing encryption - Desk Chair Analysts

https://dcanalysts.net/apple-seems-to-have-joined-signal-in-future-proofing-encryption/

yawnbox, to apple
@yawnbox@disobey.net avatar

iMessage quantum security arrives with iOS 17.4 - @9to5Mac

This would have been the perfect article to remind people that all of this E2EE doesn’t matter if you backup your iMessages in iCloud, where they will be backed up clear-text to Apple/NSA, unless both parties turn on Advanced Data Protection

https://9to5mac.com/2024/02/21/imessage-quantum-security-ios-17-4/

itnewsbot, to random

Apple Rolls Out iMessage Upgrade To Withstand Decryption By Quantum Computers - Apple is rolling out an upgrade to its iMessage texting platform to defend against... - https://it.slashdot.org/story/24/02/21/1431259/apple-rolls-out-imessage-upgrade-to-withstand-decryption-by-quantum-computers?utm_source=rss1.0mainlinkanon&utm_medium=feed #encryption

gfarrell, to apple
@gfarrell@mastodon.world avatar
remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

#CyberSecurity #Privacy #Surveillance #Encryption: "Shrugging about the dangers of surveillance can seem reasonable when that surveillance isn’t very impactful on our lives. But for many, fighting for privacy isn't a choice, it is a means to survive. Privacy inequity is real; increasingly, money buys additional privacy protections. And if privacy is available for some, then it can exist for all. But we should not accept that some people will have privacy and others will not. This is why digital privacy legislation is digital rights legislation, and why EFF is opposed to data dividends and pay-for-privacy schemes.

Privacy increases for all of us when it increases for each of us. It is much easier for a repressive government to ban end-to-end encrypted messengers when only journalists and activists use them. It is easier to know who is an activist or a journalist when they are the only ones using privacy-protecting services or methods. As the number of people demanding privacy increases, the safer we all are. Sacrificing others because you don't feel the impact of surveillance is a fool's bargain."

https://www.eff.org/deeplinks/2024/02/privacy-isnt-dead-far-it

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines