"While the UK government adopted powers that could allow the private messages of everyone in the UK to be scanned, it did concede that this could not be put into practice without jeopardizing people’s security and privacy.
ORG has called for Ofcom to publish regulations that make clear that there is no available technology that can allow for scanning of user data to co-exist with strong #encryption and #privacy.“
#20Talks - "Everything has the potential to get better. I am happy to see increased use of end-to-end #encryption in the last 20 years and I'd like to see this continue in the next 20". Our guest is @evacide bringing brilliant insights on #privacy & #cybersecurity
Watch the Talk now!
👉https://europa.eu/!78kXnX
Proton Mail automatically encrypts/decrypts messages between Proton Mail accounts via OpenPGP/PGP.
Proton Mail supports automatically encrypting/decrypting messages between Proton Mail accounts and external email accounts that support OpenPGP/PGP or GnuPG/GPG.
Politische Überwachungsphantasien, die mit dem Vorwand gerechtfertigt werden, "schlimmste Verbrechen wie den sexuellen Missbrauch von Kindern zu bekämpfen", sind unerträglich.
Wer wirklich etwas für Kinder tun will, engagiert sich im Kampf gegen den Klimawandel, für sichere Schul- und Radwege, für Bildung, gewaltfreie Familien, Chancengleichheit und freie Entfaltungsmöglichkeiten.
"In a joint appeal made public on Sunday, European police forces are calling on governments to allow message encryption on communication platforms to be circumvented."
United Nations International Computing Centre (UNICC) has selected #Element as its #secure communications platform, following a competitive #tender process.
Element stood out as a digitally sovereign platform which offers end-to-end #encryption. Its ability to be #federated to support multiple organisations was also a key factor in the #selection process.
#UNICC will self-host Element through an Element Enterprise subscription.
Is email encryption for the average person a waste of effort? I currently use tuta (formerly tutanota) and the encryption they provide either requires the recipient to also use tuta, or that I password protect an email and communicate that password to the recipient some other way. Seems like a lot of effort for basic communications.
Also I’m limited to just using their first-party clients due to their encryption being done client-side. I think after some time with them I’d be more happy using an email service that can work with any client and is committed to respecting my privacy. Anybody have thoughts on this or recommendations? #email#encryption#privacy
As the world relies more and more on a secure digital environment it’s bonkers to see European law enforcement pushing for a less secure internet #encryption#security
Publication on the wonderful EULawAnalysis blog, together with @Frederik_Borgesius: a short analysis of the Podchasov v. Russia case of the ECHR.
This is an important case for the role of encryption for the protection of privacy (Article 8).
This is a great piece by @micahflee about the significance of supporting ephemeral usernames in @signalapp and the challenges #Signal faces developing the gold standard of private messaging apps.
I lost my disk #encryption password. The hand written password does no longer work. I don't know why...
I have a backup, but that disk is also crypted.
All my passwords are in a keepass database file.
This is on the cryted disk and backup.
I also have a backup on my #Fritz.box nas. But the password is ... In the manager.
I have a Fritz VPN to my Fritz box stored on my android phone.
Any recommendation on how to get back acces to the password manager database file?
Help is very welcome.
I fear I need to contact some company and pay Monet to get back my access :(
UPDATE: I could solve the issue by decrypting my very bad handwriting. And I'll now put back my keepass file onto a server a a level of backup and will print out the most important passwords instead of keeping handwritten backups.
I did some testing on a Windows machine and tried out #Bitlocker#encryption for the first time… I'm shocked. This thing is black magic.
How did they manage to do full disk encryption that can be toggled on/off instantly? I was expecting it to rewrite the whole drive, like what would happen with LUKS on Linux OSes/utils, but no: even a whole existing C:\ drive with Win installed, you just enable encryption, it reboots in seconds instead of minutes/hours, and it's done.
The compression utility, known as xz Utils, introduced the malicious code in versions 5.6.0 and 5.6.1, according to Andres Freund, the developer who discovered it. There are no known reports of those versions being incorporated into any production releases for major Linux distributions, but both Red Hat and Debian reported that recently published beta releases used at least one of the backdoored versions—specifically, in Fedora Rawhide and Debian testing, unstable and experimental distributions. A stable release of Arch Linux is also affected. That distribution, however, isn't used in production systems.
Because the backdoor was discovered before the malicious versions of xz Utils were added to production versions of Linux, “it's not really affecting anyone in the real world,” Will Dormann, a senior vulnerability analyst at security firm Analygence, said in an online interview. “BUT that's only because it was discovered early due to bad actor sloppiness. Had it not been discovered, it would have been catastrophic to the world.”