jmcrookston, to random
@jmcrookston@mastodon.social avatar

intentionally baked into secret secure radio standard.

https://www.wired.com/story/tetra-radio-encryption-backdoor/

remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

: "Right now, we need more end-to-end encryption. There’s little evidence that weakening encryption will make much of a dent on the fentanyl trafficking on our streets. But after the US Supreme Court’s Dobbs decision, end-to-end encryption is now a critical means of thwarting attempts to prosecute women who seek abortions in states where politicians lay claim to their major life choices. Last year, Meta turned over private messages from a Facebook user to Nebraska police that led to felony charges against a mother who aided her daughter in ending a pregnancy by abortion pills. If those messages had been protected by end-to-end encryption—as WhatsApp and Signal messages are—authorities would not have been able to read them. If “deliberate blindness” is banned, watch out for widespread snooping to find out who might be seeking abortions."

https://www.wired.com/story/plaintext-50-years-into-the-crypto-wars-encryptions-opponents-are-still-wrong/

JorisMeys, to Signal
@JorisMeys@mstdn.social avatar

Got sick and tired of Suckerberg's attacks on the data on my phone. I'm throwing out #WhatsApp and giving #Signal another go.

https://www.howtogeek.com/708916/what-is-signal-and-why-is-everyone-using-it/

kkarhan,

@JorisMeys No, because that example is clearly lacking.

is proven to have and willingly integrate them.

The worst Canonical did on @ubuntu were ...

https://mstdn.social/@kkarhan/110752102451030694

glynmoody, to random
@glynmoody@mastodon.social avatar

Apple says it will pull Messages and FaceTime if UK forces back-door access to its encryption - https://boingboing.net/2023/07/20/apple-says-it-will-pull-messages-and-facetime-if-uk-forces-back-door-access-to-its-encryption.html

kkarhan,

@glynmoody ROFLMAO!

just didn't get paid enough or things that the isn't worth the hassle since they don't get paid to rat out customers...

They are certainly not only capable to do but have done so in the past already in the "P.R." ...
https://mstdn.social/@kkarhan/110747317346565446

kuketzblog, to Bulgaria German
@kuketzblog@social.tchncs.de avatar

Ein beliebter Taschenspielertrick: "Der Server steht physisch in einem Serverraum in der EU".

Und nun? Alles in Ordnung mit Datenschutz und Co? Natürlich nicht. Eigentlich ist es egal, wo der Server steht. Entscheidend ist, wer darauf Zugriff hat. Wer mit dem Serverstandort EU argumentiert, hat nicht verstanden, wie das Internet funktioniert.

kkarhan,

@kuketzblog Zumal ganz klar sagt dass allein Besitzberhältnisse durch einne Firma aus den oder eine Tochter in den USA einem zu - inkl. verpflichten!

M.a.W.: Nur wenn es jener Firma faktisch komplett unmöglich ist auf jene Daten zuzugreifen kann hier & eingehalten werden...

aber ich wette @maxschrems von @noybeu wird das wohl bald de-jure zementieren...

enno, to random German
@enno@nafo.army avatar

deleted_by_author

  • Loading...
  • kkarhan,

    @enno not that surprising given that every #SingleVendor / #SingleProvider "solution" for communications will inherently have #Govware #backdoors, otherwise they'd be illegal!

    That's why noone who takes #ITsec, #InfoSec, #OpSec & #comSec 100% seriously will use them for anything but posting public info.

    That's how the drug dealers using #EncroChat & #ANØM got caught and why noone should trust any #VPN or #Messenger!

    https://www.youtube.com/watch?v=WVDQEoe6ZWY
    https://twitter.com/thegrugq/status/1085614812581715968

    krzyzanowskim, to apple
    @krzyzanowskim@mastodon.social avatar

    should build a social network

    kkarhan,

    @krzyzanowskim no!

    Because they are a and they'd only make some / shit that has more than had in it's history...

    publicvoit, to apple
    @publicvoit@graz.social avatar

    #Apple is stopping 3rd-party graphic cards.

    Apple is stopping plug-ins for Apple Mail (#MailExtensions aren't a decent replacement).

    Apple thinks that encrypting traffic to their cloud is "end-to-end #encryption". (That's a lie.)

    Your #cloud data belongs to Apple.

    The golden cage is getting smaller and smaller.

    Just sayin' in case you'll wonder that you can't escape any more some day.

    Don't invest in ecosystems like that!

    https://karl-voit.at/2021/01/18/tool-choices/ #lockin #privacy #freedom #platform

    publicvoit,
    @publicvoit@graz.social avatar

    @EpiphanicSynchronicity @voxel As soon as a company who only delivers closes source software does promote a wrong understanding of , the whole company can't be trusted any more.

    No independent party is able to check anything related to the implementation. The software delivered can contain any number of - voluntary or not.

    If or is an issue, the software needs to be in order to be able to check its claims.

    arstechnica, to random
    @arstechnica@mastodon.social avatar

    Millions of PC motherboards were sold with a firmware backdoor

    Hidden code in many Gigabyte motherboards invisibly and insecurely downloads programs.

    https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

    ben,

    @arstechnica Looks like mine is on that list… but I only use Linux. Does that mean I’m safe?

    raptor, to random
    jmamblat, to infosec
    itnewsbot, to random

    Leaked Government Document Shows Spain Wants to Ban End-to-End Encryption - The file reveals how a proposal to scan private messages for child sexual abuse material ... - https://www.wired.com/story/europe-break-encryption-leaked-document-csa-law/ /privacy

    RTP, to opensource
    @RTP@fosstodon.org avatar
    pluralistic, to Signal
    @pluralistic@mamot.fr avatar

    They’re still trying to ban

    https://doctorow.medium.com/theyre-still-trying-to-ban-cryptography-33aa668dc602

    Call this the “enforcement nexus” — for a government to enforce a law, it needs something to seize. Governments have broad latitude to seize things and people within their territorial borders (though this is not absolute, as I’ll discuss below). But when it comes to conduct outside a government’s territory, enforcement depends upon the cooperation of another government — this is why so many crime dramas turn on a desperate dash for countries that don’t have extradition treaties. Governments can project enforcement power into any territory that will allow it to seize the people or property of its adversaries. When the Argentinian government defaulted on its bonds, it failed to reckon with the fact that its US dollar holdings were stashed in the US Federal Reserve Bank in New York. That meant that the vulture capitalists seeking to squeeze Argentina could argue their case in their home court in the USA, seeking a judgment that could be enforced domestically — that is, by seizing the Argentinian government’s assets held on US soil.
    National firewalls are everywhere today. Sometimes, they’re sold as turnkey solutions — by both Chinese and western firms — to poor countries with very little technical capacity of their own. Spy agencies from large, powerful countries love it when poor countries install foreign-made national firewalls, as these are key to “third-party collection” (when a spy agency taps into another spy agency’s files) and “fourth-party collection” (when a spy agency taps into another spy agency that has tapped into another spy-agency’s files). As national firewalls proliferate, so too do enforcement nexuses. After Edward Snowden revealed that US tech giants were allowing US spy agencies to plunder their user data, the EU imposed a (perfectly reasonable) data localization regulation that required US tech companies to keep Europeans’ data on servers within the EU (this regulation remains contentious and fragile). The EU doesn’t have a regional or national firewall, so tech giants who don’t want to comply with the regulation could simply withdraw their sales offices and engineering departments and lobbyists from the EU and ignore the rule — at least to the extent that they could convince US courts not to enforce EU judgments against them. But the EU has other enforcement nexuses it could rely upon. It could order European banks and payment processors to block payments to tech firms that ignore the localization rule. Payment processing remains a
    Enter American culture-war nonsense. In Texas, they want to ban websites that explain how to get an abortion, as well as sites that ship the pills for a medication abortion. In Florida, they want to force bloggers who write about the state government to pay a fee and register with the state, prohibiting anonymous commentary about the state legislature and its actions. Florida has also required that online providers cease permitting their users to display pronouns other than the ones they were assigned at birth. Of course, online services have no way to know what pronouns any of their users were assigned at birth, so sites like Github are complying with Florida law by simply not displaying pronouns to Floridian users. The biggest barrier to enforcing these laws is the US Constitution, which these laws assuredly violate. It’s entirely possible that a lower court will uphold these laws. It’s conceivable that an appeals court will do so as well. It’s not outside the realm of possibility that the current Supreme Court — illegitimately stacked with far-right partisan hacks lacking any shred of principle — will follow suit. But it’s far from a sure thing. It’s not even clear whether the legislatures that passed these laws and the governors who signed them want them to be enforced. After all, if these policies do come into force, large numbers of corporations are likely to shutter their offices and move out of state (especially in Florida, an increas

    madargon, to drawing Polish
    @madargon@is-a.cat avatar

    How I see attempts to force #backdoors in E2E #encryption...

    #drawing #comic #geek #government #privacy #security

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • ngwrru68w68
  • everett
  • InstantRegret
  • magazineikmin
  • thenastyranch
  • rosin
  • GTA5RPClips
  • Durango
  • Youngstown
  • slotface
  • khanakhh
  • kavyap
  • DreamBathrooms
  • provamag3
  • ethstaker
  • osvaldo12
  • tester
  • cubers
  • cisconetworking
  • mdbf
  • tacticalgear
  • modclub
  • Leos
  • anitta
  • normalnudes
  • megavids
  • lostlight
  • All magazines