Skip to main content

Search

Items tagged with: encryption


 
... Show more...

 

Download #Jami for #Android, #iPhone, #Windows, #Mac or #Linux - it seems it may be the most #secure and #flexible #communications #software yet


... Show more...

 

Latest Google Chrome update draws government and telecom concerns - Encrypted version of the web browser could endanger children's safety online


Critics of the encrypted version of the browser, which is currently available for download but not the default version, argue that it could make it more difficult for companies to block harmful material online as it will bypass most parental control systems.

As it stands now, harmful materials like terrorist propaganda and child-abuse images are blocked by internet companies through filters that scan the web's domain name servers.

I'm still in two minds about this as often agencies use the excuse of terrorism and child porn to impose more of their restrictions on us (their law-abiding citizens). I'd hope everyone is against instigating violence (terrorism can be a very relative term to whatever country you live in) and harm to children but we must also be careful where that is used to unfairly combat genuine freedoms of expression and resisting oppression.

What is also emerging is that with web/cloud services the desktop is becoming irrelevant and control of the browser is becoming paramount. We do also have to be concerned about the companies managing the brows... Show more...

 
#unitoodailynews, #freedom, #freesw, #gnulinux, #duplicity, #software, #backup, #gdpr, #encryption, #googledrive, #dropbox, #mega
Duplicity - Ready to go
Vogliamo condividere un repository dedicato ad una configurazione personalizzabile di duplicity per backup cifrati su Google Drive o altri storage.
https://blog.unitoo.it/2019/04/16/duplicity-ready-to-go.html Duplicity - Ready to go

 
https://framapiaf.org/@debacle/101621305682289111

#OMEMO is a big fish 🐠 in the upcoming #Debian 10 release (#buster) bowl. It hopefully will feature five #XMPP clients with this modern #e2e #encryption: #Gajim, #Dino, #Psi+ (all graphical), #jp (command line), and #primitivus (console), the latter two part of #SalutAToi or #SaT

 
Bild/Foto
Something I love about TechChrunch is that they get straight to the point and don't give a singular fuck.
https://www.techdirt.com/articles/20190306/10271141746/fbi-director-chris-wray-needs-to-shut-fuck-up-about-encryption.shtml
#encryption #crypto #fbi #news

 

Backdoors


I just noticed that the little lock thingy in the address bar had the yellow triangle on it on this site. When you click on it, it says the connection is not secure. Why would that happen even temporarily? Must mean someone is snooping on here or something. Why would it need to change between strong and weak encryption?

#encryption #privacy

 
Reposting deleted post. #privacy #tools #surveillance #encryption

 

Evaluating the GCHQ Exceptional Access Proposal


#backdoors #encryption #gchq #privacy

 

How to Encrypt Your DNS With DNSCrypt on Ubuntu and Debian - Because all your web browsing is an Open Book Otherwise


The topic recently came up again about whether a foreign (anyone outside of your own country... or actually even in your own country) agency is tapping into or mining data from your phone. The easy answer (my opinion only) is that yes if you are being targeted for something specific and if the German Chancellor's phone can be bugged by the USA, anyone can bug your personal phone) but no, they would not go to the trouble for each phone if they are scanning masses of data for patterns or vulnerabilities.

The easier way is to spend some effort on hacking a treasure trove of information that is more publicly accessible. So think DNS (domain name lookups) for all sites you and everyone else visits and these are in open text (usually), or hacking Facebook (or just spending money and buying private data from Facebook or similar), or hacking a major ISP where thousands of people's data pass through every day. They go where they can get the most information for the least effort. That's the plain economics of hacking.

DNS (a very old Internet technology) is but one area where you... Show more...

 
Australia just made Man-In-The-Middle attacks required by law. They call it "the ghost" and every #encryption connection has to be open to the government.

Good luck with that.

#eff

 
Under the new laws, security agencies have greater powers to get at the encrypted messages of criminal suspects — in some cases they can demand companies build new capabilities to allow them access. Labor members called the bill flawed during debate on Thursday, but the Opposition later pulled its amendments at the last minute and voted to support the Government.
#Australia #ScienceandTechnology #InformationandCommunication #ComputersandTechnology #InternetTechnology #SmallBusiness #Business #EconomicsandFinance #GovernmentandPolitics #encryption #assistanceandaccessbill #pjcis #technologyindustry #start-ups #telecommunications

 

Australia passes new law to thwart strong encryption


On Thursday, the Australian parliament approved a measure that critics say will weaken encryption in favor of law enforcement and the demands of government.

The new law, which has been pushed for since at least 2017, requires that companies provide a way to get at encrypted communications and data via a warrant process. It also imposes fines of up to A$10 million for companies that do not comply and A$50,000 for individuals who do not comply. In short, the law thwarts (or at least tries to thwart) strong encryption.

Companies who receive one of these warrants have the option of either complying with the government or waiting for a court order. However, by default, the orders are secret, so companies would not be able to tell the public that they had received one.

However, the law as currently written seems to contain what some view as a loophole. The statute says that companies cannot be compelled to introduce a "systemic weakness" or a "systemic vulnerability" into their software or hardware to satisfy government demands.

"Some suggest that exceptions can... Show more...

 
Some SSDs have had their full-disk encryption password be 32 NULL bytes, no matter your input 🤦‍♂️ https://www.ru.nl/publish/pages/909282/draft-paper.pdf (PDF) #encryption #fail https://t.co/1XCQWplJv7
Image/photo
Image/photo

 
Posted on #Mastodon by @cathal@social.coop:
#NSA’s New Weak, ISO-Rejected, Poorly Documented "Encryption" #Algorithm #Speck now in #Linux #Kernel 4.17
https://itsfoss.com/nsas-encryption-algorithm-in-linux-kernel-is-creating-unease-in-the-community/
#backdoor #privacy #iot #idiocy #Google #Encryption
NSA’s Encryption Algorithm in Linux Kernel is Creating Unease in the Community

 
#vista10 is a keylogger with back doors. It means that no matter what client-side or server-side #encryption is used, whenever entering a password in #microsoft #windows or even #WSL both Microsoft and the #nsa etc. will be able to record it. Windows is unfit for purpose.

 
#vista10 is a keylogger with back doors. It means that no matter what client-side or server-side #encryption is used, whenever entering a password in #microsoft #windows or even #WSL both Microsoft and the #nsa etc. will be able to record it. Windows is unfit for purpose.

 

Australians who won’t unlock their phones could face 10 years in jail


The Australian government wants to force companies to help it get at suspected criminals’ data. If they can’t, it would jail people for up to a decade if they refuse to unlock their phones.

The country’s Assistance and Access Bill, introduced this week for public consultation, strengthens the penalties for people who refuse to unlock their phones for the police. Under Australia’s existing Crimes Act, judges could jail a person for two years for not handing over their data. The proposed Bill extends that to up to ten years, arguing that the existing penalty wasn’t strong enough.

The Bill takes a multi-pronged approach to accessing a suspect’s data by co-opting third parties to help the authorities. New rules apply to “communication service providers”, which is a definition with a broad scope. It covers not only telcos, but also device vendors and application publishers, as long as they have “a nexus to Australia”.

This follows a bit in the footsteps of the US CLOUD Act but extends to the individual too. T... Show more...

 
Cryptomator Secures Your Cloud Storage Data (Open Source, Multi-Platform Client-Side Encryption Tool) #security #encryption #cloud #privacy #linux #opensource

 

EncryptPad: Encrypted Text Editor For Your Secrets #linux #Security #encryption