-
11 votes
-
Becoming physically immune to brute-force attacks
11 votes -
New side-channel attack can recover encryption keys from hardware security keys
5 votes -
Why I don't believe in encrypted mail providers anymore
14 votes -
How police are “breaking phone encryption”
21 votes -
Chrome team tests "private prefetch proxy"
8 votes -
"The intelligence coup of the century" - For decades, the CIA read the encrypted communications of allies and adversaries
12 votes -
EU Draft Council Declaration Against Encryption [pdf]
10 votes -
US Government Continues Encryption War
7 votes -
Chrome will soon have its own dedicated certificate root store
8 votes -
You're going to be using confidential computing sooner rather than later
8 votes -
A crash course in CDA Section 230, and a discussion between two lawyers about the EARN IT Act and what it means for free speech and privacy online
5 votes -
Flagship Matrix client, Riot, and developer, New Vector, rebrand as Element
18 votes -
Hundreds arrested after European law enforcement agencies monitored over 100 million encrypted messages sent through Encrochat, a network used by criminals
20 votes -
Terrible, dangerous EARN IT act set to move forward in the senate; attack on both encryption and free speech online
27 votes -
OPSV: Open PGP Signature Verification
4 votes -
Are there any good tools for "one-off" file encryption?
Sorry if this is a silly question, but I keep running into situations where a small CLI or GUI tool that could be handed a single file and hand me back an encrypted version would be useful. I've...
Sorry if this is a silly question, but I keep running into situations where a small CLI or GUI tool that could be handed a single file and hand me back an encrypted version would be useful. I've done some googling, but all I typically turn up is blogspam about random Windows-only tools that seem to be of dubious quality.
Anyone know of a good tool for this type of thing?
9 votes -
Signal app downloads spike as US protesters seek message encryption
16 votes -
What are secure alternatives to slack, and what are your experiences with them?
First, some context. The latest from the US justice department saying that they will be focusing on finding "ANTIFA leaders" is incredibly troubling for anyone involved in leftist groups. I...
First, some context. The latest from the US justice department saying that they will be focusing on finding "ANTIFA leaders" is incredibly troubling for anyone involved in leftist groups. I foresee a lot of good activists, regardless of how far left they actually are, arrested on trumped up charges in order to squash opposition.
Organizing is essential to resist fascism. This is made more difficult by the pandemic, as in person meetings bring a huge, almost unacceptable risk. As such, many orgs have been turning to platforms like Slack instead. Trouble is, Slack logs are not encrypted and I am certain that as a business based in the US Slack will not put up a fight to keep user data safe if the feds come calling.
I'd like to collect a decent list of alternatives. Important factors include encryption, ownership, open source status, ease of use, federation, scalability, hosting, cross platform, and anything else you can think of.
23 votes -
Zoom acquires Keybase and announces goal of developing the most broadly used enterprise end-to-end encryption offering
38 votes -
Keybase, Zoom and Messaging
11 votes -
Riot Web 1.6, RiotX Android 0.19 & Riot iOS 0.11 — E2E Encryption by Default & Cross-signing is here
9 votes -
An examination of Zoom's encryption and potential areas of concern in their infrastructure, including the transmission of meeting encryption keys through China
6 votes -
EARN IT act is a direct attack on end-to-end encryption
25 votes -
EU Commission to staff: Switch to Signal messaging app
14 votes -
Policy vs technology
15 votes -
Signal is finally bringing its secure messaging to the masses
28 votes -
The CIA secretly bought a company that sold encryption devices across the world. Then its spies sat back and listened
20 votes -
Reverse engineering Blind's API and client side encryption
4 votes -
Exploiting the Windows CryptoAPI vulnerability
6 votes -
Military grade encryption won’t save you, or your business
4 votes -
ISPs lied to Congress to spread confusion about encrypted DNS, Mozilla says
15 votes -
Hackers steal secret crypto keys for NordVPN. Here’s what we know so far.
29 votes -
Swedish police can use spyware to hunt criminal gangs – police to use the latest technology to access everyday encrypted apps used by criminals
8 votes -
US Attorney General and officials from UK and Australia will ask Facebook to halt plans for end-to-end encryption in its messaging apps
10 votes -
Who favors unbreakable commercial encryption?
9 votes -
Almost All Web Encryption Works Like This (SP Networks)
3 votes -
Recognizing basic security flaws in local password managers
19 votes -
The PGP Problem
12 votes -
Nextcloud signs public letter, opposing German plan to force decryption of chat
23 votes -
Slack hands over control of encryption keys to regulated customers
5 votes -
Firefox Send's free encrypted file transfers are now available to all
21 votes -
FastMail loses customers, faces calls to move over anti-encryption laws
15 votes -
Encrypted databases: The issues with searchable encryption and the ever-expanding leakage function
6 votes -
The Feds cracked El Chapo's encrypted comms network by flipping his system admin
10 votes -
Roger Dingledine - Next Generation Tor Onion Services
5 votes -
Advocating for privacy in Australia
9 votes -
On ghost users and messaging backdoors
8 votes -
Australia passes controversial encryption-busting law
23 votes -
Private by design: How we built Firefox Sync
39 votes