-
9 votes
-
Apple will soon support encrypted RCS messaging with Android users
39 votes -
End-to-end encryption - How we stopped trusting clouds and started encrypting our data
15 votes -
What are the best truly unbeatable E2EE, presumably P2P messaging apps?
My thoughts are that apps can have end-to-end encryption, but if the app on the end is still connected to someone's servers, there's nothing stopping them from pulling the contents of the chat...
My thoughts are that apps can have end-to-end encryption, but if the app on the end is still connected to someone's servers, there's nothing stopping them from pulling the contents of the chat after it's been decrypted on the other end. What options do we have for messaging that don't have this issue? I understand that anything that I can see can still get taken by the OS, etc., but I'm curious about that first step.
28 votes -
Meredith Whittaker said Signal intends to exit Sweden should its government amend existing legislation essentially mandating the end of end-to-end encryption
26 votes -
Apple stops offering end-to-end encrypted iCloud storage in the UK due to government spying demands
64 votes -
UK orders Apple to let it spy on users’ encrypted accounts
49 votes -
Let's Encrypt is ending support for expiration notification emails
34 votes -
US officials urge Americans to use encrypted apps amid unprecedented cyberattack
50 votes -
Encrypted Root with LUKS and Opal
6 votes -
Meet DAVE: Discord’s new end-to-end encryption for audio and video
35 votes -
Sweden and Denmark will summon tech companies over ads on their platforms that are posted by gangs to recruit young Swedes to commit violent crimes in the Nordics
17 votes -
Signal developer explains why early encrypted messaging tools flopped
35 votes -
Proton is launching encrypted documents to take on Google Docs
42 votes -
“Upload moderation” undermines end-to-endencryption: A statement from Meredith Whittaker, Signal president
28 votes -
Encryption At Rest: Whose Threat Model Is It Anyway?
15 votes -
The unbreakable Kryptos code
18 votes -
Sweden's public sector has ditched Big Tech in the name of privacy as a major telecom provider unveiled a new secure collaboration hub
14 votes -
Hackers found a way to open any of three million hotel keycard locks in seconds
42 votes -
Hackers can read private AI-assistant chats even though they’re encrypted
20 votes -
Nintendo is suing the creators of popular Switch emulator Yuzu, saying their tech illegally circumvents Nintendo's software encryption and facilitates piracy
67 votes -
WhatsApp chats will soon work with other encrypted messaging apps
17 votes -
Advice on making a full snapshot/backup of a running Linux system (Debian)
Hi all, I’m looking for advice re making a full snapshot/backup of a running Linux system (Debian). In an ideal world, should an issue occur, I would like to be able to load a live USB with the...
Hi all,
I’m looking for advice re making a full snapshot/backup of a running Linux system (Debian).
In an ideal world, should an issue occur, I would like to be able to load a live USB with the backup, boot and write from that.
Timeshift seems to be an option but I’m wondering how the above would work in my case. A few questions.
- My disk is fully encrypted with LUKS. Would this pose a problem?
- I would like to write my backups to a veracrypt container. Would this pose any issue? I’m not sure how I would boot from a live USB in this case I could not decrypt the USB.
Essentially I’d like a step-by-step guide to backing up my full system (including all files in home) in such a way that I can easily roll back should the worst happen. Do any of you know of such a guide or can perhaps offer some help?
10 votes -
No more phone number swaps: Signal messaging app now testing usernames
46 votes -
Encrypt. Now.
27 votes -
‘Who benefits?’ Inside the EU’s fight over scanning for child sex content.
23 votes -
Signal adds quantum-resistant encryption to its E2EE messaging protocol
26 votes -
Quantum resistance and the Signal Protocol
23 votes -
Apple threatens to pull FaceTime and iMessage in the UK over proposed surveillance law changes
71 votes -
Google Messages signs onto cross-platform encrypted group chat standard
53 votes -
How Signal walks the line between anarchism and pragmatism
45 votes -
A new bill would force internet companies in the USA to spy on their users for the Drug Enforcement Administration
45 votes -
NeverSSL
12 votes -
NordVPN changes to username and password encryption cause Auth_FAIL in OpenVPN/Gluetun
Recently NordVPN rolled out an update which forced users to use an encrypted username and password combination when connecting through OpenVPN. I haven't seen any posts on this here, and it took...
Recently NordVPN rolled out an update which forced users to use an encrypted username and password combination when connecting through OpenVPN. I haven't seen any posts on this here, and it took me way longer than I want to admit troubleshooting this issue because I knew my original credentials were correct.
If you use a gluetun container for routing any of other containers traffic, you might have recently noticed a 500 Internal Service Error in your Health Status and when you check your logs you will find a AUTH_FAILED message.
Solution below:
- Go to NordVPN website and log in (using your normal credentials)
- Under accounts, services, click NordVPN
- Click "Set up NordVPN Manually" at the bottom of the page
- You will receive an email verification code, using whatever email you have set up for your NordVPN services. Type this code into the popup window.
- Copy your new encrypted credentials for your Open VPN client settings.
This is my first post, please add tags as required.
24 votes -
Proton Pass, open-source and encrypted password manager
17 votes -
Inside the Italian mafia’s encrypted phone of choice
7 votes -
Upgrade your LUKS key derivation function
7 votes -
Crooks’ mistaken bet on encrypted phones
8 votes -
UK proposes making the sale and possession of encrypted phones illegal
10 votes -
Anker finally comes clean about its Eufy security cameras
23 votes -
Three lessons from Threema: Analysis of a secure messenger
7 votes -
Anker’s Eufy lied to us about the security of its security cameras. Despite claims of only using local storage, Eufy has been uploading identifiable footage to the cloud.
18 votes -
Plex breach exposes usernames, emails, and encrypted passwords
12 votes -
Testing end-to-end encrypted backups and more on Messenger
15 votes -
The battle for a powerful cyberweapon: A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware
4 votes -
No place to hide - UK campaign against end-to-end encryption
9 votes -
Who controls the Internet? And should they?
10 votes -
Researchers who built similar system explain why Apple's CSAM scanning system is dangerous
10 votes -
Apple's plan to "think different" about encryption opens a backdoor to your private life
15 votes -
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
28 votes