-
18 votes
-
Hundreds arrested after European law enforcement agencies monitored over 100 million encrypted messages sent through Encrochat, a network used by criminals
20 votes -
Terrible, dangerous EARN IT act set to move forward in the senate; attack on both encryption and free speech online
27 votes -
Signal app downloads spike as US protesters seek message encryption
16 votes -
What are secure alternatives to slack, and what are your experiences with them?
First, some context. The latest from the US justice department saying that they will be focusing on finding "ANTIFA leaders" is incredibly troubling for anyone involved in leftist groups. I...
First, some context. The latest from the US justice department saying that they will be focusing on finding "ANTIFA leaders" is incredibly troubling for anyone involved in leftist groups. I foresee a lot of good activists, regardless of how far left they actually are, arrested on trumped up charges in order to squash opposition.
Organizing is essential to resist fascism. This is made more difficult by the pandemic, as in person meetings bring a huge, almost unacceptable risk. As such, many orgs have been turning to platforms like Slack instead. Trouble is, Slack logs are not encrypted and I am certain that as a business based in the US Slack will not put up a fight to keep user data safe if the feds come calling.
I'd like to collect a decent list of alternatives. Important factors include encryption, ownership, open source status, ease of use, federation, scalability, hosting, cross platform, and anything else you can think of.
23 votes -
Zoom acquires Keybase and announces goal of developing the most broadly used enterprise end-to-end encryption offering
38 votes -
Riot Web 1.6, RiotX Android 0.19 & Riot iOS 0.11 — E2E Encryption by Default & Cross-signing is here
9 votes -
An examination of Zoom's encryption and potential areas of concern in their infrastructure, including the transmission of meeting encryption keys through China
6 votes -
EARN IT act is a direct attack on end-to-end encryption
25 votes -
EU Commission to staff: Switch to Signal messaging app
14 votes -
Policy vs technology
15 votes -
Signal is finally bringing its secure messaging to the masses
28 votes -
The CIA secretly bought a company that sold encryption devices across the world. Then its spies sat back and listened
20 votes -
Military grade encryption won’t save you, or your business
4 votes -
ISPs lied to Congress to spread confusion about encrypted DNS, Mozilla says
15 votes -
Hackers steal secret crypto keys for NordVPN. Here’s what we know so far.
29 votes -
Swedish police can use spyware to hunt criminal gangs – police to use the latest technology to access everyday encrypted apps used by criminals
8 votes -
US Attorney General and officials from UK and Australia will ask Facebook to halt plans for end-to-end encryption in its messaging apps
10 votes -
Who favors unbreakable commercial encryption?
9 votes -
Nextcloud signs public letter, opposing German plan to force decryption of chat
23 votes -
Slack hands over control of encryption keys to regulated customers
5 votes -
Firefox Send's free encrypted file transfers are now available to all
21 votes -
FastMail loses customers, faces calls to move over anti-encryption laws
15 votes -
The Feds cracked El Chapo's encrypted comms network by flipping his system admin
10 votes -
Roger Dingledine - Next Generation Tor Onion Services
5 votes -
Advocating for privacy in Australia
9 votes -
On ghost users and messaging backdoors
8 votes -
Australia passes controversial encryption-busting law
23 votes -
Private by design: How we built Firefox Sync
39 votes -
What are the best practices for passphrase security?
This is a sort of continuation of a previous topic I posted. This weekend I will be wiping and reinstalling my computer and encrypting all of my drives in the process. In doing so, I will have to...
This is a sort of continuation of a previous topic I posted. This weekend I will be wiping and reinstalling my computer and encrypting all of my drives in the process. In doing so, I will have to choose secure passphrases. As such, I have some questions about how best to do this:
-
I have three drives that will be encrypted. Is it okay to have the same passphrase for all of them, or should I have different ones for each?
-
In looking up info on this topic, I came across this article which recommends something called a Diceware wordlist. The premise is that you roll dice which match to a list of 7000+ words. You then string six or more of these words together which become your passphrase. Is this a sound way to generate one?
-
Rather than using the Diceware wordlist, couldn't I roll my own password of the same type using six "random" words of my choosing? I feel like that would be easier to remember, but am I weakening security in doing so?
-
If the Diceware method is to be trusted, does that mean I do not need to pepper my passphrase with digits, mixed case, and special characters? Or should I add these anyway?
-
I'm also considering changing over passwords on a lot of my online accounts based on this method. I like the idea of using a single passphrase as a root, but how do you modify it so that it is different for each account? Would I do something like
[dicewarewords]tildes
,[dicewarewords]spotify
,[dicewarewords]ubuntuforums
, etc.? I feel like it would be too on-the-nose, and it would make it easy to guess my other passwords if one were compromised. On the other hand, I don't like the idea of using a password manager to generate a random string for me. I'd like to still be able to login even without my password manager. -
For people that have used something like this, how do you then deal with password restrictions on sites? I know that no matter how great I set things up I'm still going to have to make exceptions for sites that that either require or forbid numbers, mixed case, or special characters, have character limits, or make me change my password frequently.
14 votes -
-
What are the best practices regarding personal files and encryption?
Over the past year I have done a lot to shore up my digital privacy and security. One of the last tasks I have to tackle is locking down the many personal files I have on my computer that have...
Over the past year I have done a lot to shore up my digital privacy and security. One of the last tasks I have to tackle is locking down the many personal files I have on my computer that have potentially compromising information in them (e.g. bank statements). Right now they are simply sitting on my hard drive, unencrypted. Theft of my device or a breach in access through the network would allow a frightening level of access to many of my records.
As such, what are my options for keeping certain files behind an encryption "shield"? Also, what are the potential tradeoffs for doing so? In researching the topic online I've read plenty of horror stories about people losing archives or whole drives due to encryption-related errors/mistakes. How can I protect against this scenario? Losing the files would be almost as bad as having them compromised!
I'm running Linux, but I'm far from tech-savvy, so I would either need a solution to be straightforward or I'd have to learn a lot to make sense of a more complicated solution. I'm willing to learn mainly because it's not an option for me to continue with my current, insecure setup. I do use a cloud-based password manager that allows for uploading of files, and I trust it enough with my passwords that I would trust it with my files, though I would like to avoid that situation if possible.
With all this in mind, what's a good solution for me to protect my personal files?
26 votes -
Encrypting SNI: Fixing one of the core internet bugs
8 votes -
Purism Announces The "Librem Key"
8 votes -
New Release: Tor Browser 8.0 [based on Firefox Quantum]
15 votes -
Australia's crypto-busting bill still on the table
6 votes -
Public Telegram, private strife | The precarious future of messaging apps
3 votes -
Australia to force tech companies to allow government access to encrypted messages
13 votes -
Behind the messy, expensive split between Facebook and WhatsApp’s founders
5 votes -
EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails
5 votes -
There is no middle ground on encryption
5 votes