-
9 votes
-
Should we chat, too? Security analysis of WeChat’s MMTLS encryption protocol.
13 votes -
Meet DAVE: Discord’s new end-to-end encryption for audio and video
35 votes -
Sweden and Denmark will summon tech companies over ads on their platforms that are posted by gangs to recruit young Swedes to commit violent crimes in the Nordics
17 votes -
Signal developer explains why early encrypted messaging tools flopped
35 votes -
Proton is launching encrypted documents to take on Google Docs
42 votes -
“Upload moderation” undermines end-to-endencryption: A statement from Meredith Whittaker, Signal president
28 votes -
Sweden's public sector has ditched Big Tech in the name of privacy as a major telecom provider unveiled a new secure collaboration hub
14 votes -
Hackers found a way to open any of three million hotel keycard locks in seconds
42 votes -
Hackers can read private AI-assistant chats even though they’re encrypted
20 votes -
WhatsApp chats will soon work with other encrypted messaging apps
17 votes -
Advice on making a full snapshot/backup of a running Linux system (Debian)
Hi all, I’m looking for advice re making a full snapshot/backup of a running Linux system (Debian). In an ideal world, should an issue occur, I would like to be able to load a live USB with the...
Hi all,
I’m looking for advice re making a full snapshot/backup of a running Linux system (Debian).
In an ideal world, should an issue occur, I would like to be able to load a live USB with the backup, boot and write from that.
Timeshift seems to be an option but I’m wondering how the above would work in my case. A few questions.
- My disk is fully encrypted with LUKS. Would this pose a problem?
- I would like to write my backups to a veracrypt container. Would this pose any issue? I’m not sure how I would boot from a live USB in this case I could not decrypt the USB.
Essentially I’d like a step-by-step guide to backing up my full system (including all files in home) in such a way that I can easily roll back should the worst happen. Do any of you know of such a guide or can perhaps offer some help?
10 votes -
No more phone number swaps: Signal messaging app now testing usernames
46 votes -
Encrypt. Now.
27 votes -
‘Who benefits?’ Inside the EU’s fight over scanning for child sex content
23 votes -
Signal adds quantum-resistant encryption to its E2EE messaging protocol
26 votes -
Quantum resistance and the Signal Protocol
23 votes -
Apple threatens to pull FaceTime and iMessage in the UK over proposed surveillance law changes
71 votes -
Google Messages signs onto cross-platform encrypted group chat standard
53 votes -
How Signal walks the line between anarchism and pragmatism
45 votes -
A new bill would force internet companies in the USA to spy on their users for the Drug Enforcement Administration
45 votes -
NeverSSL
12 votes -
NordVPN changes to username and password encryption cause Auth_FAIL in OpenVPN/Gluetun
Recently NordVPN rolled out an update which forced users to use an encrypted username and password combination when connecting through OpenVPN. I haven't seen any posts on this here, and it took...
Recently NordVPN rolled out an update which forced users to use an encrypted username and password combination when connecting through OpenVPN. I haven't seen any posts on this here, and it took me way longer than I want to admit troubleshooting this issue because I knew my original credentials were correct.
If you use a gluetun container for routing any of other containers traffic, you might have recently noticed a 500 Internal Service Error in your Health Status and when you check your logs you will find a AUTH_FAILED message.
Solution below:
- Go to NordVPN website and log in (using your normal credentials)
- Under accounts, services, click NordVPN
- Click "Set up NordVPN Manually" at the bottom of the page
- You will receive an email verification code, using whatever email you have set up for your NordVPN services. Type this code into the popup window.
- Copy your new encrypted credentials for your Open VPN client settings.
This is my first post, please add tags as required.
24 votes -
Proton Pass, open-source and encrypted password manager
17 votes -
Inside the Italian mafia’s encrypted phone of choice
7 votes -
Upgrade your LUKS key derivation function
7 votes -
Crooks’ mistaken bet on encrypted phones
8 votes -
UK proposes making the sale and possession of encrypted phones illegal
10 votes -
Anker finally comes clean about its Eufy security cameras
23 votes -
Three lessons from Threema: Analysis of a secure messenger
7 votes -
Anker’s Eufy lied to us about the security of its security cameras. Despite claims of only using local storage, Eufy has been uploading identifiable footage to the cloud.
18 votes -
Plex breach exposes usernames, emails, and encrypted passwords
12 votes -
Testing end-to-end encrypted backups and more on Messenger
15 votes -
The battle for a powerful cyberweapon: A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware
4 votes -
No place to hide - UK campaign against end-to-end encryption
9 votes -
Researchers who built similar system explain why Apple's CSAM scanning system is dangerous
10 votes -
Apple's plan to "think different" about encryption opens a backdoor to your private life
15 votes -
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
28 votes -
US FBI secretly ran the An0m encrypted messaging platform, yields hundreds of arrests in global sting
7 votes -
Australian Criminal Intelligence Agency looking to expand it's intelligence gathering powers by claiming that criminals use encrypted platforms 'almost exclusively'
19 votes -
In defense of Signal
12 votes -
Encrypted messaging app Signal blocked in China
29 votes -
CEO of Sky Global encrypted chat platform indicted by US
4 votes -
Signal's server repo hasn't been updated since April 2020
26 votes -
Signal ignores proxy censorship vulnerability, bans researchers
11 votes -
New side-channel attack can recover encryption keys from hardware security keys
5 votes -
Why I don't believe in encrypted mail providers anymore
14 votes -
Chrome team tests "private prefetch proxy"
8 votes -
You're going to be using confidential computing sooner rather than later
8 votes -
A crash course in CDA Section 230, and a discussion between two lawyers about the EARN IT Act and what it means for free speech and privacy online
5 votes