-
7 votes
-
Crooks’ mistaken bet on encrypted phones
8 votes -
UK proposes making the sale and possession of encrypted phones illegal
10 votes -
Anker finally comes clean about its Eufy security cameras
23 votes -
Three lessons from Threema: Analysis of a secure messenger
7 votes -
Anker’s Eufy lied to us about the security of its security cameras. Despite claims of only using local storage, Eufy has been uploading identifiable footage to the cloud.
18 votes -
Plex breach exposes usernames, emails, and encrypted passwords
12 votes -
Testing end-to-end encrypted backups and more on Messenger
15 votes -
The battle for a powerful cyberweapon: A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware
4 votes -
No place to hide - UK campaign against end-to-end encryption
9 votes -
How Signal is playing with fire: A push into untraceable payments could put end-to-end encryption at risk
12 votes -
Researchers who built similar system explain why Apple's CSAM scanning system is dangerous
10 votes -
Apple's plan to "think different" about encryption opens a backdoor to your private life
15 votes -
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
28 votes -
US FBI secretly ran the An0m encrypted messaging platform, yields hundreds of arrests in global sting
7 votes -
Australian Criminal Intelligence Agency looking to expand it's intelligence gathering powers by claiming that criminals use encrypted platforms 'almost exclusively'
19 votes -
In defense of Signal
12 votes -
Encrypted messaging app Signal blocked in China
29 votes -
CEO of Sky Global encrypted chat platform indicted by US
4 votes -
Signal's server repo hasn't been updated since April 2020
26 votes -
Signal ignores proxy censorship vulnerability, bans researchers
11 votes -
New side-channel attack can recover encryption keys from hardware security keys
5 votes -
Why I don't believe in encrypted mail providers anymore
14 votes -
Chrome team tests "private prefetch proxy"
8 votes -
You're going to be using confidential computing sooner rather than later
8 votes -
A crash course in CDA Section 230, and a discussion between two lawyers about the EARN IT Act and what it means for free speech and privacy online
5 votes -
Flagship Matrix client, Riot, and developer, New Vector, rebrand as Element
18 votes -
Hundreds arrested after European law enforcement agencies monitored over 100 million encrypted messages sent through Encrochat, a network used by criminals
20 votes -
Terrible, dangerous EARN IT act set to move forward in the senate; attack on both encryption and free speech online
27 votes -
Signal app downloads spike as US protesters seek message encryption
16 votes -
What are secure alternatives to slack, and what are your experiences with them?
First, some context. The latest from the US justice department saying that they will be focusing on finding "ANTIFA leaders" is incredibly troubling for anyone involved in leftist groups. I...
First, some context. The latest from the US justice department saying that they will be focusing on finding "ANTIFA leaders" is incredibly troubling for anyone involved in leftist groups. I foresee a lot of good activists, regardless of how far left they actually are, arrested on trumped up charges in order to squash opposition.
Organizing is essential to resist fascism. This is made more difficult by the pandemic, as in person meetings bring a huge, almost unacceptable risk. As such, many orgs have been turning to platforms like Slack instead. Trouble is, Slack logs are not encrypted and I am certain that as a business based in the US Slack will not put up a fight to keep user data safe if the feds come calling.
I'd like to collect a decent list of alternatives. Important factors include encryption, ownership, open source status, ease of use, federation, scalability, hosting, cross platform, and anything else you can think of.
23 votes -
Zoom acquires Keybase and announces goal of developing the most broadly used enterprise end-to-end encryption offering
38 votes -
Riot Web 1.6, RiotX Android 0.19 & Riot iOS 0.11 — E2E Encryption by Default & Cross-signing is here
9 votes -
An examination of Zoom's encryption and potential areas of concern in their infrastructure, including the transmission of meeting encryption keys through China
6 votes -
EARN IT act is a direct attack on end-to-end encryption
25 votes -
EU Commission to staff: Switch to Signal messaging app
14 votes -
Policy vs technology
15 votes -
Signal is finally bringing its secure messaging to the masses
28 votes -
The CIA secretly bought a company that sold encryption devices across the world. Then its spies sat back and listened
20 votes -
The EARN IT Act: How to ban end-to-end encryption without actually banning it
16 votes -
Apple dropped plan for encrypting backups after FBI complained
21 votes -
Military grade encryption won’t save you, or your business
4 votes -
ISPs lied to Congress to spread confusion about encrypted DNS, Mozilla says
15 votes -
Hackers steal secret crypto keys for NordVPN. Here’s what we know so far
29 votes -
Swedish police can use spyware to hunt criminal gangs – police to use the latest technology to access everyday encrypted apps used by criminals
8 votes -
US Attorney General and officials from UK and Australia will ask Facebook to halt plans for end-to-end encryption in its messaging apps
10 votes -
Who favors unbreakable commercial encryption?
9 votes -
Tech firms “can and must” put backdoors in encryption, AG Barr says
15 votes -
Nextcloud signs public letter, opposing German plan to force decryption of chat
23 votes -
Slack hands over control of encryption keys to regulated customers
5 votes