snarl.de

Suche

Beiträge die mit encryption getaggt sind

The company @Purism have announced a collaboration between them and the people of @monero to build a cash-like, digital payment system for the Librem 5,

The the recently successfully-crowdfunded GNU/Linux smartphone already counts the backing of @matrix, @gnome and @kde.

You can read more about the partnership with Monero here: https://puri.sm/posts/purism-collaborates-with-cryptocurrency-monero-to-enable-mobile-payments/

📱 🐧 🔐 🔳 💰

#Purism #Librem5 #KDE #GNOME #Monero #privacy #encryption #cryptocurrency #crowdfunding #hardware #software #smartphone #GNULinu
Bild/Foto
 

Wanna test #DeltaChat?

Delta Chat is an encrypted #communication tool via #Email / #Imap.

You can write me, if you want: NSA (at) disroot.org

source: https://f-droid.org/packages/com.b44t.messenger/

Bild/Foto
#software #chat #encryption

Delta Chat | F-Droid - Free and Open Source Android App Repository

© 2010-2017 F-Droid Limited and Contributors
 

Try out Delta Chat while it's hot!

Chat with all your friends using Delta Chat. Just insert your email credentials and start chatting. #deltachat works with #IMAP push. So you can reach every person with an email address. If your partner uses Delta Chat too the messages are encrypted by default without any hassles.

Up to now Delta Chat is only available via F-Droid. So get it while it's hot. ;-)

I tested it and found it suitable for daily usage. You can read your email with delta chat just as if it is a normal email client (more than one account is not supported). And you can organize group chats.

Delta Chat respects your privacy. You don't share your addressbook with anyone. It stays on your phone.

Bild/Foto

#messenger #encryption #gpg #gnupg #chat #decentralize

The messenger - Delta Chat

Delta Chat - Email Based Instant Messenger
 

#Lenovo Quietly Patches Massive #Bug Impacting Its #Android Tablets and Zuk, Vibe Phones

source: https://threatpost.com/lenovo-quietly-patches-massive-bug-impacting-its-android-tablets-and-zuk-vibe-phones/128489/
“The problem is, the RSA private key that belongs to the public pair that was used for the signature checking, could be found on the internet as part of an example application of a software library,” according to his research.
If I understand this right then the newbie #developer found some cool code on the #Internet and copied it, without understanding what a private key really is - #WTF?!

#fail #security #encryption #software #smartphone #privacy #news #omg #problem https://threatpost.com/lenovo-quietly-patches-massive-bug-impacting-its-android-tablets-and-zuk-vibe-phones/128489/
 

#TPM Chipsets Generate Insecure #RSA Keys. Multiple Vendors Affected

source: https://www.bleepingcomputer.com/news/security/tpm-chipsets-generate-insecure-rsa-keys-multiple-vendors-affected/

#Security #Computer #encryption #news #Infineon #problem

TPM Chipsets Generate Insecure RSA Keys. Multiple Vendors Affected

Infineon TPM chipsets that come with many modern-day motherboards generate insecure RSA encryption keys that put devices at risk of attack.
 

#WiFi #problem: #KRACK

Source: https://papers.mathyvanhoef.com/ccs2017.pdf
Finally, we confirmed our findings in practice, and found that every Wi-Fi device is vulnerable to some variant of our attacks.
Notably, our attack is exceptionally devastating against #Android 6.0: it forces the client into using a predictable all-zero #encryption key.
#wpa2 #news #hack #warning #danger #security

https://papers.mathyvanhoef.com/ccs2017.pdf
 
Trump’s DOJ tries to rebrand weakened #encryption as “responsible encryption” - https://arstechnica.com/?p=1183985
 
#omg #copyright #law #software #freedom #encryption #axolotl #Moxie #itnews #wtf #license

Axolotl and Proteus – Wire – Medium

When we decided to implement full end-to-end encryption at Wire we looked around and decided on the Axolotl protocol — with certain custom…
 
Bei der E-Mail-Verschlüsselung via GnuPG solltet ihr euren Kontakt immer via Fingerprint verifizieren: https://www.kuketz-blog.de/gnupg-das-dilemma-mit-den-schluesselservern/

#gnupg #fingerprint #encryption #verschlüsselung #schlüsselserver #keyserver

GnuPG: Das Dilemma mit den Schlüsselservern • Kuketz IT-Security Blog

Bei der E-Mail-Verschlüsselung via GnuPG solltet ihr euren Kontakt immer via Fingerprint verifizieren.
 

Private Keys on #Web Servers

source: https://www.golem.de/news/https-private-keys-on-web-servers-1707-128862.html
Other filenames for private keys were #privatekey.key, myserver.key and #key.pem. But the most successful search was for filenames of the schema [domainname].key. All these #filenames are used in instruction guides that can easily be found with a #Google #search.

#security #https #ssl #encryption #fail #configuration #www #itnews #problem #Internet

HTTPS: Private Keys on Web Servers - Golem.de

Each certificate for encrypted HTTPS connections has a private key. But what happens if the private key finds its way onto the web server - and is no longer private?
 

Let's Encrypt brings free wildcard certificates to the web

The CA's new certificate option will give webmasters another tool to encrypt the internet.
[ #TLS #HTTPS #encryption #certificates #LetsEncrypt ]

Let's Encrypt brings free wildcard certificates to the web | ZDNet

The CA's new certificate option will give webmasters another tool to encrypt the internet.
 
Choosing the Proper Tool for the Task : Assessing Your #Encryption Options

Choosing the Proper Tool for the Task

So, you’ve decided to encrypt your communications. Great! But which tools are the best? There are several options available, and your comrade’s favorite may not be the best for you. Each option has...
#Encryption Workarounds Paper Shows Why 'Going Dark' Is Not A Problem, And In Fact Is As Old As Humanity Itself

Encryption Workarounds Paper Shows Why 'Going Dark' Is Not A Problem, And In Fact Is As Old As Humanity Itself

It was October 2014 when FBI Director James Comey made his famous claim that things were "going dark" in the world of law enforcement because of the increasing use of encryption. Since then, Techdirt has had dozens of posts on the topic...

How to use a #xmpp / #jabber account behind a #firewall and #proxy…

source: https://anonsurvivalguide.wordpress.com/2017/03/19/how-to-use-a-xmpp-jabber-account-behind-a-firewall-and-proxy/
Most companies castrate their internet access for their employees with a firewall and proxy. Normally only port 80 and 443 are open, which means no access to the xmpp port 5222. With this #instruction you can tunnel through the firewall to use special xmpp servers. The magic feature is called #BOSH and some fairy dust.

#itnews #communication #internet #encryption #security #privacy #gajim #cntlm #help #tunnel

I will survive ;): How to use a xmpp / jabber account behind a firewall and proxy… (Anonymiss)

Most companies castrate their internet access for their employees with a firewall and proxy. Normally only port 80 and 443 are open, which means no access to the xmpp port 5222. With this instructi…
 
 
What the #CIA #WikiLeaks dump tells us: #Encryption works http://bigstory.ap.org/article/9b72ff0053174f9794c7589db9e177d5/what-cia-wikileaks-dump-tells-us-encryption-works #vault7 #defendWL

What the CIA WikiLeaks dump tells us: Encryption works

NEW YORK (AP) — If the tech industry is drawing one lesson from the latest WikiLeaks disclosures, it's that data-scrambling encryption works, and the industry should use more of it. Documents purportedly outlining a massive…
 
What the #CIA #WikiLeaks dump tells us: #Encryption works http://bigstory.ap.org/article/9b72ff0053174f9794c7589db9e177d5/what-cia-wikileaks-dump-tells-us-encryption-works #vault7 #defendWL

What the CIA WikiLeaks dump tells us: Encryption works

NEW YORK (AP) — If the tech industry is drawing one lesson from the latest WikiLeaks disclosures, it's that data-scrambling encryption works, and the industry should use more of it. Documents purportedly outlining a massive…
 

Signal's encrypted video calling is now available to all

Signal, the encrypted chat app from Open Whisper Systems, now lets anyone chat privately on video. The feature, which first launched on Android last month, has come out of beta and is now available to everyone on both Android and iOS.

[ #messenger #chat #encryption #Signal #Android #iOS ]

Signal's encrypted video calling is now available to all

There’s another secure option when voice or chat won’t do.
 

Signal's encrypted video calling is now available to all

Signal, the encrypted chat app from Open Whisper Systems, now lets anyone chat privately on video. The feature, which first launched on Android last month, has come out of beta and is now available to everyone on both Android and iOS.

[ #messenger #chat #encryption #Signal #Android #iOS ]

Signal's encrypted video calling is now available to all

There’s another secure option when voice or chat won’t do.
 
Moving #Git past #SHA1 no longer behind #lwn paywall https://lwn.net/Articles/715716/ #encryption #git #freesw

Moving Git past SHA-1

The SHA-1 hash
algorithm has been known for at least a decade to be
weak; while no generated hash collisions had been reported, it was assumed
that this would happen before too long. On February 23, Google announced
that it had succeeded at this task. While the technique used is
computationally expensive, this event has clarified what most developers
have known for some time: it is time to move away from SHA-1. While the
migration has essentially been completed in some areas (SSL certificates,
for example), there are still important places where it is heavily used,
including at the core of the Git source-code management system.
Unsurprisingly, the long-simmering discussion in the Git community on
moving away from SHA-1 is now at a full boil.
 

We're Halfway to Encrypting the Entire Web

https://www.eff.org/deeplinks/2017/02/were-halfway-encrypting-entire-web

#EFF #encryption #www

We're Halfway to Encrypting the Entire Web

The movement to encrypt the web has reached a milestone. As of earlier this month, approximately half of Internet traffic is now protected by HTTPS.
 

The CIA Didn’t Break Signal or WhatsApp, Despite What You’ve Heard

There’s been one particularly misleading claim repeated throughout coverage of CIA documents released by WikiLeaks today: That the agency’s in-house hackers “bypassed” the encryption used by popular secure-chat software like Signal and WhatsApp

[ #CIA #Signal #Telegram #WhatsApp #encryption ]

The CIA Didn’t Break Signal or WhatsApp, Despite What You’ve Heard

The agency might be able to break into your phone, but files released today show no ability to intercept encrypted chats before they arrive there.
 

The CIA Didn’t Break Signal or WhatsApp, Despite What You’ve Heard

There’s been one particularly misleading claim repeated throughout coverage of CIA documents released by WikiLeaks today: That the agency’s in-house hackers “bypassed” the encryption used by popular secure-chat software like Signal and WhatsApp

[ #CIA #Signal #Telegram #WhatsApp #encryption ]

The CIA Didn’t Break Signal or WhatsApp, Despite What You’ve Heard

The agency might be able to break into your phone, but files released today show no ability to intercept encrypted chats before they arrive there.
 

The CIA Didn’t Break Signal or WhatsApp, Despite What You’ve Heard

There’s been one particularly misleading claim repeated throughout coverage of CIA documents released by WikiLeaks today: That the agency’s in-house hackers “bypassed” the encryption used by popular secure-chat software like Signal and WhatsApp

[ #CIA #Signal #Telegram #WhatsApp #encryption ]

The CIA Didn’t Break Signal or WhatsApp, Despite What You’ve Heard

The agency might be able to break into your phone, but files released today show no ability to intercept encrypted chats before they arrive there.
 

The CIA Didn’t Break Signal or WhatsApp, Despite What You’ve Heard

There’s been one particularly misleading claim repeated throughout coverage of CIA documents released by WikiLeaks today: That the agency’s in-house hackers “bypassed” the encryption used by popular secure-chat software like Signal and WhatsApp

[ #CIA #Signal #Telegram #WhatsApp #encryption ]

The CIA Didn’t Break Signal or WhatsApp, Despite What You’ve Heard

The agency might be able to break into your phone, but files released today show no ability to intercept encrypted chats before they arrive there.
 

The CIA had created, in effect, its "own NSA" with even less accountability

Bild/Foto@vazelas99@nerdpol.ch - original post

Vault 7: #CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, #WikiLeaks begins its new series of leaks on the #US Central #Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.Bild/Foto

#CIA malware targets #iPhone, #Android, #Samsung smart #TVs, #Windows, #OSx, #Linux, #routers, #CD / #DVDs, #USB, #Apple #Google
can bypass the #encryption of #WhatsApp, #Signal, #Telegram, #Wiebo, #Confide and #Cloackman

#US Consulate in #Frankfurt, #Germany is a covert #CIA #hacker base

https://wikileaks.org/ciav7p1/
 

The CIA had created, in effect, its "own NSA" with even less accountability

Bild/Foto@vazelas99@nerdpol.ch - original post

Vault 7: #CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, #WikiLeaks begins its new series of leaks on the #US Central #Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.Bild/Foto

#CIA malware targets #iPhone, #Android, #Samsung smart #TVs, #Windows, #OSx, #Linux, #routers, #CD / #DVDs, #USB, #Apple #Google
can bypass the #encryption of #WhatsApp, #Signal, #Telegram, #Wiebo, #Confide and #Cloackman

#US Consulate in #Frankfurt, #Germany is a covert #CIA #hacker base

https://wikileaks.org/ciav7p1/
 

Vault 7: #CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, #WikiLeaks begins its new series of leaks on the #US Central #Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.Bild/Foto
#CIA malware targets #iPhone, #Android, #Samsung smart #TVs, #Windows, #OSx, #Linux, #routers, #CD / #DVDs, #USB, #Apple #Google
can bypass the #encryption of #WhatsApp, #Signal, #Telegram, #Wiebo, #Confide and #Cloackman

#US Consulate in #Frankfurt, #Germany is a covert #CIA #hacker base

https://wikileaks.org/ciav7p1/

Vault7 - Home

 

Vault 7: #CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, #WikiLeaks begins its new series of leaks on the #US Central #Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.Bild/Foto
#CIA malware targets #iPhone, #Android, #Samsung smart #TVs, #Windows, #OSx, #Linux, #routers, #CD / #DVDs, #USB, #Apple #Google
can bypass the #encryption of #WhatsApp, #Signal, #Telegram, #Wiebo, #Confide and #Cloackman

#US Consulate in #Frankfurt, #Germany is a covert #CIA #hacker base

https://wikileaks.org/ciav7p1/

Vault7 - Home

 
#wikileaks uses #encryption to reduce the incentive to -undermine publication -censorship by targeting domain (see 2010 Cablegate mirrors)
 
For those still unsure why #freesw #torrent #encryption etc. powerful, see what #wikileaks is doing with #torrent and #vault7 #crypto today
 
Hi,

I gave Mailvelope, a browser plugin that enhances your everyday webmail interface with GPG capability, another shot. And I have to say that it is a joy to use now!

They even came up with a new keyserver concept that allows for automatic key exchange, and I would like to encourage everybody, even those who use other GPG software, to upload their key there, so that Mailvelope users can write them encrypted emails right away.

Sincerely,

Malte

#mailvelope #encryption #cryptoparty #gpg

Mailvelope

Mailvelope Open Source Projekt. OpenPGP im Browser.
 
Hi,

I gave Mailvelope, a browser plugin that enhances your everyday webmail interface with GPG capability, another shot. And I have to say that it is a joy to use now!

They even came up with a new keyserver concept that allows for automatic key exchange, and I would like to encourage everybody, even those who use other GPG software, to upload their key there, so that Mailvelope users can write them encrypted emails right away.

Sincerely,

Malte

#mailvelope #encryption #cryptoparty #gpg

Mailvelope

Mailvelope Open Source Projekt. OpenPGP im Browser.
 
Hi,

I gave Mailvelope, a browser plugin that enhances your everyday webmail interface with GPG capability, another shot. And I have to say that it is a joy to use now!

They even came up with a new keyserver concept that allows for automatic key exchange, and I would like to encourage everybody, even those who use other GPG software, to upload their key there, so that Mailvelope users can write them encrypted emails right away.

Sincerely,

Malte

#mailvelope #encryption #cryptoparty #gpg

Mailvelope

Mailvelope Open Source Projekt. OpenPGP im Browser.
 
#Google Invites Open Source Devs to Give #E2EMail #Encryption a Go
http://www.linuxinsider.com/story/84351.html?rss=1 #freesw #security

Google Invites Open Source Devs to Give E2EMail Encryption a Go | Community | LinuxInsider

Google has released its E2EMail encryption code to open source as a way of pushing development of the technology. "Google has been criticized over the amount of time and seeming lack of progress it has made in E2EMail encryption, so open sourcing the code could help the project proceed more quickly," said Charles King, principal analyst at Pund-IT. That will not stop critics, though, he added.
 
Agent Man http://www.linuxjournal.com/content/secret-agent-man on how to use #ssh agent for #encryption everywhere (real encryption, not like Microsoft's back-doored)

Secret Agent Man | Linux Journal

It used to be that only the paranoid among us focused on strict security practices, yet these days, it seems like people are stepping up their games with respect to encryption, password policy and how they approach their computers in general.
 
SHA-RE the pain: With #SHA1 Proven Unsafe, Ubuntu's #Mir Switches From SHA1 To #SHA256 http://www.phoronix.com/scan.php?page=news_item&px=Mir-SHA256-Cookies #security #encryption

Linux Hardware Reviews, Open-Source Benchmarks & Linux Performance - Phoronix

Phoronix is the leading technology website for Linux hardware reviews, open-source news, Linux benchmarks, open-source benchmarks, and computer hardware tests.
 

#NHS accused of covering up huge #data #loss that put thousands at #risk | Society | The Guardian

All data but #medical #records in particular must not be accessed via anything as insecure as #Microsoft #Windows. They need to use proper #encryption.

NHS accused of covering up huge data loss that put thousands at risk

Exclusive: More than 500,000 pieces of patient data between GPs and hospitals went undelivered between 2011 and 2016
 

#NHS accused of covering up huge #data #loss that put thousands at #risk | Society | The Guardian

All data but #medical #records in particular must not be accessed via anything as insecure as #Microsoft #Windows. They need to use proper #encryption.

NHS accused of covering up huge data loss that put thousands at risk

Exclusive: More than 500,000 pieces of patient data between GPs and hospitals went undelivered between 2011 and 2016
 
neuer älter
Help us to cover the server costs for snarl.de
Click here to lend your support to: Help us to cover the server costs for snarl.de!