#Tuta: #GoEuropean sale, 50% off until July 15
https://tuta.com/goeuropean?t-src=the-new-oil
#cybersecurity #privacy #EU #Europe #email #encryption #FOSS
#Tuta: #GoEuropean sale, 50% off until July 15
https://tuta.com/goeuropean?t-src=the-new-oil
#cybersecurity #privacy #EU #Europe #email #encryption #FOSS
@zackwhittaker @lorenzofb #LMAO, #ROFLMAO even!
There are so many protocols and implementations he could've just copy & pasted with minimal effort, yet he chose to violate the #1stRule of #Security:
I'm sure you know about encryption, but what about steganography?
Steganography is like encryption's subversive little sister. Encryption announces up front, "I have a secret! I bet you can't get to it!" Steganography's jacket has the secret emblazoned on it in a way that only those "in the know" will recognize, as she looks you in the eye and says, "What secret? What are you talking about?"
Steganography is the people's encryption. Instead of relying on fancy, hard math problems to keep a secret, it works by hiding something in plain sight and convincing you there's nothing to even look for. It's the sort of thing two friends can cook up together in an afternoon to pass secret messages and foil the man. The more special purpose and obscure, the better.
And yes, you can use steganography and encryption together.
#subversion
#fascism
#encryption
#steganography
#secrets
#resist
There are some things that are just better as a command, some things that are better in #GUI. I love finding out that there's a GUI (#KDE Ark) for something I've been using command line for (#7Zip archives with #encryption).
#Bitchat ist Jack Dorseys internetfreie Messaging-App | heise online https://www.heise.de/news/Bitchat-ist-Jack-Dorseys-internetfreie-Messaging-App-10477859.html #messenger #Bluetooth #Datenschutz #privacy #Verschlüsselung #encryption
Chiffrement :
S'il vous plaît, les experts et expertes, participez à ce groupe de la CE pour proteger nos libertés contre la surveillance d'État !
Peut-être des gens de @LaQuadrature @technopolice @Dignilog ? Peut-être aussi @aprilorg et j'en oubli forcément…
Donc, repouetez pour que la société civile soit présente et pas juste le MI !
#chiffrement #encryption #surveillance #europeanunion #privacy #vieprivee #law
My messages are “end-to-end encrypted”, which means only me, the recipient, and approximately 47 government agencies can read them.
🇪🇺 The EU wants to decrypt your private data by 2030 • Techradar
「 The EU Commission presented a Roadmap on how it intends to ensure that law enforcement has effective and lawful access to citizens' data
Politicians seek to establish a precedent for the decryption of private data
The Roadmap is part of the ProtectEU strategy, first unveiled in April 2025 」
https://www.techradar.com/vpn/vpn-privacy-security/the-eu-wants-to-decrypt-your-private-data-by-2030
China breaks RSA encryption with a quantum computer - Earth.com
https://www.earth.com/news/china-breaks-rsa-encryption-with-a-quantum-computer-threatening-global-data-security/
「 Specifically, organized crime members in Catalonia use GrapheneOS, a privacy and security-focused operating system that keeps your data out of Google’s reach. Criminals and gang members in Spain prefer using GrapheneOS on Pixel phones, and there’s a good reason for it. GrapheneOS implements full disk and metadata encryption, a security feature exploited by miscreants. But it works best on Pixels 」
https://www.androidauthority.com/google-pixel-organized-crime-preferred-phone-3573578/
Oh and with #encryption I mean the gritty #DIY stuff. So don’t rely on the encrypted backup option baked in your favorite app or (mobile) OS.
If you don’t own it, you are being owned.
#GPG (or #GnuPG) using elliptic curve factorization is your friend!
In the (hopefully near) future post-quantum encryption #pqe will be available in some form. Although this tech was anticipated to arrive years ago… so what’s keeping it.
"There is no “cloud,” just someone else's computer—and when the cops come knocking on their door, these hosts need to be willing to stand up for privacy, and know how to do so to the fullest extent under the law. These legal limits are also important for users to know, not only to mitigate risks in their security plan when choosing where to share data, but to understand whether these hosts are going to bat for them. Taking action together, service hosts and users can curb law enforcement getting more data than they’re allowed, protecting not just themselves but targeted populations, present and future.
This is distinct from law enforcement’s methods of collecting public data, such as the information now being collected on student visa applicants. Cops may use social media monitoring tools and sock puppet accounts to collect what you share publicly, or even within “private” communities. Police may also obtain the contents of communication in other ways that do not require court authorization, such as monitoring network traffic passively to catch metadata and possibly using advanced tools to partially reveal encrypted information. They can even outright buy information from online data brokers. Unfortunately there are few restrictions or oversight for these practices—something EFF is fighting to change.
Below however is a general breakdown of the legal processes used by US law enforcement for accessing private data, and what categories of private data these processes can disclose. Because this is a generalized summary, it is neither exhaustive nor should be considered legal advice. Please seek legal help if you have specific data privacy and security needs."
https://www.eff.org/deeplinks/2025/06/how-cops-can-get-your-private-online-data
#USA #CyberSecurity #PoliceState #Surveillance #Privacy #Encryption #E2E #DataBrokers
“The EU initiative Going Dark has now been launched by the EU Commission. They call it ProtectEU. It’s a rebranding of Chat Control. New name. Same old propaganda.”.
Europe plans to set up for 2030 mass surveillance. The bigots, the imbeciles and the fascists have infiltrated the institutions. They're no better than the rest of the freaks. Time to get rid of the nomenklatura.
https://www.techradar.com/vpn/vpn-privacy-security/the-eu-wants-to-decrypt-your-private-data-by-2030
#BigBrother #surveillance #technopolice #ChatControl #ProtectEU #privacy #encryption
#JackDorsey launches #Bitchat, a #Bluetooth -based messaging platform #message
Bitchat promises #censorship -resistant communication with BLE mesh-based #encryption and ephemeral messaging.
cryptoslate.com/jack-dorsey-...
Jack Dorsey launches Bitchat, ...
BERT Ransomware Group Targets Asia and Europe on Multiple Platforms
A newly emerged ransomware group called BERT has been targeting organizations across Asia and Europe since April. The group employs simple code with effective execution, impacting sectors such as healthcare, technology, and event services. BERT's ransomware operates on both Windows and Linux platforms, using PowerShell-based loaders, privilege escalation, and concurrent file encryption. On Linux systems, it can support up to 50 threads for fast encryption and forcibly shut down ESXi virtual machines. The group's tactics include disabling security features, terminating specific processes, and using standard encryption algorithms. BERT's variants have evolved, streamlining their encryption process and expanding their targeting activities. The Linux variant shows similarities to the REvil ransomware, suggesting possible code reuse.
Pulse ID: 686bb6597ce02f8f4a33b453
Pulse Link: https://otx.alienvault.com/pulse/686bb6597ce02f8f4a33b453
Pulse Author: AlienVault
Created: 2025-07-07 11:58:17
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Asia #CyberSecurity #Encryption #Europe #Healthcare #ICS #InfoSec #Linux #Mac #OTX #OpenThreatExchange #PowerShell #RAT #REvil #RansomWare #Windows #bot #AlienVault
#Überwachung made in EU: Dobrindt vermeidet klares Nein zur #Chatkontrolle | heise online https://www.heise.de/news/Ueberwachung-made-in-EU-Dobrindt-vermeidet-klares-Nein-zur-Chatkontrolle-10476120.html #ChatControl #Datenschutz #privacy #surveillance #Verschlüsselung #encryption
Meine Datenschutz und Privatsphäre Übersicht 2025, für Jedermann 🔐
als PDF Datei:
https://cryptpad.digitalcourage.de/file/#/2/file/vQv0YkkA+eOK5la9awQ0E+jg/p/
Passwort:
idFLSmEeHa#5w4D$"Jq
#DSGVO #TDDDG #unplugtrump
#Datenschutz #Privatsphäre #sicherheit #Verschlüsselung #Adguard
#encryption #WEtell #SoloKey #NitroKey #Email #Cybersecurity #Pixelfed #Massenűberwachung #Leta
#Google #Metadaten #WhatsApp #Threema #Cryptpad #Signal
#Hateaid #Cyberstalking #Messenger #Browser #Youtube #NewPipe #Chatkontrolle #nichtszuverbergen #ÜberwachungsKapitalismus #Microsoft #Apple #Windows10 #Linux #Matrix #Mastodon #Friendica #Fediverse #Mastodir #Loops #2FA #Ransomware #Foss #VeraCrypt #HateAid #Coreboot #Volksverpetzer #Netzpolitik #OpenAndroidInstaller #Nobara
#Digitalisierung #FragdenStaat #Shiftphone #OpenSource #GrapheneOS #CCC #Mail #Mullvad #PGP #GnuPG #DNS #Gaming #linuxgaming #Lutris #Protondb #eOS #Enshittification
#Bloatware #TPM #Murena #LiberaPay #GnuTaler #Taler #PreppingforFuture
#FediLZ #BlueLZ #InstaLZ #ThreatModel
#FLOSS #UEFI #Medienkompetenz
Encryption that isn’t zero knowledge shouldn’t be considered secure.
Your cloud provider reading your ‘encrypted’ files is like a hotel safe where the front desk keeps a master key.
True privacy means YOU hold the only key. 🔐
Magical backdoor only for "the good guys" is a complete fantasy 🔑✨
Let's say the strategy is akin to creating a MagicalKey that unlocks every door (a magical key because thinking encryption backdoors would only be used by "the good guys" is a great example of magical thinking).
Imagine only 1000 police officers have MagicalKeys.
Overtime, let's say only 1% of the police officers accidentally lose their MagicalKey. Now 10 MagicalKeys are lost in the wild and could be used by anyone else, for any purposes, including crime.
Then, let's say only 0.1% of police officers get corrupted by a crime gang. That's just one right? This corrupted "good guy" lets the gang create a double of the MagicalKey. Which crime gang wouldn't want a key that can magically open any door?
Now, the gang creates doubles of the MagicalKey they have. They use it subtly at first to avoid detection. They make sure they never leave traces behind, so victims have no idea their door got unlocked.
During this time, they steal your data, they sell it, they use it to impersonate you, they use it to harm you and your loved ones.
Then, another criminal figures out on their own how to emulate a MagicalKey without even having access to one.
The criminal creates a reproducible mold for this Emulated-MagicalKey and sells it to other criminals on the criminal market. Now, the MagicalKey™️ is available to any criminals looking for it.
Restrictions on the backdoor are off. Your personal data is up for grabs.
This is what is going to happen if backdoors are implemented in end-to-end encryption. But don't worry they say, "it's only for the good guys!".
At least, the criminals' data will also be up for grabs, right?
Nope! The criminals knew about this, so they just started using different channels that weren't impacted.
Criminals will have their privacy intact, they don't care about using illegal tools, but your legal privacy protections will be gone.
Backdoored end-to-end encryption isn't end-to-end anymore, it's just open-ended encryption. This offers pretty much no protection at all.
Extract from: https://www.privacyguides.org/articles/2025/04/11/encryption-is-not-a-crime/
GPG web of trust is dead.
Use TOFU for automation.
Trust on first use only.
Verify fingerprints out of band.
#GPG #TOFU #Trust #Encryption