FCC Net Neutrality Repeal: Ignoring the Digital Privacy of Millions of Users

FCC Net Neutrality Repeal: Ignoring the Digital Privacy of Millions of Users

Pai, the former Verizon lawyer, even halted a data security rule that would require ISPs to take “reasonable” steps to protect customer information from unauthorized use or access, making sure Internet providers aren’t at fault if your data is exposed.

Tech sector says Peter Dutton's encrypted message 'back door' will jeopardise digital security

Tech sector says Peter Dutton's encrypted message 'back door' will jeopardise digital security

That is why the Home Affairs Minister, Peter Dutton, has been so keen to pass laws forcing messaging companies to put "back doors" into their technology, allowing authorities to access these otherwise secret communications.

The Motherboard Guide to Not Getting Hacked

The Motherboard Guide to Not Getting Hacked

The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks , smart home robots that could kill you , and your telecom providers who routinely lose customer data and unwittingly help hackers steal your phone number (and sometimes your money.) Meanwhile, an ever-growing and increasingly passive surveillance apparatus that has trickled down to state and local police is an ever-present threat to our digital privacy and increasingly uses technology that is developed by Silicon Valley giants who are supposedly consumer-focused.

This incredibly simple privacy app helps protect your phone from snoops with one click

This incredibly simple privacy app helps protect your phone from snoops with one click

The app not only saves the process of manually configuring the Android or iOS operating systems to use 1.1.1.1 as their default DNS server, it also forms an encrypted connection between the DNS server and every app on the phone. That’s because Cloudflare uses a VPN connection to send these encrypted DNS requests.

E-Mail

E-Mail

Susimail is a web-based email client intended primarily for use with Postman's mail servers, and is designed with security and anonymity in mind. Anonymity Friendly Email Provider List [ edit ]

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

Doh! What My Encrypted Drive Can Be Unlocked By Anyone?

The paper outlines that some SSD drives (including Samsung and Crucial) do not actually encrypt the data properly, and that they can be easily by-passed without a system password.

Australian bill spells trouble for data privacy around the world

Australian bill spells trouble for data privacy around the world

An unlikely alliance of tech companies, start-ups and digital consumer rights groups has locked horns with the Australian government over its proposed anti-data encryption law, currently under review by the Parliamentary Joint Committee on Intelligence and Security (PJCIS).

Privacy vs. security: Why the widespread use of encryption is essential to national security

Privacy vs. security: Why the widespread use of encryption is essential to national security

Most recently, the Australian government has waged a campaign to promote encryption backdoors, which would weaken the right to privacy and make us all less safe. Proponents of these kinds of laws say encrypted services, like WhatsApp or ProtonMail, allow criminals to plan and carry out attacks beyond the reach of police.

Russian court orders Telegram messaging app to pay fine

Russian court orders Telegram messaging app to pay fine

The fine came after Telegram refused to provide its users' encryption keys to Russia's Federal Security Service (FSB). Encryption keys like the ones used by Telegram and other messaging services enable users to communicate in a way that keeps the content of their messages secret even if they are intercepted by intelligence services or other third parties.

New Signal privacy feature removes sender ID from metadata

New Signal privacy feature removes sender ID from metadata

Plenty of messaging apps use strong encryption to make it next to impossible for law enforcement officers or other potential adversaries to read communications sent between parties. Sealed sender, which puts most user information inside the encrypted message, uses two new devices to get around this potential privacy risk:

Telegram Desktop Saves Conversations Locally in Plain Text

Telegram Desktop Saves Conversations Locally in Plain Text

The desktop variant for Telegram secure messaging app fails to protect chat content locally and offers access to plain text conversations and media that otherwise travel encrypted.

Spy and police chiefs demand passage of Australian encryption access law

Spy and police chiefs demand passage of Australian encryption access law

Without providing any evidence, Australian Security Intelligence Organisation (ASIO) chief Duncan Lewis told a parliamentary committee hearing on October 19 that suspected terrorists were using encrypted messages to plan potential attacks.

EFF Dice-Generated Passphrases

EFF Dice-Generated Passphrases

This page includes information about passwords, different wordlists, and EFF's suggested method for passphrase generation. Use the directions below with EFF's random number generator dice or your own set. EFF's Short Wordlist #2 [.txt], for use with four dice, featuring longer words that may be more memorable.

How to encrypt your entire life in less than an hour

How to encrypt your entire life in less than an hour

Hackers were then able to use his email and password to gain access to his Twitter and Pinterest accounts. Tip #5: Send private text messages with Signal If you want reasonably private browsing (no system can ever be 100% secure), you should use Tor.

Signal Desktop Leaves Message Decryption Key in Plain Sight

Signal Desktop Leaves Message Decryption Key in Plain Sight

As the encryption key will be required each time Signal Desktop opens the database, it will store it in plain text to a local file called %AppData%\Signal\config.json on PCs and on a Mac at ~/Library/Application Support/Signal/config.json.

Why the NSA Called Me After Midnight and Requested My Source Code

Why the NSA Called Me After Midnight and Requested My Source Code

Maybe people would die, or at least Dave instilled that impression on me as he politely asked if I would be willing to give him my source code; all the while, apologizing for not being able to tell me anything more about the situation.

Quantum Computing – Is the World of a Security Internet Over?

Quantum Computing – Is the World of a Security Internet Over?

After decades and billions of dollars in research, designs are finally coming online that can solve tasks faster than classical computer designs.

The Linux Kernel's Speck Death Sentence Finally Being Carried Out

The Linux Kernel's Speck Death Sentence Finally Being Carried Out

The removal of Speck from the Linux kernel tree is finally happening.Google decided in August they wouldn't use Speck as planned but rather work on the new HPolyC crypto code for use in future Android Go devices.

Cisco contradicts Dutton’s claim breaking digital encryption won’t create ‘back doors’

Cisco contradicts Dutton’s claim breaking digital encryption won’t create ‘back doors’

At a committee hearing in Canberra on Friday, witnesses from Cisco, Optus and Telstra called for a better definition of the bill’s main safeguard that tech companies cannot be asked to build “systemic” weaknesses into their products.

Criptext launches the first encrypted email app on Linux

Criptext launches the first encrypted email app on Linux

Our goal since launching in August was to make Criptext a community-driven effort towards protecting email privacy and being available on Linux is the purest demonstration of this commitment. Aren’t there other secure email services out there that are open source?

Cryptography for Absolute Beginners – parserite – Medium

Cryptography for Absolute Beginners – parserite – Medium

That data is then transmitted as ciphertext by the email provider to the intended recipient, who is the only person who can decrypt and read it. This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext.

Australian encryption-busting Bill would create backdoors: Cisco

Australian encryption-busting Bill would create backdoors: Cisco

In a submission [PDF] to the Parliamentary Joint Committee on Intelligence and Security -- which is currently reviewing the legislation as the government attempts to ram it through Parliament -- Cisco called out Canberra for not allowing greater transparency on disclosing notices and requests from Australian authorities to access encrypted communications.

Apple to Australia: “This is no time to weaken encryption”

Apple to Australia: “This is no time to weaken encryption”

Apple has filed its formal opposition to a new bill currently being proposed by the Australian government that critics say would weaken encryption.

German Unity Day: Today Is the Day We Got Rid of the Surveillance State GDR.

German Unity Day: Today Is the Day We Got Rid of the Surveillance State GDR.

If you want to know how it feels like to live in a surveillance state, you need to talk to people who did. Let's fight against surveillance online to protect our freedom of speech and our right to privacy!

Apple argues stronger encryption will thwart criminals in letter to Australian government

Apple argues stronger encryption will thwart criminals in letter to Australian government

In Apple’s eyes, encryption makes everyone’s devices harder to hack and less vulnerable to take-overs, viruses, and other malicious attacks that could undermine personal and corporate security, as well as public infrastructure and services.

Australian Encryption Bill – An Exploitable Backdoor in the Startup Community -

Australian Encryption Bill – An Exploitable Backdoor in the Startup Community -

Co-founder of block-chain startup Loki, Josh Jessop-Smith is concerned that the Australian encryption bill would entirely undermine their project. The main concern is that by allowing law enforcement to access encrypted data, it is a possibility that the business deal revolving around that data may become vulnerable and thus, get exploited easily.

Why Any Backdoor Would Be a Threat to Online Security.

Why Any Backdoor Would Be a Threat to Online Security.

In regular intervals, Politicians demand that companies add backdoors to their end-to-end encrypted cloud services to enable law enforcements to easier persecute criminals. When Politicians ask for an easy backdoor access to online communication, they also ignore that total surveillance was never an option in the offline world: It is not illegal to lock ones door.

How to Live Without Google

How to Live Without Google

We host @duckduckgo.com addresses on FastMail, an independent, paid service that also includes calendar and contacts support across all devices. Ghost is both a hosted (paid) and self-installable blogging platform, tracker-free by default and run by a non-profit foundation.

Google and Facebook join rights groups to fight Australia's encryption bill

Google and Facebook join rights groups to fight Australia's encryption bill

Tech heavyweights Google and Facebook have joined civil and digital rights groups in an unusual alliance aimed at defeating Australia’s planned encryption laws. The Communications Alliance chief executive, John Stanton, said the government was trying to ram its encryption legislation through without proper consultation.

The Five Eyes Statement on Encryption: Things Are Seldom What They Seem

Earlier this September, law enforcement officials from the Five Eyes intelligence alliance—made up of Australia, Canada, New Zealand, the United Kingdom, and the United States—met in Australia and issued a Statement of Principles on Access to Evidence and Encryption .

More