Double Edged Sword of Secure Traffic

Double Edged Sword of Secure Traffic

If this is a device issued by the organization or if a certificate is required to gain internet access, then the user effectively agrees to this level of supervision.

Hackers Can Tell What Netflix Bandersnatch Choices You Make

Hackers Can Tell What Netflix Bandersnatch Choices You Make

In practice, though, the researchers say that they can analyze Netflix's encrypted interactive video traffic to find clues about what users are watching, and which choices they've made in their movie journeys.

The Challenges Facing Privacy Apps

The Challenges Facing Privacy Apps

Using software that is open source is a critical piece of the puzzle, because this allows peer review to verify that the developer isn’t collecting unnecessary data to make the app or service work, and that the developers have considered all of the external privacy threats.

List of alternative services that truly respect your privacy

List of alternative services that truly respect your privacy

Telegram, WhatsApp, Facebook Messenger, The main issue with using Telegram is that they use a slightly less secure encryption protocol than that used by Signal. The main issue with WhatsApp and Facebook messenger, though they use strong end-to-end encryption by default (just like Signal), is their collection of metadata.

Now you can have your own channel inside Facebook to keep your messages and posts private

Now you can have your own channel inside Facebook to keep your messages and posts private

Mark Nadal, a self-described “political activist fighting against surveillance capitalism,” today unveiled Private Party, a disarmingly simple protocol that evades the data capture used by tech giants.

MLS and Federated Messaging

MLS and Federated Messaging

For messaging with only two participants, Loki Messenger has both an Asynchronous mode using Swarm storage on the Service Node network, and a faster Synchronous mode which allows users to send messages directly to each other via Lokinet.

HTTPS Isn't Always As Secure As It Seems

HTTPS Isn't Always As Secure As It Seems

Vulnerabilities that are full-on "leaky" involve more deeply flawed encryption channels between browsers and web servers that would enable an attacker to decrypt all the traffic passing through them.

ADAMANT Puts Privacy Back In Your Hands

ADAMANT Puts Privacy Back In Your Hands

The main point of the article is that none of these messengers use E2EE to secure the group chats. With this in mind, let us look closer at the main key points of the article: Supporting apps running both on smartphones and computers request various permissions excessively and sometimes contain Trojan, however, many users continue to trust their devices’ operating system.

Tech companies not 'comfortable' storing data in Australia, Microsoft warns

Tech companies not 'comfortable' storing data in Australia, Microsoft warns

On Wednesday the company’s president and chief legal officer, Brad Smith, said customers were asking it to build data centres elsewhere as a result of the changes, and the industry needed greater protection against the creation of “systemic weaknesses” in their products.

Law enforcement needs to protect citizens and their data

Law enforcement needs to protect citizens and their data

While the bill includes limited restrictions on law enforcement requests, the vague definitions and concentrated authorities give the Australian government sweeping powers that ultimately undermine the security and privacy of the very citizens they aim to protect.

Preparing for Travel – Properly Backing Up Your Android Cell Phone

Preparing for Travel – Properly Backing Up Your Android Cell Phone

Wipe: Reinstall OS and Overwrite All Free Space with Garbage Data You can use the “system restore” or “factory reset” feature on a lot of phones in order to roll back all of your apps, settings, and caches to the factory defaults.

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Two years ago, Google has silently handed the project E2EMail which was started to enable easy end-to-end encryption in Gmail via a browser extension to "the open source community". Three years earlier, Google had announced that they are building an end-to-end encrypted Chrome plugin to automatically encrypt emails between Gmail users.

Slack hands over control of encryption keys to regulated customers

Slack hands over control of encryption keys to regulated customers

Slack announced today that it is launching Enterprise Key Management (EKM) for Slack, a new tool that enables customers to control their encryption keys in the enterprise version of the communications app.

Celebrate Pi Day with PIA

Celebrate Pi Day with PIA

3/14 is known as Pi Day every year because the date’s numbers represent the first three digits of Pi. As an irrational, transcendental, number – Pi has come to represent the beauty and complexity of mathematics in one symbol.

Least Authority and Private Internet Access announce PrivateStorage.io: a secure and privacy-focused cloud storage solution.

Least Authority and Private Internet Access announce PrivateStorage.io: a secure and privacy-focused cloud storage solution.

As firm believers in protection of our customers’ privacy, we joined efforts to offer a private, secure and end-to-end encrypted solution to allow the end user — not third-parties — to determine whether and to what extent the personal data on the storage service is collected, shared, and processed.

Introducing Firefox Send, Providing Free File Transfers while Keeping your Personal Information Private

Introducing Firefox Send, Providing Free File Transfers while Keeping your Personal Information Private

Here’s how Firefox Send works: <span style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" data-mce-type="bookmark" class="mce_SELRES_start"></span> Encryption & Controls at your fingertips Imagine the last time you moved into a new apartment or purchased a home and had to share financial information like your credit report over the web.

A Privacy-Focused Facebook? We'll Believe It When We See It.

A Privacy-Focused Facebook? We'll Believe It When We See It.

The Proof is in the Pudding At the core of Zuckerberg’s announcement is Facebook’s plan to merge its three messaging platforms: Facebook’s Messenger, Instagram’s Direct, and WhatsApp. The announcement promises security and privacy features across the board, including end-to-end encryption, ephemerality, reduced data retention, and a commitment to not store data in countries with poor human rights records.

Mark Zuckerberg discovers privacy

Mark Zuckerberg discovers privacy

Milking Facebook’s stewardship of WhatsApp for all it’s worth, Zuckerberg was intentional about pitching his new centralized yet private future for Facebook around the model of the encrypted messaging app, a platform so antithetical to Facebook’s broad mission that its founders left in disgust after cashing their checks.

Read Mark Zuckerberg’s letter on Facebook’s privacy-focused future

Read Mark Zuckerberg’s letter on Facebook’s privacy-focused future

We plan to build this the way we’ve developed WhatsApp: focus on the most fundamental and private use case — messaging — make it as secure as possible, and then build more ways for people to interact on top of that, including calls, video chats, groups, stories, businesses, payments, commerce, and ultimately a platform for many other kinds of private services.

A Serious Concern About Post-Quantum Cryptography and Strength Targets

A Serious Concern About Post-Quantum Cryptography and Strength Targets

A “Security Level 1” cipher that has a breakthrough that allows a sqrt speedup on analysis suddenly only has 64 or less “bits of strength”, which is very breakable.

ProtonMail vs Mailbox.org comparison

ProtonMail vs Mailbox.org comparison

It’s the method you can use with Mailbox.org’s webmail and with any standard PGP capable email client. To enable inbox encryption, you’ll need to set a public PGP key which Mailbox.org will use to encrypt all incoming emails before storing them in your inbox.

Tide Foundation gives consumers full control of personal data on blockchain

Tide Foundation gives consumers full control of personal data on blockchain

As for consumers controlling encryption keys, the company says it has created a patented technology to simplify the process of managing those keys in order to put that process within reach of anyone, one that passes what they call “the Grandpa Test.” “We have developed a layer, a decentralized way to dumb down blockchain to a ubiquitous user experience on the web,” Yuval Hertzog, the other company co-founder explained.

Windows 10 Shouldn’t Upload Encryption Keys to Microsoft, Privacy Watchdog Says

Windows 10 Shouldn’t Upload Encryption Keys to Microsoft, Privacy Watchdog Says

Microsoft is one of the giants that can further improve how user security is handled, as the EFF says that Windows 10 should actually allow customers who install the Home version of the operating system to keep the disk encryption keys to themselves.

End-to-end encryption ‘infects’ law enforcement, says FBI, as Apple and others seek to protect it

End-to-end encryption ‘infects’ law enforcement, says FBI, as Apple and others seek to protect it

The remark was made as Apple and other tech companies warn of the danger of compromising strong encryption after the Australian government passed a law which would require them to help access encrypted messages on demand … NordVPN The WSJ quotes FBI executive assistant director Amy Hess.

How To Encrypt Your Internet Traffic

How To Encrypt Your Internet Traffic

You can protect your privacy on a micro-level by focusing on keeping websites from collecting your private information, but on a broader scale, you can encrypt all of your internet activity with one sweep by encrypting your router.

Apple, Google, Facebook Among Tech Giants Fighting Privacy Battle

Apple, Google, Facebook Among Tech Giants Fighting Privacy Battle

Last week, a consortium of tech companies led by Apple, Google, and issued a letter to the Australian government asking it to rethink a law passed in December that would make it easier for law enforcement to compel those companies to furnish user data.

Tech giants and civil liberty groups call out ghost cops and source code demands under Australian encryption laws

Tech giants and civil liberty groups call out ghost cops and source code demands under Australian encryption laws

A collective of companies and civil liberty groups including Apple, Amazon, Google, Microsoft, Facebook, Privacy International, Linux Australia, and the Electronics Frontier Foundation have issued a warning that requirements to silently add law enforcement into encryption chats could introduce vulnerabilities and create new risks to systems.

Cyber-Mercenary Groups Shouldn't be Trusted in Your Browser or Anywhere Else

Cyber-Mercenary Groups Shouldn't be Trusted in Your Browser or Anywhere Else

Browsers rely on this list of authorities, which are trusted to verify and issue the certificates that allow for secure browsing, using technologies like TLS and HTTPS.

The latest twist on adding backdoors to encryption is spooky – and dangerous

The latest twist on adding backdoors to encryption is spooky – and dangerous

It certainly doesn’t resolve the long-standing tension between a desire for the authorities to have access to communications protected with strong encryption, and the requirement for the public, businesses and government to be able to use the Internet as safely as possible.

Invest in Lavabit

Invest in Lavabit

Richard Delgado: One of the reasons that we're certainly here, and so excited to meet with Tim Draper, his interest in cryptocurrencies and just him being a trailblazer and pioneer for all thing tech, we think he's the natural fit for us for an investor.

More