Combating abuse in Matrix - without backdoors.

Combating abuse in Matrix - without backdoors.

Admins running servers in particular jurisdictions then have the option to enforce whatever rules they need on their servers (e.g. they might want to subscribe to reputation feeds from a trusted source such as the IWF, identifying child sexual abuse content, and use it to block it from their server).This isn’t just about combating abuse - but the same system can also be used to empower users to filter out spam, propaganda, unwanted NSFW content, etc on their own terms.

"Together", the new version of Jami and a new step forward

"Together", the new version of Jami and a new step forward

Jami undergoes continuous ongoing development and release, so you can experience improvements and new features as we implement them.However, organizations wishing to use Jami require a higher level of control over users of their network, so we have created Jami Account Management Server (JAMS).

EU laws may not require general and indiscriminate data retention

EU laws may not require general and indiscriminate data retention

On the plus side, the CJEU does say that information and evidence obtained as a result of indiscriminate retention of traffic and location data in breach of EU law should be disregarded in court cases.

The Why and How of Privacy and Security

The Why and How of Privacy and Security

Server-side means that only information stored on said server is encrypted.This means that the company has the encryption key, and therefore can access your communication (yes, including your nudes).

Oh what a feeling: New Toyotas will upload data to AWS to help create custom insurance premiums based on driver behaviour

Oh what a feeling: New Toyotas will upload data to AWS to help create custom insurance premiums based on driver behaviour

Toyota has expanded its collaboration with Amazon Web Services in ways that will see many of its models upload performance data into the Amazonian cloud to expand the services the auto-maker offers to drivers and fleet owners.

The Self-Destructive Quest for Perfection

The Self-Destructive Quest for Perfection

This week I was reintroduced to a phrase I’m coming to love as I interact with the privacy community: “don’t let perfection be the enemy of good enough.” If you recommend Signal to someone for it’s security, someone else will complain that Signal uses phone numbers and AWS as a backbone.

Welcome to Element!

Welcome to Element!

Welcome to a whole new beginning for Riot: welcome to your new Element, one where mainstream Matrix users will enjoy themselves too - and which will pave the way for wider adoption of open, secure, decentralised communication via Matrix throughout the world.- Matthew, Amandine, and the whole Element team.

The coming Pakistan VPN ban: PTA sets deadline for VPN users to register by June 30th

The coming Pakistan VPN ban: PTA sets deadline for VPN users to register by June 30th

The Pakistan Telecommunications Authority (PTA) has issued a reminder that all VPN users need to register their VPN tunnel with their internet service provider (ISP) by June 30th, 2020.

Why Metadata Matters

Why Metadata Matters

Let’s take a look at how revealing metadata can actually be to the governments and companies that collect it: They know you rang a phone sex line at 2:24 am and spoke for 18 minutes.

Internet governance body RIPE opposes Chinese proposal to change core internet protocols

Internet governance body RIPE opposes Chinese proposal to change core internet protocols

'New IP' proposal is said to theoretically offers more proficient and well-organised network management and addressing capabilities than the current TCP/IP standard, but it also seems to have features that could allow authoritarian regimes, such as China, to censor their residents.

NASA under 'significantly increasing' hacking, phishing attacks

NASA under 'significantly increasing' hacking, phishing attacks

NASA has seen "significantly increasing" malicious activity from both nation-state hackers and cybercriminals targeting the US space agency's systems and personnel working from home during the COVID-19 pandemic.

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption for Windows, Linux, macOS, Android and iOS.Any instant messaging protocol that uses a cloud-based connection, aka a server, is a centralized service.

Opinion | Jeff Bezos’ Phone Hack Should Terrify Everyone

Opinion | Jeff Bezos’ Phone Hack Should Terrify Everyone

“They’re shocked when we give them their password and tell them where we found it, but it doesn’t hit as hard as when we tell them their entire home automation system has been potentially online and viewable for three or five or eight years,” he said.

Secure Messaging: A Spy Primer

Secure Messaging: A Spy Primer

When I choose a secure messaging app, I pick apps that protect the most important thing to me… my personal data.Terms of Use/Service offer little/no data protection because they assume a user is engaging in a free service with the company.

Modi's Thought Control Firewall in Kashmir May Be the Internet's Future in India

Modi's Thought Control Firewall in Kashmir May Be the Internet's Future in India

On January 18, the government issued a new order relaxing the ban a teeny-weeny bit by allowing people in two districts of the Valley to access a limited number of “whitelisted” sites on post-paid mobile connections at 2G speed.

New security system to revolutionise privacy

New security system to revolutionise privacy

A new uncrackable security system created by researchers at the University of St Andrews, King Abdullah University of Science and Technology (KAUST) and the Center for Unconventional Processes of Sciences (CUP Sciences) is set to revolutionise communications privacy.

How to Reclaim Your Privacy

How to Reclaim Your Privacy

Go through all of your apps and turn off location for the ones that don’t need it - or change the setting so they can only get your location while you’re using the app.Don’t let apps access to your Bluetooth unless they really need it.

Wire Business Update

Wire Business Update

Wire stands by its mission to best protect communication data with state-of-the-art technology and practice: All source code has been and will be available for inspection on GitHub ().Wire believes that data protection is best achieved through state-of-the-art encryption and continues to innovate in that space with Messaging Layer Security (MLS).

Tutanota is blocked in Egypt. Here's what you can do.

Tutanota is blocked in Egypt. Here's what you can do.

Whenever a site is blocked in your country or by your Internet Service Provider (ISP), you can access this site with the help of the Tor browser or via a VPN.

South African court rules that mass surveillance by the government is illegal

South African court rules that mass surveillance by the government is illegal

Previously, the South African government has used a law called RICA (Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002) to justify mass surveillance programs.

New Protest Tactics in Hong Kong

New Protest Tactics in Hong Kong

A banner used by a Hong Kong protester.Hong Kong protesters turn to Uber and Pokemon.In late July, Hong Kong protesters returning from a demonstration were attacked by a group of men wearing white shirts.

Facebook learned about Cambridge Analytica as early as September 2015, new documents show

Facebook learned about Cambridge Analytica as early as September 2015, new documents show

Facebook said the scraping of public profiles is distinct from the data Cambridge Analytica reportedly used from users' friends who did not consent to sharing their data.Still, the documents show that Facebook was aware of potential policy violations by Cambridge Analytica as early as September 2015.

US20090237236A1 - Tooth located gps person tracking and location method and apparatus - Google Patents

US20090237236A1 - Tooth located gps person tracking and location method and apparatus - Google Patents

a microchip including a transceiver for transmitting a wireless signal containing geographic information relating to the physical location of a person, the microchip adapted to be mounted in a tooth of a person;.

Attack by Chinese hacker group targeted high-profile individuals around the world

Attack by Chinese hacker group targeted high-profile individuals around the world

A hacker attack of impressive magnitude targeted specific individuals of interest to the Chinese government as they moved around the world, in what appears to be the first such operation in the history of cyberespionage.

Again!? The NSA’s Phone Records Program Still Can’t Stay Within the Law

Again!? The NSA’s Phone Records Program Still Can’t Stay Within the Law

The NSA’s telephone record program, conducted under Section 215 of the Patriot Act, allows it to collect metadata of phone calls, including phone numbers, time stamps, and other identifying information.

MITM attacks: three popular methods with dangerous outcomes

MITM attacks: three popular methods with dangerous outcomes

This way, an attacker can gain access to personal information, intercept the communication and inject it with malicious elements, or redirect the unsuspecting user to a fraudulent web site. img: Session_Hijacking_3.JPGOnce again, by using ARP Cache poisoning, an attacker can get access to full browsing information.

An open letter to Stewart Butterfield: Why Slack will never replace email

An open letter to Stewart Butterfield: Why Slack will never replace email

I’m Dvir Ben Aroya, an entrepreneur who has spent a lot of time thinking about how to improve workplace communications, and now focus on Spike — the first conversational email for teams.

Telegram founder claims DDoS attack was timed to disrupt Hong Kong protests

Telegram founder claims DDoS attack was timed to disrupt Hong Kong protests

Pavel Durov claimed the DDoS attack originated ‘mostly from China’ and was meant to disrupt communication between protesters in Hong Kong. The founder of Telegram has claimed a cyber attack that disrupted the messaging platform was carried out to coincide with protests in Hong Kong.

EPrivacy

EPrivacy

All or any e-privacy, directive, act or regulation is massively overdue, this we saw with the general data protection regulation (GDPR) that came in to force May 2018. While the GDPR aims to protect your Personal data, the ePR focuses on protecting your personal privacy based on electronic communication.

German Minister Wants Secure Messengers To Decrypt Chats

German Minister Wants Secure Messengers To Decrypt Chats

Germany's Interior Minister Horst Seehofer purportedly wants to force messaging providers such as WhatsApp, Telegram, and Threema to provide plain text chats to law enforcement agencies on a court order as reported by Der Spiegel and from a number of other German news outlets.