Wyden, Rounds and Eshoo Lead Bipartisan Call to Secure U.S. Capitol Phone Networks

Wyden, Rounds and Eshoo Lead Bipartisan Call to Secure U.S. Capitol Phone Networks

– U.S. Senators Ron Wyden, D-Ore., and Mike Rounds, R-S.D., with Rep. Anna Eshoo, D-Calif., led 20 members of the House and Senate in a request to encrypt phone calls between the chambers to protect communications against foreign surveillance.

FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help

FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help

Law enforcement officials have been critical of Apple’s stance on privacy and encryption dating back to 2015 when the FBI got a court order demanding Apple unlock a dead terrorist’s iPhone.

April Extensions for Firefox Preview

April Extensions for Firefox Preview

We’d like to thank the developers of these add-ons for supporting Firefox Preview.While we’re pleased to offer these six highly recommended add-ons as a starting point, it’s clear that add-on developers have more great ideas for extensions that can enhance the mobile browsing experience.

Cross-signing and End-to-end Encryption by Default is HERE!!!

Cross-signing and End-to-end Encryption by Default is HERE!!!

Three years have passed since we first announced End-to-end Encryption in Matrix and started to beta test it in Riot - and after an enormous amount of polishing and refinement on its user experience, we are finally declaring it out of beta and enabling it by default for all new private conversations in Riot.

Decentralized Communication: The Way of the Future

Decentralized Communication: The Way of the Future

Decentralization, as the name suggests, works by making a network run on a variety of providers rather than a single centralized network.So personally, I’m placing emphasis on self-hosted and decentralized solutions in the future to try to prepare for this eventuality.

Documents reveal FBI head defended encryption for WhatsApp before becoming fierce critic

Documents reveal FBI head defended encryption for WhatsApp before becoming fierce critic

Christopher Wray, the FBI director who has been one of the fiercest critics of encryption under the Trump administration, previously worked as a lawyer for WhatsApp, where he defended the practice, according to new court filings.

GitHub - ddz/whatsapp-media-decrypt: Decrypt WhatsApp encrypted media files

GitHub - ddz/whatsapp-media-decrypt: Decrypt WhatsApp encrypted media files

A recent high-profile forensic investigation reported that “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file] to determine if it contained any malicious code in addition to the delivered video.”.

Security lapses plague messaging and video apps

Security lapses plague messaging and video apps

However, in February, the European Commission suddenly instructed employees to switch to the popular messaging app Signal due to growing security and data privacy concerns with WhatsApp. Numerous reports have emerged in recent years that WhatsApp's end-to-end encryption may not be sufficient to ensure the privacy of users' data or prevent hackers from using the app to install spyware on devices.

The Execution of the Warrant

The Execution of the Warrant

As though by some predictable ebb and flow of attention to our privacy, we are yet again considering vast, sweeping legislation to kneecap the use of end-to-end encryption (a technology that allows only the participants to read the contents even if a third party is relaying the data).

This is what end-to-end encryption should look like!

This is what end-to-end encryption should look like!

HIPS is about using a new Chrome WebRTC API called “Insertable Streams” to add a second layer of end-to-end encryption to media streams in a way that would make them inaccessible to the video router.The important part is: end-to-end encryption is on its way to protect your Jitsi Meetings.

Private messaging app Signal suggests it could pull out of the US market if draconian EARN IT bill is approved

Private messaging app Signal suggests it could pull out of the US market if draconian EARN IT bill is approved

Lund speculates that as once companies let go of the end-to-end encryption protection, they may potentially lose legal immunity granted to them under section 230 of the Communications Decency Act.

Signal >> Blog >> 230, or not 230? That is the EARN IT question.

Signal >> Blog >> 230, or not 230? That is the EARN IT question.

At a high level, what the bill proposes is a system where companies have to earn Section 230 protection by following a set of designed-by-committee “best practices” that are extraordinarily unlikely to allow end-to-end encryption.

Warning: Zoom Sends Encryption Keys To China (Sometimes)

Warning: Zoom Sends Encryption Keys To China (Sometimes)

When Citizen Lab looked at where their U.S.- and Canada-based Zoom conversations were being routed, the researchers discovered encryption keys were sometimes sent to Beijing, though would be handled by servers in other countries, too.

Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing

Zoom Meetings Aren’t End-to-End Encrypted, Despite Misleading Marketing

This is known as transport encryption, which is different from end-to-end encryption because the Zoom service itself can access the unencrypted video and audio content of Zoom meetings.

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption for Windows, Linux, macOS, Android and iOS.Any instant messaging protocol that uses a cloud-based connection, aka a server, is a centralized service.

WireGuide: All about the WireGuard VPN protocol

WireGuide: All about the WireGuard VPN protocol

WireGuard is a relatively new VPN protocol when compared with the decades old OpenVPN and approaches software development with a different philosophy – do one thing simple and do it well (efficiently).

US Politicians Want to Ban End-to-End Encryption on Messaging Services like Telegram and Whatsapp

US Politicians Want to Ban End-to-End Encryption on Messaging Services like Telegram and Whatsapp

The Eliminating Abusive and Rampant Neglect of Interactive Technologies Act. A planned bipartisan measure in the U.S. Senate could stop all messaging services, such as the crypto community’s favorite Telegram and Facebook controlled Whatsapp, from offering end-to-end encryption for users.

The EARN IT Bill Is the Government’s Plan to Scan Every Message Online

The EARN IT Bill Is the Government’s Plan to Scan Every Message Online

The “best practices” list will be created by a government commission, headed by Attorney General Barr, who has made it very clear he would like to ban encryption, and guarantee law enforcement “legal access” to any digital message.

Protect our Speech and Security Online: Reject the Graham-Blumenthal Bill

Protect our Speech and Security Online: Reject the Graham-Blumenthal Bill

It doesn’t equip law enforcement agencies with resources to investigate claims of child exploitation or training in how to use online platforms to catch perpetrators.

KrØØk WiFi vulnerability affected WiFi encryption on over a billion devices

KrØØk WiFi vulnerability affected WiFi encryption on over a billion devices

A vulnerability in Broadcom and Cypress WiFi chips makes it possible for attackers on your local WiFi network to decrypt your WPA2 encrypted internet traffic.

Don't be fooled, experts warn, America's anti-child-abuse EARN IT Act could burn encryption to the ground

Don't be fooled, experts warn, America's anti-child-abuse EARN IT Act could burn encryption to the ground

Backed by senators Lindsey Graham (R-SC), Richard Blumenthal (D-CT), Josh Hawley (R-MO) and Dianne Feinstein (D-CA), the proposed law intends to make technology companies "earn" their exemption from liability allowed under Section 230 of the US Communications Decency Act by requiring internet companies to follow a set of best practices to keep CSAM off their networks.

The EARN IT Act Is a Sneak Attack on Encryption

The EARN IT Act Is a Sneak Attack on Encryption

A bipartisan pair of US senators today introduced long-rumored legislation known as the EARN IT Act. Meant to combat child sexual exploitation online, the bill threatens to erode established protections against holding tech companies responsible for what people do and say on their platforms.

5 years of Intel CPUs and chipsets have a concerning flaw that’s unfixable

5 years of Intel CPUs and chipsets have a concerning flaw that’s unfixable

While Intel has issued patches to lessen the damage of exploits and make them harder, security firm Positive Technologies said the mitigations may not be enough to fully protect systems.

Android users, your WhatsApp chat backup on Google Drive may soon be encrypted

Android users, your WhatsApp chat backup on Google Drive may soon be encrypted

The company itself mentions this on its FAQ website “Media and messages you back up aren’t protected by WhatsApp end-to-end encryption while in Google Drive.”.As mentioned by the WABeta Info account, Google Drive backup of chats might finally be encrypted.

Congress, Not the Attorney General, Should Decide the Future of Encryption

Congress, Not the Attorney General, Should Decide the Future of Encryption

The EARN IT Act puts that question front and center by giving the attorney general the ultimate say in setting the “best practices” that will give Section 230 immunity for child exploitation suits.

Huawei fires back, points to US’ history of spying on phone networks

Huawei fires back, points to US’ history of spying on phone networks

The US alleges that Huawei violated these laws by "buil[ding] equipment that secretly preserves the manufacturer's ability to access networks through these interfaces without the carriers' knowledge," the Journal article said.

Column: Equifax left unencrypted data open to Chinese hackers. Most big U.S. companies are just as negligent

Column: Equifax left unencrypted data open to Chinese hackers. Most big U.S. companies are just as negligent

Shackelford noted that the growing use of cloud-based data storage services run by the likes of Google and Amazon makes encryption more accessible to smaller companies.

CIA controlled global encryption company for decades, says report

CIA controlled global encryption company for decades, says report

Encryption weaknesses added to products sold by Crypto AG allowed the CIA and its German counterpart, the BND, to eavesdrop on adversaries and allies alike while earning million of dollars from the sales, according the Washington Post and the German public broadcaster ZDF, based on the agencies’ internal histories of the intelligence operation.

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

The Graham-Blumenthal bill would finally give Barr the power to demand that tech companies obey him or face overwhelming liability from lawsuits based on their users’ activities.

The FBI still hasn't unlocked Pensacola shooter's iPhones

The FBI still hasn't unlocked Pensacola shooter's iPhones

According to the report: *-- The FBI has reconstructed an iPhone belonging to the shooter behind the December Naval Air Station attack in Pensacola, Florida, but still can't access the encrypted data on the device, Director Christopher Wray said Wednesday.