Privacy Talks | Interview with Hanna from Tutanota

Privacy Talks | Interview with Hanna from Tutanota

[4:40] – Some people use Tutanota as an example of a more private version of Gmail.I see that Tutanota also has a calendar now.[6:05] – What is something you, or Tutanota, are looking forward to?.Learn more about Tutanota at

Mark Zuckerberg is using Signal, according to phone number leaked in Facebook hack

Mark Zuckerberg is using Signal, according to phone number leaked in Facebook hack

In response to Walker's discovery, Signal had a little fun, tweeting a link to a story about Zuckerberg's Signal account, writing, "With the May 15th WhatsApp Terms of Service acceptance deadline fast approaching, Mark leads by example.".

Encryption Has Never Been More Essential—or Threatened

Encryption Has Never Been More Essential—or Threatened

Five years ago today, WhatsApp completed our roll out of end-to-end encryption, which provides people all over the world with the ability to communicate privately and securely.

I2PChat - Instant Messenger

I2PChat - Instant Messenger

July, 2020 Set ECIES and ED25519 as default sigtype/encryption Add support for optional web page to display user profile at .b32 address Remove insecure DSA_SHA1 from Signature Types Add ECIES (Ratchet) encryption type to new profiles (UI option coming soon!)

Privacy Talks | Interview with Robin Wilton from Internet Society

Privacy Talks | Interview with Robin Wilton from Internet Society

[] – Without getting too technical, why is quantum computing a threat to encryption and how worried should we be?What are some other resources that you’d suggest for those looking to learn more about quantum computing?

Fleeing WhatsApp for Better Privacy? Don't Turn to Telegram

Fleeing WhatsApp for Better Privacy? Don't Turn to Telegram

Mimoun, the founder of the digital security nonprofit Horizontal, asked the participants to list messaging platforms that they'd heard of or used, and they quickly rattled off Facebook Messenger, WhatsApp, Signal, and Telegram.

Facebook's plan to encrypt messages will makes it easier to share child abuse images, say MPs

Facebook's plan to encrypt messages will makes it easier to share child abuse images, say MPs

Facebook has been branded 'hopelessly naive' over plans to encrypt its messaging apps, as MPs warned the move will make it 'even easier' for paedophiles to share child abuse images.

Clubhouse Security Risk Follow-up: China Is Listening

Clubhouse Security Risk Follow-up: China Is Listening

The Shanghai-based infrastructure supplier of Clubhouse called Agora Inc. raised security concerns that it may provide information to the Chinese government to identify and monitor users, especially for politically exposed personnel.

Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Using the "quantum annealing" method, the company said its research found that even the strongest versions of the advanced encryption standard may be decodable by quantum computers that could be available a few years from now.

Secret Chat in Telegram Left Self-Destructing Media Files On Devices

Secret Chat in Telegram Left Self-Destructing Media Files On Devices

Popular messaging app Telegram fixed a privacy-defeating bug in its macOS app that made it possible to access self-destructing audio and video messages long after they disappeared from secret chats.

Computer-stored encryption keys are not safe from side-channel attacks

Computer-stored encryption keys are not safe from side-channel attacks

In the paper Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (PDF), the researchers explain how they determine decryption keys for mathematically-secure cryptographic schemes by capturing information about secret values inside the computation taking place in the computer.

Don’t Make Parents Raise Kids in a World without Encryption

Don’t Make Parents Raise Kids in a World without Encryption

Governments and law enforcement agencies are trying to ban or weaken a critical tool for keeping our children safe online.Despite this, some governments, law enforcement agencies, and even some child protection agencies are trying take away the strongest digital tool we have as parents to keep children safe online.

UK Police Chief falsely claims that end to end encrypted messaging “puts lives at risk”

UK Police Chief falsely claims that end to end encrypted messaging “puts lives at risk”

In fact, a police chief went so far as to say that offering end to end encryption would “’unequivocally put lives at risk.” The words were uttered by Detective Chief Superintendent Kevin Southworth – who head’s the country’s online anti-terrorism efforts.

The EU must protect the right to privacy and not attack end-to-end encryption

The EU must protect the right to privacy and not attack end-to-end encryption

In response, these four leading European technology companies reject any attempts to use legal instruments to violate citizens’ privacy and stand up to protect the rights of people and businesses choosing end-to-end encryption.

Amazon’s Ring now reportedly partners with more than 2,000 US police and fire departments

Amazon’s Ring now reportedly partners with more than 2,000 US police and fire departments

All but two US states — Montana and Wyoming— now have police or fire departments participating in Amazon’s Ring network, which lets law enforcement ask users for footage from their Ring security cameras to assist with investigations, the Financial Times reported, Figures from Ring show more than 1,189 departments joined the program in 2020 for a total of 2,014.

Businesses Can’t Afford to Lose Trust in the Encrypted Economy, and Neither Can You

Businesses Can’t Afford to Lose Trust in the Encrypted Economy, and Neither Can You

As the co-founder of an end-to-end encrypted cloud service, I am deeply concerned at how demands for access to encrypted data will affect the security of thousands of businesses and the millions of clients who rely on them in the EU and worldwide.

Here’s why Telegram does not offer end-to-end encryption by default

Here’s why Telegram does not offer end-to-end encryption by default

The founder has now released a new post on his personal Telegram channel that clears the air about why the app does not feature end-to-end encrypted chats by default.

How law enforcement gets around your smartphone’s encryption

How law enforcement gets around your smartphone’s encryption

At this point an attacker could find and exploit certain types of security vulnerabilities in iOS to grab encryption keys that are accessible in memory and decrypt big chunks of data from the phone.

Warning: Telegram is not end-to-end encrypted by default

Warning: Telegram is not end-to-end encrypted by default

After tech behemoths like Twitter moved to ban Trump and thousands of other far-right accounts, millions moved to apps like Signal and Telegram for their encrypted messaging services."Signal is [pretty] much a classic 'messenger' product, end-to-end encrypted by default," Isaac explained.

How Law Enforcement Gets Around Your Smartphone's Encryption

How Law Enforcement Gets Around Your Smartphone's Encryption

“It just really shocked me, because I came into this project thinking that these phones are really protecting user data well,” says Johns Hopkins cryptographer Matthew Green, who oversaw the research.

Ring adds end-to-end video encryption to its doorbells and security cameras at CES 2021

Ring adds end-to-end video encryption to its doorbells and security cameras at CES 2021

Ring has updated its policies since, including making privacy and security settings more accessible via a Control Center dashboard and introducing mandatory two-factor authentication.Customers using Ring's end-to-end encryption feature would need to decrypt the video before sharing it with police.

WhatsApp users are really Facebook customers now – it's getting harder to forget that

WhatsApp users are really Facebook customers now – it's getting harder to forget that

WhatsApp is open about the changes, emphasising that the “key updates” affect how the company processes user data, and how businesses can use a new set of features that integrate WhatsApp’s shopping features with Facebook’s wider business.

Standard Notes Completes Penetration Test and Cryptography Audit

Standard Notes Completes Penetration Test and Cryptography Audit

This release uses the latest state-of-the-art, cryptographer-recommended algorithms for modern day encryption and key generation, designed to withstand the latest advances in cryptographic attacks and brute-forcing.These new releases are backed by two new security audits conducted by two of the world’s leading cryptography research and testing firms: Cure53 and Trail of Bits.

Why I don't believe in encrypted mail providers anymore

Why I don't believe in encrypted mail providers anymore

In the case of Protonmail, another encrypted mail provider, you'll need to find OpenPGP keys and you're basically back to square one.Tutanota doesn't have any bulk tools but it's easy enough to just shift-click all the email in the desktop client and export to eml files.

UPDATE 1-U.S. senator to change anti-child porn bill over Google, Facebook encryption concerns -draft

UPDATE 1-U.S. senator to change anti-child porn bill over Google, Facebook encryption concerns -draft

July 1 (Reuters) - U.S. legislation aimed at stopping online child sexual abuse material is likely to be amended to address concerns of platforms like Google and Facebook that the proposed law goes too far to weaken privacy protections for ordinary users, according to a draft of the bill seen by Reuters.

ACLU sues to find out how the FBI is breaking into encrypted devices

ACLU sues to find out how the FBI is breaking into encrypted devices

“The FBI is secretly breaking the encryption that secures our cell phones and laptops from identity thieves, hackers, and abusive governments, and it refuses to even acknowledge that it has information about these efforts — even though some details have been filed publicly in federal court.”.

The widening SolarWinds debacle shows why the reckless idea of backdooring encryption must be dropped forever

The widening SolarWinds debacle shows why the reckless idea of backdooring encryption must be dropped forever

Wilfully introducing a potential vulnerability into encrypted messaging programs used by billions of people is also “an act of recklessness”, given the high probability that national actors or PSOAs will find and exploit weaknesses.

In Celebration of Becoming Open Source, Threema Is 50% Off

In Celebration of Becoming Open Source, Threema Is 50% Off

Threema’s cryptographic procedures have been thoroughly documented from the outset, the proper application of the encryption library could always be verified independently, and external audits have repeatedly confirmed the apps’ security.

Adding Encrypted Group Calls to Signal

Adding Encrypted Group Calls to Signal

Today, we’re launching group calls in Signal with the latest versions of our apps.Group calls are free, private, and end-to-end encrypted — like everything else on Signal.We hope group calls are a helpful new way to connect!.

Encryption: Council adopts resolution on security through encryption and security despite encryption

Encryption: Council adopts resolution on security through encryption and security despite encryption

At the same time, the Council notes the need to ensure that competent law enforcement and judicial authorities are able to exercise their legal powers, both online and offline, to protect our societies and citizens.