Archiv: secure communication / encryption


12.11.2019 - 16:59 [ Techdirt ]

Mozilla: ISPs Are Lying About Encrypted DNS, Should Have Privacy Practices Investigated

The effort would effectively let Chrome and Mozilla users opt in to DNS encryption — making your browser data more secure from spying and monetization — assuming your DNS provider supports it. Needless to day, telecom giants that have made billions of dollars monetizing your every online behavior for decades now (and routinely lying about it) don’t much like that.

As a result, Comcast, AT&T, and others have been trying to demonize the Google and Mozilla efforts any way they can,

04.10.2019 - 09:51 [ Shannon Vavra, Reporter @CyberScoopNews covering NSA, Cyber Command, cyberwarfare / Twitter ]

The US, UK, and Australia (3 Five Eyes) are asking @facebook to delay message encryption. They’re using child sex exploitation as a way to highlight concerns encrypted comms can hamper law enforcement.

Details on latest encryption battle w @CyberScoopNews

04.10.2019 - 09:18 [ BuzzFeed ]

Attorney General Bill Barr Will Ask Zuckerberg To Halt Plans For End-To-End Encryption Across Facebook’s Apps

Attorney General Bill Barr, along with officials from the United Kingdom and Australia, is set to publish an open letter to Facebook CEO Mark Zuckerberg asking the company to delay plans for end-to-end encryption across its messaging services until it can guarantee the added privacy does not reduce public safety.

A draft of the letter, dated Oct. 4, is set to be released alongside the announcement of a new data-sharing agreement between law enforcement in the US and the UK; it was obtained by BuzzFeed News ahead of its publication.

04.10.2019 - 08:52 [ theGuardian.com ]

Calls for backdoor access to WhatsApp as Five Eyes nations meet

(30.09.2019)

British, American and other intelligence agencies from English-speaking countries have concluded a two-day meeting in London amid calls for spies and police officers to be given special, backdoor access to WhatsApp and other encrypted communications.

The meeting of the “Five Eyes” nations – the UK, US, Australia, Canada and New Zealand – was hosted by new home secretary, Priti Patel, in an effort to coordinate efforts to combat terrorism and child abuse.

13.09.2019 - 10:48 [ Electronic Frontier Foundation ]

Pioneer Award Ceremony 2019

Oakland Privacy is the group behind many influential anti-surveillance fights in Oakland, California and beyond. Oakland Privacy was born in 2013 when activists discovered a Homeland Security project called the Domain Awareness Center (DAC). DAC was meant to be an Oakland-wide surveillance gauntlet—with cameras, microphones, license plate readers—and a local data center to put it all together. But after Oakland Privacy led a ten-month campaign of opposition, the DAC was finally cancelled. Later, Oakland Privacy was one of the primary organizations behind the Oakland City Council’s creation of the first municipal privacy commission in the country, and then continued to be instrumental in bolstering opposition to surveillance around the San Francisco Bay Area and across the United States. For example, Oakland Privacy helped develop a comprehensive surveillance transparency regulatory law mandating use policies, civil rights impact reports, and annual audits, and pushed for its passage in multiple jurisdictions. The model is now in use in three Bay Area cities and other jurisdictions like Seattle, Nashville, and Cambridge, Massachusetts. Most recently, Oakland Privacy successfully worked to ban facial recognition in San Francisco and Oakland—two of the three cities in the country to enact such a ban.

28.08.2019 - 03:38 [ Electronic Frontier Foundation ]

Browsers Take a Stand Against Kazakhstan’s Invasive Internet Surveillance

Kazakhstan’s actions were a drastic response to the slowly improving security of end-user devices and end-to-end communication online, but they and other countries could take even more invasive steps. Faced with just a handful of secure browsers, the government could next push their citizens to use a browser that does not currently implement this safeguard. We encourage other browsers to take the same steps and stand in solidarity against the government of Kazakhstan’s decision to compromise the Internet security of their entire population. What’s more, designers of user software should anticipate such intrusive state action in future threat models.

09.08.2019 - 04:31 [ Electronic Frontier Foundation ]

DOJ and FBI Show No Signs of Correcting Past Untruths in Their New Attacks on Encryption

Don’t be mistaken; the threat to encryption remains high. Australia and the United Kingdom already have laws in place that can enable those governments to undermine encryption, while other countries may follow. And it’s definitely dangerous when senior U.S. law enforcement officials talk about encryption the way Barr and Wray did.

21.07.2019 - 14:51 [ Google Play ]

Antox

Note that Antox is still alpha software and there may be some bugs. Antox uses the Tox protocol which is Peer to Peer, so there will be high data usage and battery drain. WiFi only mode is currently recommended for now.

21.07.2019 - 14:36 [ Apple App Store ]

Antidote for Tox

Antidote is a free Tox client for iOS.

Whether it’s corporations or governments, digital surveillance today is widespread. Antidote is easy-to-use software that connects you with friends and family without anyone else listening in. While other services may require you to pay for features, Antidote is completely free and comes without advertising.

21.07.2019 - 14:32 [ Tox.chat ]

tox – A New Kind of Instant Messaging

Whether it’s corporations or governments, digital surveillance today is widespread. Tox is easy-to-use software that connects you with friends and family without anyone else listening in. While other big-name services require you to pay for features, Tox is completely free and comes without advertising — forever.

05.06.2019 - 18:09 [ NewStatesman.com ]

The month of two D-Days

The worst month was November 1942, when 721,700 tons were sunk by U-boats. At that point, the Kriegsmarine had more than 100 submarines operating in the Atlantic and, for most of the year, British code-breakers had been unable to decrypt key enemy signals because the Germans had added a fourth wheel to their Enigma machines. No wonder that the Allied Combined Chiefs of Staff stated after their Casablanca conference in January 1943, “Defeat of the U-boat must remain a first charge on the resources of [the] United Nations.”

During the course of that year, however, the situation gradually improved. The fourth wheel was cracked.

01.06.2019 - 14:26 [ reddit ]

Government officials admit they can’t enforce a planned ‚porn block law‘ in the UK because of DNS encryption

The UK wants everyone to hand over their personal details to get „age verified“ before looking at adult content… but an official has now admitted it could be almost unenforceable due to the rollout of DNS encryption on Firefox and maybe Chrome.

25.05.2019 - 19:30 [ Google Play ]

Tor Browser

Tor Browser for Android is the only official mobile browser supported by the Tor Project, developers of the world’s strongest tool for privacy and freedom online.

14.05.2019 - 22:03 [ Apple App Store ]

Antidote for Tox

Antidote is a free Tox client for iOS.

Whether it’s corporations or governments, digital surveillance today is widespread. Antidote is easy-to-use software that connects you with friends and family without anyone else listening in. While other services may require you to pay for features, Antidote is completely free and comes without advertising.

14.05.2019 - 21:55 [ Tox ]

tox – A New Kind of Instant Messaging

Whether it’s corporations or governments, digital surveillance today is widespread. Tox is easy-to-use software that connects you with friends and family without anyone else listening in. While other big-name services require you to pay for features, Tox is completely free and comes without advertising — forever.

01.05.2019 - 14:59 [ Standard.co.uk ]

MI5 boss warns of ’startling‘ IS terror threat to Britain

(today)

Mr Parker said that his staff were doing “extraordinary things” to keep the country safe in the face of such dangers, thwarting plots and saving lives. But he cautioned that the increasingly “vast amounts” of material on smartphones and the scale of social media output meant that more data than ever was being created at the same time as encryption was making it harder for MI5 to access it.

13.04.2019 - 16:29 [ Spiked ]

In defence of internet freedom

Will internet regulation end the internet as we know it? Has the left turned against the working class? And will cultural appropriation eat itself? Brendan O’Neill, Ella Whelan and Fraser Myers discuss on this week’s spiked podcast.

13.04.2019 - 15:55 [ Electronic Frontier Foundation ]

EFF Statement on Assange Indictment and Arrest

While the indictment of Julian Assange centers on an alleged attempt to break a password—an attempt that was not apparently successful—it is still, at root, an attack on the publication of leaked material and the most recent act in an almost decade-long effort to punish a whistleblower and the publisher of her leaked material. Several parts of the indictment describe very common journalistic behavior, like using cloud storage or knowingly receiving classified information or redacting identifying information about a source. Other parts make common free software tools like Linux and Jabber seem suspect. And while we are relieved that the government has not chosen to include publication-based charges today, the government can issue additional charges for at least another two months. It should not do so.

09.04.2019 - 10:25 [ Radio Utopie ]

May, Macron und Merkel: Kriegskoalition gegen das World Wide Web

(14. Juni 2017)

Die Regierungen von Großbritannien, Frankreich und Deutschland flüchten mit ihren Fantasien einer Kontinuität des weltweiten Wahrnehmungs-Managements auf die G20-Ebene.

Die entsprechenden Pläne von Terror-Theresa, lange vor ihrer Wahlniederlage entworfen, lasen wir bereits vor.

(…)

Für meine PappenheimerInnen von Genösschen – wie ich bereits mehrfach bemerkt habe: die dümmsten, miesesten und verlogensten der Welt – gilt diesbezüglich, wie immer: Kopf einziehen und versuchen nicht aufzufallen.

09.04.2019 - 10:17 [ Spectator ]

The Tories’ bid to police the internet is a big mistake

(8.4.2019)

Today, a Government in dire need of a good news story has mooted legislation resulting in the very opposite. The Conservative manifesto from 2017 said:

“Some people say that it is not for government to regulate when it comes to technology and the internet. We disagree.”

Now the Tories are delivering on their promise. But their attempt to police the internet should worry us all. The “Online Harms” white paper calls for an independent watchdog to write a “code of practice” for tech companies.

06.03.2019 - 14:09 [ cnet.com ]

Google looks to leave passwords behind for a billion Android devices

(25.2.2019) Google and the Fast Identity Online Alliance said Monday that Android is now FIDO2-certified, meaning its devices can use fingerprints and security keys for logging in to accounts instead of passwords. The certification was unveiled at Mobile World Congress in Barcelona, Spain.

06.03.2019 - 14:03 [ Wikipedia ]

FIDO Alliance

FIDO supports a full range of authentication technologies, including biometrics such as fingerprint and iris scanners, voice and facial recognition, as well as existing solutions and communications standards, such as Trusted Platform Modules (TPM), USB security tokens, embedded Secure Elements (eSE), smart cards, and near field communication (NFC).[2] The USB security token device may be used to authenticate using a simple password (e.g. four-digit PIN) or by pressing a button.

06.03.2019 - 14:00 [ theRegister.co.uk ]

Microsoft: You looking at me funny? Oh, you just want to sign in

(21.11.2018) Microsoft’s corporate veep of all things identity, Alex Simons, trumpeted that the 800 million people who use a Microsoft account will now be able to sign in without username or password.

06.03.2019 - 13:54 [ cbronline.com ]

Android Gets FIDO2 Support: Death to Passwords?

(28.2.2019) The FIDO2 standard comprises the World Wide Web Consortium’s (W3C) Web Authentication specification and the corresponding Client to Authenticator Protocol (CTAP) from FIDO Alliance. Together these initiatives create an ecosystem of compliant devices that can easily authenticate themselves to online services.

13.02.2019 - 12:56 [ National Security Agency ]

TEMPEST: A Signal Problem

(1972) Now, let´s go back to the beginning. During World War II, the backbone systems for Army und Navy secure teletypewriter communications were one-time tapes and the primitive crypto-equipment SIGTOT. For encrypting, the Services used a Bell-telephone mixing device, called 131-B2. When one of these mixers was being tested in a Bell laboratory, a researcher noticed, quite by accident, that each time the machine stepped, a spike appeared on an oscilloscope in a distant part of the lab. After he examined these spikes more carefully, he found that he could read the plain text of the message being enciphered by the machine.

13.02.2019 - 12:38 [ Universität Tel Aviv ]

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation

(April 2015) Q1: What information is leaked by the electromagnetic emanations from computers?

This depends on the specific computer hardware. We have tested numerous laptop computers, and found the following:
In almost all machines, it is possible to tell, with sub-millisecond precision, whether the computer is idle or performing operations.
On many machines, it is moreover possible to distinguish different patterns of CPU operations and different programs.
Using GnuPG as our study case, we can, on some machines:
distinguish between the spectral signatures of different RSA secret keys (signing or decryption), and fully extract decryption keys, by measuring the laptop’s electromagnetic emanations during decryption of a chosen ciphertext.

07.01.2019 - 09:07 [ justsecurity.org ]

Give Up the Ghost: A Backdoor by Another Name

(4.1.2018) Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare titled Principles for a More Informed Exceptional Access Debate, two of Britain’s top spooks introduced what they’re framing as a kinder, gentler approach to compromising the encryption that keeps us safe online. This new proposal from GCHQ—which we’ve heard rumors of for nearly a year—eschews one discredited method for breaking encryption (key escrow) and instead adopts a novel approach referred to as the “ghost.”

29.11.2018 - 02:58 [ CNET ]

Secret Facebook-FBI ruling must be made public, ACLU and EFF say

On Wednesday, attorneys for the American Civil Liberties Union and the Electronic Frontier Foundation filed a motion to unseal a secret court ruling in a case involving the Department of Justice and Facebook, stemming from a California case in which the FBI wanted to force the social network to wiretap phone calls on Messenger.

22.10.2018 - 12:55 [ Ring ]

Chat. Talk. Share. Ring is a free and universal communication platform which preserves the users‘ privacy and freedoms.

Ring is free software for universal communication which respects the freedoms and privacy of its users. It is published under the GNU General Public License 3. Ring is developed by Savoir-faire Linux with the help of a global community of users and contributors. Savoir-faire Linux is a Canadian company specialized in Linux and free software.

22.10.2018 - 12:48 [ Tox ]

tox – A New Kind of Instant Messaging

Whether it’s corporations or governments, digital surveillance today is widespread. Tox is easy-to-use software that connects you with friends and family without anyone else listening in. While other big-name services require you to pay for features, Tox is completely free and comes without advertising — forever.

22.10.2018 - 12:31 [ Threema.ch ]

Threema rigorously protects your privacy

Guaranteed Privacy:
Threema is designed to generate as little data on servers as possible: Groups and contact lists are solely managed on users’ devices, messages are immediately deleted after delivery. This effectively prevents the collection of meta data.

Best-in-class Encryption:
Threema end-to-end encrypts all your communication including messages, group chats, files and even status messages. Only the intended recipient, and nobody else can read your messages.

22.10.2018 - 12:11 [ guardianproject.info ]

Orbot: Tor for Android

Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Orbot creates a truly private mobile internet connection.

22.10.2018 - 11:56 [ Tor ]

Anonymity Online: Protect your privacy. Defend yourself against network surveillance and traffic analysis.

Tor Browser:
Tor Browser contains everything you need to safely browse the Internet.

Orbot:
Tor for Google Android devices.

Tails:
Live CD/USB operating system preconfigured to use Tor safely.

Nyx:
Terminal (command line) application for monitoring and configuring Tor.

Relay Search:
Site providing an overview of the Tor network.

Pluggable Transports:
Pluggable transports help you circumvent censorship.

Stem:
Library for writing scripts and applications that interact with Tor.

OONI:
Global observatory monitoring for network censorship.

13.10.2018 - 15:40 [ Tor ]

Anonymity Online: Protect your privacy. Defend yourself against network surveillance and traffic analysis.

Tor Browser:
Tor Browser contains everything you need to safely browse the Internet.

Orbot:
Tor for Google Android devices.

Tails:
Live CD/USB operating system preconfigured to use Tor safely.

Nyx:
Terminal (command line) application for monitoring and configuring Tor.

Relay Search:
Site providing an overview of the Tor network.

Pluggable Transports:
Pluggable transports help you circumvent censorship.

Stem:
Library for writing scripts and applications that interact with Tor.

OONI:
Global observatory monitoring for network censorship.

13.10.2018 - 15:40 [ Threema.ch ]

Threema rigorously protects your privacy

Guaranteed Privacy:
Threema is designed to generate as little data on servers as possible: Groups and contact lists are solely managed on users’ devices, messages are immediately deleted after delivery. This effectively prevents the collection of meta data.

Best-in-class Encryption:
Threema end-to-end encrypts all your communication including messages, group chats, files and even status messages. Only the intended recipient, and nobody else can read your messages.

13.10.2018 - 15:40 [ Tox ]

tox – A New Kind of Instant Messaging

Whether it’s corporations or governments, digital surveillance today is widespread. Tox is easy-to-use software that connects you with friends and family without anyone else listening in. While other big-name services require you to pay for features, Tox is completely free and comes without advertising — forever.

13.10.2018 - 15:40 [ Ring ]

Chat. Talk. Share. Ring is a free and universal communication platform which preserves the users‘ privacy and freedoms.

Ring is free software for universal communication which respects the freedoms and privacy of its users. It is published under the GNU General Public License 3. Ring is developed by Savoir-faire Linux with the help of a global community of users and contributors. Savoir-faire Linux is a Canadian company specialized in Linux and free software.

13.10.2018 - 15:40 [ guardianproject.info ]

Orbot: Tor for Android

Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Orbot creates a truly private mobile internet connection.