encryption   40816

« earlier    

WhatsApp to push back against Indian crackdown on encryption
"WhatsApp is gearing up to fight the Indian government’s proposals to force tech companies to hand over the personal data and encrypted messages of hundreds of millions of Indians.

The Facebook-owned messaging app has more than 210m users in India, making the country its largest market by far. But over the past year, the company has been under growing pressure from New Delhi to find ways to clamp down on fake news and incendiary rumours circulating through its systems, especially after a series of lynch mobbings by crowds of angry villagers incited by inflammatory WhatsApp messages.

India’s telecoms regulator and IT ministry have both proposed laws that would allow authorities to trace the origins of encrypted messages. The legislation would also compel tech companies including Facebook, Twitter and Apple — whose iMessage system is also end-to-end encrypted — to proactively monitor and remove objectionable content posted on their platforms. The government has opened a consultation, which will close at the end of the month." - Madhumita Murgia, Financial Times
otf  india  southasia  whatsapp  encryption  privacy 
yesterday by dmcdev
Troy Hunt: Our password hashing has no clothes
Arguments against relying upon salted hashes for protecting passwords
security  programming  encryption 
yesterday by jameson
Towards A Safer Footgun | codahale.com
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. These constructions avoid the “doom principle” which made so many older cryptosystems vulnerable to online attacks, but many of the standard AEAD constructions have problems of their own.
What’s an AEAD?

An AEAD is essentially a pair of functions:...
encryption  cryptography  security 
yesterday by hellsten
Privacy Tools - Encryption Against Global Mass Surveillance
You are being watched! Knowledge, encryption and privacy tools to protect you against global mass surveillance.
anonymity  edward  encryption  snowden  surveillance  tools  tor 
2 days ago by smitchell
Have I been pwnd? Password and intrusion targets - Troy Hunt
"[Troy Hunt] created HIBP as a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach. I wanted to keep it dead simple to use and entirely free so that it could be of maximum benefit to the community.

"Short of the odd donation, all costs for building, running and keeping the service currently come directly out of [his] own pocket. Fortunately, today's modern cloud services like Microsoft Azure make it possible to do this without breaking the bank!"

Pwned Passwords

Pwned Passwords are 551,509,767 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they're at much greater risk of being used to take over other accounts. They're searchable online below as well as being downloadable for use in other online system.
security  password  encryption  login  search  HIBP  cryptography  EMail  data  breach  hash  rainbow 
2 days ago by Tonti
securefs
Filesystem in userspace (FUSE) with transparent authenticated encryption - netheril96/securefs
encryption  fuse 
3 days ago by spl
CryFS: A cryptographic filesystem for the cloud
CryFS encrypts your Dropbox and protects you against hackers and data leaks. It also works well together with other cloud providers.
encryption  fuse 
3 days ago by spl
gocryptfs
gocryptfs uses file-based encryption that is implemented as a mountable FUSE filesystem. Each file in gocryptfs is stored one corresponding encrypted file on the hard disk.
encryption  fuse 
3 days ago by spl

« earlier    

related tags

++  2018  2fa  abstractions  aes  alfred  android  anonymity  apfs  api  app  apple  apps  archive  attack  australia  authentication  backup  bestpractices  blockchain  blog  blogs  breach  cambridge  carbon  certificate  certificates  channel  chat  cli  client-side  cloner  cloud  comparison  compliance  computer  computer_security  computing  config  coolstuff  copy  crack  cross-platform  crypt  cryptanalysis  crypto  cryptography  data  database  decentralizer  devops  disk  dns  dnscrypt  documentation  domain  domains  dropbox  e2e  editing  editor  edward  email  equations  europe  export  facebook  factoring  factors  fde  file  filesharing  filesystem  filevault  forensics  format  framework  free  freeware  full  fullbore_it  fuse  games  german  gig  git  github  gnupg  go  golang  gpg  green  hack  hacking  hash  health  hibp  hoster  hosting  howto  https  ifttt  important  india  input  install  internet  ios  ipv8  jabber  javascript  jk-blog  jk-cloudedhat  jk-crypto  jk-homenetwork  jk-infosec  jk-opensource  jk-software  js  key-value-database  key  kotlin  leaks  lecture  letsencrypt  library  linux  list  login  luks  lvm  mac  macos  macrumors  math  mathematics  maths  matrix  messaging  messenger  microsoft  mobile  mouse  mousejack  nacl  named  network  networking  notes  number  numbers  of  open-source  opensource  openssl  otf  outlook  overlay  paper  password  pgp  pkzip  pocket  polynomial  prime  privacy  programming  protocol  provider  publickey  python  quantum  rainbow  recommended  refresh  repository  research  resistant  rsa  science  search  secrets  security  service  side  signal  snowden  software  sources  southasia  sql  sqlite  ssh  ssl  stats  surveillance  telegram  text  theory  tls  tool  tools  tor  tpm  trends  ubuntu  university  unread  usb  useful  vi  vim  vpn  web  webdev  website  whatsapp  windows  wireguard  xmpp  yubikey  zip 

Copy this bookmark:



description:


tags: