#QXmpp 1.10.3 has been released (#XMPP / #Jabber / #CPP / #CPlusPlus / #E2E / #E2EE / #EndToEndEncryption / #E2EEncryption / #XEP0384 / #OMEMO / #SCRAM / #SCRAMSASL) https://github.com/qxmpp-project/qxmpp
#QXmpp 1.10.3 has been released (#XMPP / #Jabber / #CPP / #CPlusPlus / #E2E / #E2EE / #EndToEndEncryption / #E2EEncryption / #XEP0384 / #OMEMO / #SCRAM / #SCRAMSASL) https://github.com/qxmpp-project/qxmpp
AMD: Microcode Signature Verification Vulnerability
"... security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside a VM) to load malicious microcode patches."
https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w
This is exactly the attack against which #confidentialcomputing should protect us
And it won't, when the attacker has access to ring0 of the hardware. Everywhere you don't run yourself.
#MOVIM 0.29.1 "#Rankin" has been released (#XMPP / #PHP / #SQL / #MariaDB / #MySQL / #PostgreSQL / #SocialNetwork / #SocialFeed / #PubSub / #E2EE / #EndToEndEncryption / #E2EEncryption / #OMEMO / #Jabber / #XEP501 / #PubsubStories) https://movim.eu/
1/3
When my company's #DEI Director explained the concept & **mentioned** **why** they were sharing their personal pronouns I have had mine out there in my public profile, right now, not here. My pronouns would not put me at risk so it's not brave. I do it more in #allyship than anything else. I also use strong #e2eencryption whenever possible even for nonsensitive information.
It's part allyship, part aircover, part practice of being the person I choose to be.
-more-
#e2eencryption is essential. Arguments that criminals use it & we need to ferret them out are misleading. Source code is out there & criminals will simply roll their own & host it where it suits them. I'm sure #northkorea would love a piece of that pie...if they aren't serving it already.
If you think you have nothing to hide then use it anyway to provide air cover to #journalists, #civilrights #activists, #lgbtq folk & others whose lives are literally on the line.
https://theintercept.com/2024/12/11/fbi-phone-encryption-salt-typhoon/
"End-to-end encryption means that the information is scrambled in transit and only the sender and recipient can access it. Regular text messages (SMS messages) and voice calls are usually not encrypted, and can be intercepted in transit or stored on a carrier’s server for extended periods of time.
Email services such as Gmail and Outlook generally offer encryption in transit, which means they can be read on the companies’ servers and by the end users. Messages that are encrypted in transit can’t be nabbed from a telecom network in an accessible format, but they could be accessed through an email service provider or a law enforcement request to that company.
End-to-end encryption—the kind offered by services like WhatsApp and Signal—is considered the best bet for privacy, particularly when paired with the option to auto-delete messages after a set period of time, says Mullin."
So wie sich das anhört sind die Hacker durch die Vordertüre gekommen, also wahrscheinlich über diese Wiretap Schnittstellen die Provider für Strafverfolgungsbehörden einbauen müssen. Wundert einen jetzt nicht wirklich, oder? https://www.heise.de/news/Wegem-schwerem-Cyberangriff-auf-US-Provider-FBI-wirbt-fuer-Verschluesselung-10187110.html #hacking #wiretap #e2eencryption
Privacy: 2+ hrs into the hearing, protecting #encryption, #privacy & stopping #spyware are finally raised, thanks to S&D's Kaljurand. But Brunner's response pits safety against privacy - a common trope of the outgoing Commissioner.
What's more, despite an outright ask for him to commit to protecting #E2EEncryption, Brunner skirts the question. A silver lining? He compliments the Parliament's position on the #CSAReg, which rejected the Commission's mass surveillance and encryption-breaking plans
#CyberSecurity #Privacy #Discord #E2EE #E2EEncryption #SocialMedia: "Last year, we announced that we were experimenting with new encryption protocols and technologies for audio and video calls on Discord. After extensive experimenting, designing, developing, and auditing, we’re excited to announce Discord’s audio and video end-to-end encryption (“E2EE A/V” or “E2EE” for short), which we like to refer to as our DAVE protocol.
Discord is committed to protecting the privacy and data of the roughly 200 million people who use our platform every month. As we continue to be a place that helps our users deepen friendships around games and shared interests, we are thrilled to be launching more secure and private voice and video calls.
Today, we’ll start migrating voice and video in DMs, Group DMs, voice channels, and Go Live streams to use E2EE. You will be able to confirm when calls are end-to-end encrypted and perform verification of other members in those calls.
We’d like to explain why we’re bringing E2EE A/V to Discord, share our design and implementation goals, and provide a high-level technical overview of how the new protocol works."
#MOVIM 0.25.1 "#Nagata" has been released (#XMPP / #SocialNetwork / #SocialFeed / #PubSub / #E2EE / #EndToEndEncryption / #E2EEncryption / #OMEMO / #Jabber / #XEP0363 / #XEP0384 / #XEP0386 / #XEP0388 / #XEP410 / #XEP0474 / #SCRAM / #SCRAMSASL / #SCRAMSHA) https://movim.eu/
#eu #eucommission #chatcontrol #euparlament #e2eencryption
The last time such a deep sniffing into private life I experienced in the time of the GDR. How loud were the blaming there in the western world about. A correct blaming. And the claim was how can you live free if the law enforcement is permanently looking over your shoulder.
This behaviour to take the whole community hostage for the wrongdoings of a minority is very much intimidating and frustrating!
#MOVIM 0.23 "#Kojima" has been released (#XMPP / #SocialNetwork / #SocialFeed / #PubSub / #E2EE / #EndToEndEncryption / #E2EEncryption / #OMEMO / #OMEMO12byteIV / #Jabber) https://movim.eu/
"#Chatkontrolle" klingt so gefährlich. Drehen wir den Spiess doch einfach um, und zeigen den lieben Nutzern, dass sie doch im Namen des Fortschritts freiwillig auf Ende-zu-Ende-Verschlüsselung verzichten wollen. Und es vielleicht nicht einmal merken:
Damit die #KI noch besser auf eine persönlichen Bedürfnisse eingehen kann, darf sie alle deine E2E-verschlüsselten Nachrichten über eine Hintertür lesen. Und zu den Servern schicken.
#E2E #E2EE #e2eEncryption
https://www.forbes.com/sites/zakdoffman/2024/01/28/new-details-free-ai-upgrade-for-google-and-samsung-android-users-leaks/
- Data portability. In my opinion, this is the most important problem. I'm in favor of FEP-ef61, which also solves identity portability and unlocks many new features.
- End-to-end encryption. MLS has become a standard, and it would be wise to adopt it. Issue 3 at fediverse-ideas provides a good overview of what we have at the moment (not much). Some variation of FEP-ae97 is likely needed to make end-to-end encryption work.
- Plugins. Something like Pleroma MRF, but cross-platform (e.g. Wasm-based). Also, pluggable timeline algorithms.
- Groups. We have several competing standards for groups: FEP-1b12, FEP-400e, Mastodon developers are working on their own standard. It would be nice to converge on a single standard, that also supports private groups.
- Quoting. FEP-e232 is a proposed standard, but most fediverse applications still use non-standard properties. Mastodon developers are trying to invent something completely different.
[quote][/quote]
(streams) supports Markdown and HTML in addition to BBcode, but otherwise it's the same.- Markets. So far there's only one server implementation capable of processing payments.
UK’s Graeme Biggar Issues Massive Anti-Encryption Rant Following Encryption Ban Law Passing
The National Crime Agency director, Graeme Biggar, apparently had a massive anti-encryption rant following the passage the Online Safety Act.
@3fachverglast
Das wäre technisch gesehen ziemlich sicher eine Katastrophe.
Es nützt ja nichts, wenn sichere #messenger wie #Signal oder #Threema ihre bisher vertrauenswürdige #Vetschlüsselung auf brechen müssen damit #whatsapp den Klartext bekommt und neu verschlüsselt.
Dann hat WhatsApp wieder jede Nachricht im Klartext (wäre ja noch schlechter als direkt von WA zu WA zu schreiben).
Das ist dann eben keine #e2eencryption mehr, sondern Homöopathie...
You can hide everything from us. #Anonymity #E2EEncryption
We don’t hide anything from you. #OpenSource #TransparencyReport
That’s a healthy service–user relationship.
This system should be an open standard, so that all existing contact book apps could implement it. Kinda like an updated version of CardDAV (https://en.wikipedia.org/wiki/CardDAV).
And ideally, all of that would be end-to-end encrypted, so that only your friends get to see your personal data. The host where you store your profile and your friends hosts should not be able to read your contact info!