mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

11K
active users

#encryption

66 posts59 participants4 posts today

Encryption is not a crime, encryption protects all of us. Encryption, and especially end-to-end encryption, is an essential tool to protect everyone online. Attempts to undermine encryption are an attack to our fundamental right to privacy and also an attack to our inherent right to security and safety.

privacyguides.org/articles/202

www.privacyguides.org · Encryption Is Not a Crime
More from Em :official_verified:

Lately I've been doing more #SelfHosting again due to the current situation. Of course, I'm paying particular attention to power consumption and noise. After good experiences with the #ARM64 architecture, even with power-hungry applications such as Mastodon, I'm now using the smartphone technology for my homeservers, too.

There are #SBCs with more open hardware, but the #RaspberryPi is widely available, well documented, powerful and inexpensive. And it is available with up to 16 GB of RAM.

Anyone operating a server on the Internet must install #security updates quickly. However, many people forget to restart running software so that the new version runs instead of the old one. The #needrestart tool helps with this on Debian-based Linux systems, which unfortunately is usually not pre-installed.

On my Raspberry Pi 4, needrestart always runs correctly (automatically after apt upgrade). On my Raspberry Pi 5, however, I first had to create a configuration file as described by the main developer here:
github.com/liske/needrestart/b
Previously, the tool always claimed that a reboot was necessary because it thought an outdated Linux kernel was running.

Next, I want to activate #LUKS hard drive encryption on both raspis. Unfortunately, this is not as easy under #Raspbian or #RaspberryPiOS as on other Debian systems. If you have managed this: Please let me know how you did it!

Mastodon, gehostet auf fedifreu.deFedifreudeDiese Mastodon-Instanz wird vom überregionalen netzaktivistischen Zusammenhang Datenfreude <https://datenfreu.de> betrieben. Dazu zählen https://datenpunks.de und https://kleindatenverein.org.
#rpi#rpi5#raspi

#encryption

"In early 2022 information technology security researcher Hanno Böck discovered that some of these encryptions could be cracked in a process that he went on to describe in a 2023 preprint paperposted to the International Association for Cryptologic Research’s Cryptology ePrint Archive. His method can be traced back to one developed by the French scholar Pierre de Fermat in the 17th century.

Fermat—most famous for his mysterious 'last theorem,' which vexed experts for decades—contributed all kinds of useful things to the world of science in his lifetime. For example, he laid the foundations for the theory of probability and also worked a lot on prime numbers—those values that are only divisible by 1 and themselves.

Mathematicians suspected they could use Fermat’s work to break encryption—and Böck demonstrated that case."

scientificamerican.com/article

Digital background. Ones and zeros 3d motive. Dynamic digits in perspective view.
Scientific American · This More Than 380-Year-Old Trick Can Crack Some Modern EncryptionBy Manon Bischoff

EU-Server und „eigene Schlüssel“ sind reine Marketing-Tricks: Der CLOUD Act erzwingt Datenherausgabe an US-Behörden – jederzeit, überall. Technische Lösungen? Teure Augenwischerei von Microsoft und Co. Digitale Souveränität mit US-Clouds existiert nicht. 👇

kuketz-blog.de/server-in-der-e

www.kuketz-blog.deServer in der EU und eigene Schlüssel: Schützt das vor US-Zugriffen?
More from Mike Kuketz 🛡

Sapphire Werewolf refines Amethyst stealer to attack energy companies

The Sapphire Werewolf cluster has upgraded its toolkit with a new version of the Amethyst stealer, targeting energy companies through phishing emails. The enhanced malware features advanced checks for virtualized environments and uses Triple DES for string encryption. The attack involves distributing a malicious attachment disguised as an official memo, which contains a C#-based loader protected with .NET Reactor. The Amethyst stealer collects extensive system data, credentials from various applications, and documents from compromised systems. The threat actor's sophisticated approach includes improved evasion techniques and data exfiltration methods, posing a significant risk to targeted organizations.

Pulse ID: 67f6972c506f8bc1bd11ce42
Pulse Link: otx.alienvault.com/pulse/67f69
Pulse Author: AlienVault
Created: 2025-04-09 15:50:04

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

The post-quantum era is closer than you think!

It’s time to tighten up that security hygiene and future-proof your organization’s data before quantum computing renders today’s encryption obsolete.

Here’s your crypto checklist:
🔐 Audit your encryption infrastructure
⚙️ Automate certificate/key management
🧠 Educate teams on quantum risk
🧪 Pilot NIST’s post-quantum algorithms
📅 Start now—retrofitting later will cost you

Quantum threats don’t wait. Neither should we.

#CyberSecurity #PostQuantum #Encryption #CISO #ITOps #QuantumComputing #CyberResilience

darkreading.com/vulnerabilitie