Notices tagged with crypto, page 3
-
Kitchener-Waterloo Cryptography Interest Group (kwcrypto)'s status on Tuesday, 28-Feb-2017 14:36:09 EST
Kitchener-Waterloo Cryptography Interest Group
"Elections with both Privacy and Integrity" lecture by Josh Benaloh at @UWCrysp Monday, 13 March 2017 https://crysp.uwaterloo.ca/speakers/20170314-Benaloh !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 23-Feb-2017 10:29:02 EST
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
♻ @dangoodin001 At death’s door for years, widely used SHA1 function is now dead https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/ ¶ via #Twitter !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 14-Feb-2017 17:38:09 EST
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
I knew that, and I've used OTR on Pidgin. My post was mostly an excuse to get the thread into the !crypto and !XMPP groups. -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 14-Feb-2017 16:09:15 EST
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
Finally, !crypto for !XMPP with #Pidgin https://github.com/gkdr/lurch -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 12-Feb-2017 17:12:14 EST
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
LOL: bob@social.freedombone.net writes: The goal should be end-to-end encryption which is actually trustable, rather than a fashion accessory. !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 06-Feb-2017 11:53:26 EST
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
@kat@quitter.se Are you seeing mechanical failures in those encrypted drives, or media failures (soft errors that irrevocably corrupt the encryption)? !crypto -
arunisaac (arunisaac)'s status on Tuesday, 24-Jan-2017 00:50:32 EST
arunisaac
http://secushare.org/PGP 15 reasons not to start using PGP !privacy !crypto !selfhosting -
ziggys (ziggys)'s status on Friday, 20-Jan-2017 14:46:11 EST
ziggys
https://bobinas.p4g.club/url/49638 #snowden #email #lavabit !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 16-Jan-2017 03:06:13 EST
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
Agreed, the #WhatsApp "issue" is not a bug, it's there by design. But a designer vulnerability is still a vulnerability. https://www.eff.org/deeplinks/2017/01/google-launches-key-transparency-while-tradeoff-whatsapp-called-backdoor !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 13-Jan-2017 12:57:22 EST
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
But that re-keying attack seems like an easily fixed design flaw. The keys are already separate from the hardware, so a "clean" hardware replacement should include a transfer of key material from the old hardware to the new hardware so that re-keying queued messages is not necessary. Of course, now there's the vulnerability of exposing key material during the transfer, but that co… -
qbi (qbi)'s status on Wednesday, 11-Jan-2017 15:54:31 EST
qbi
Kann ich jetzt Bingo rufen?
!crypto #landtag #sachsen #tls !security
https://quitter.se/attachment/2915725 -
qbi (qbi)'s status on Tuesday, 10-Jan-2017 04:50:32 EST
qbi
Verschlüsselung im Kinderzimmer: https://kubieziel.de/blog/archives/1623-Kryptografie-mit-Barbie.html
!crypto #schreibmaschine -
qbi (qbi)'s status on Monday, 09-Jan-2017 15:18:53 EST
qbi
Jemand Lust auf !crypto Vorträge bei den !clt https://twitter.com/guckes/status/818173772817723394 -
arunisaac (arunisaac)'s status on Friday, 30-Dec-2016 03:03:43 EST
arunisaac
#Silence claims to have implemented #axolotl. I don't know how secure it is. But, I'm hoping any #encryption is better than plain text and that any security flaws will eventually be fixed. !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 30-Dec-2016 01:31:52 EST
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
@arunisaac I've used #Silence for a while. Seems to work OK, but I can't verify how secure the !crypto is -
harald (harald)'s status on Friday, 23-Dec-2016 07:40:02 EST
harald
"But Riot has other advantages that make it, in some aspects, superior to Signal. Riot is based on the so-called Matrix protocol which is a federated protocol. That means that anyone who wants can run a Matrix server can do so and Riot users from all these servers can communicate with one another. There is no central instance that controls Matrix or Riot." http://qttr.at/1m30
!privacy !crypto #messaging #federation -
Kitchener-Waterloo Cryptography Interest Group (kwcrypto)'s status on Thursday, 22-Dec-2016 16:29:53 EST
Kitchener-Waterloo Cryptography Interest Group
♻ @glynmoody why the existence of strong crypto does not mean things are "going dark"... https://t.co/ycmbDiwkMP ¶ via #Twitter !crypto -
pettter ✅ (pettter)'s status on Tuesday, 13-Dec-2016 06:35:34 EST
pettter ✅
Too Cool for PGP, a well-written rant on PGP, e-mail and "alternatives".
https://www.mailpile.is/blog/2016-12-13_Too_Cool_for_PGP.html
!security !infosec !crypto !umehack -
pettter ✅ (pettter)'s status on Tuesday, 13-Dec-2016 06:35:34 EST
pettter ✅
Too Cool for PGP, a well-written rant on PGP, e-mail and "alternatives".
https://www.mailpile.is/blog/2016-12-13_Too_Cool_for_PGP.html
!security !infosec !crypto !umehack -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Wednesday, 16-Nov-2016 02:02:59 EST
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
Reading the #Slashdot description it appears that encrypted data is not compromised, but, of course, with a root shell the entire drive could be wiped, LUKS partition and all. !crypto !security