-
+10 +1
Facebook encryption could prevent detection of child abuse, NCA says
Facebook’s plans to allow encrypted messaging across all its platforms could prevent the detection of up to 20m child abuse images every year, a senior investigating officer has claimed.
-
+18 +1
WhatsApp messages are not end-to-end encrypted, claims ProPublica
Facebook has confirmed to me that all WhatsApp messages are end-to-end encrypted, and that a ProPublica report is based on an apparent misunderstanding. The report said that Facebook moderators were able to ‘examine users messages, images and videos.’ However, this is in fact possible only in one circumstance: when a message is reported …
-
+25 +1
NSA: We 'don't know when or even if' a quantum computer will ever be able to break today's public-key encryption
America's National Security Agency has published an FAQ about quantum cryptography, saying it does not know "when or even if" a quantum computer will ever exist to "exploit" public-key cryptography. In the document, titled Quantum Computing and Post-Quantum Cryptography, the NSA said it "has to produce requirements today for systems that will be used for many decades in the future."
-
+4 +1
Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life
Apple has announced impending changes to its operating systems that include new “protections for children” features in iCloud and iMessage. If you’ve spent any time following the Crypto Wars, you know what this means: Apple is planning to build a backdoor into its data storage system and its...
-
+25 +1
Google Chrome to no longer show secure website indicators
Google Chrome will no longer show whether a site you are visiting is secure and only show when you visit an insecure website. For years, Google has been making a concerted effort to push websites into using HTTPS to provide a more secure browsing experience.
-
+20 +1
PSA: Kaspersky Password Manager has been creating flawed passwords
If you’ve been using Kaspersky Password Manager (KPM) on your iPhone for a while, you may need to generate some new passwords. A security researcher has discovered two flaws that could result in an attacker having to try as few as 100 passwords to find yours …
-
+18 +1
iOS15: China exempt from Apple 'private relay' privacy feature
Apple has announced a raft of new privacy protections at its annual software developer conference. They include a function called "private relay", where users' web browsing behaviour can be hidden from Apple, internet providers and advertisers. Apple has been under pressure to cut down on the tracking of user data.
-
+23 +1
Australian Govt, AFP use AN0M bust to push for new range of encryption busting powers
Want to target bigger messaging services, 'criminal marketplaces'.
-
+17 +1
TOLA laws weakening encryption also weaken trust, and pose multi-billion-dollar risk to Australian digital economy
Internet Australia welcomes the release of the first in-depth economic study into the likely detrimental impact of TOLA (Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018,
-
+24 +1
Australian Crime Commission: Only Criminals Use Encrypted Communications
Well, someone finally said the quiet part loud: some government officials actually believe the only people who need, want, or use encryption are criminals. Here's Asha Barbaschow with the "encryption is for criminals" news at...
-
+29 +1
Q Link Wireless made private customer information accessible with just a phone number
A mobile carrier allowed anyone with one of its customers phone numbers to access their personal information, including name, address, phone number, and text and call history, according to a report by Ars Technica. The carrier, Q Link Wireless, claimed to have over two million customers in 2019.
-
+23 +1
Email Security Best Practices For Your Service Provider 2021
In this article, we’ll talk about how you can protect yourself and your email account by following email security best practices.
-
+21 +1
Cell Phone Location Privacy - Crypto-Gram - Bruce Schneier
We all know that our cell phones constantly give our location away to our mobile network operators; that’s how they work. A group of researchers has figured out a way to fix that.
-
+9 +1
Major Computing Breakthrough: Copenhagen Researchers Can Now Achieve “Quantum Advantage”
University of Copenhagen researchers have advanced their quantum technology to such a degree that classical computing technology can no longer keep up. They have developed a chip that, with financial backing, could be scaled up and used to build the quantum simulator of the future. Their results are now published in Science Advances.
-
+26 +1
Google Messages end-to-end encryption launching in beta, coming soon to all
Today, Google announced an update on the rollout of rich communication services (RCS) for its official Messages app. RCS support — which Google markets as Chat — is now available around the world for everyone who uses the app. That means you can access RCS features regardless of your phone or carrier. The only stipulation is that the person(s) with whom you are communicating also must have Chat active within Messages.
-
+10 +1
Six Reasons You Should Delete WhatsApp
Big Tech is famous for its nefarious data collection methods. But, for whatever reason, Facebook-owned WhatsApp has flown relatively under the radar. With 2 billion monthly users, the app is the world's most popular messenger service. Since it implemented end-to-end encryption in 2016, people mostly trust that the content of their WhatsApp messages is secure – which seems to be true. But that shouldn’t be our only consideration when it comes to choosing a messenger platform.
-
+16 +1
The Lava Lamps That Help Keep The Internet Secure
-
+30 +1
Randomness theory could hold key to internet security
Is there an unbreakable code? The question has been central to cryptography for thousands of years, and lies at the heart of efforts to secure private information on the internet. In a new paper, Cornell Tech researchers identified a problem that holds the key to whether all encryption can be broken—as well as a surprising connection to a mathematical concept that aims to define and measure randomness.
-
+7 +1
Why we need quantum-resistant cryptography now.
Quantum-resistant or post-quantum cryptography is our best bet against attacks from upcoming quantum computers.
-
+25 +1
Poor encryption exposes biometric database of 4.5 million Israeli citizens
The private information of some 4.5 million Israeli citizens, including biometric facial features, stored in the Transportation Ministry database for drivers licenses and a private database for smart biometric bus cards, is not getting the highest-level encryption and security to prevent data breaches or exploit attempts, found a report by the State Comptroller, writes the Jerusalem Post.
Submit a link
Start a discussion