Introducing IOTA Stronghold. Stronghold is a collection of…

Introducing IOTA Stronghold. Stronghold is a collection of…

There are many challenges involved in securely managing digital secrets like passwords, vehicle access codes, and wallet seeds:High-value secrets like private keys need to be encrypted at rest, using modern and secure algorithmsSuch secrets need to be purged from device memory immediately after useUsers must be able to configure systems to their security needsApplications need to run on any type of hardware from phones to cars, where possible leveraging Trusted Execution Environments.

Twitter is Testing End-to-End Encrypted Direct Messages

Twitter is Testing End-to-End Encrypted Direct Messages

Secret Conversation appears to allow Twitter users to send encrypted direct messages and beef up the security of their conversation.Select 'Start a secret text message,' and a new window will open where you can send encrypted messages.

Attorney General Barr’s dismissal of American privacy began long before the EARN It act

Attorney General Barr’s dismissal of American privacy began long before the EARN It act

However, FISA and the Comprehensive Antiterrorism Act of 1995 which he testified to, did allow for temporary warrantless surveillance (Sec. 308).Presently under the Trump administration, Barr has been pushing for explicit backdoor access into encryption technologies employed by companies such as Apple, Facebook, Google and secure messaging platforms including Signal, Telegram and Whatsapp.

New anti-encryption bill worse than EARN IT. Act now to stop both.

New anti-encryption bill worse than EARN IT. Act now to stop both.

Outline of the Lawful Access to Encrypted Data Act. Senators Graham, Blackburn, and Cotton call the Lawful Access to Encrypted Data Act (press release): "a bill to bolster national security interests and better protect communities across the country by ending the use of “warrant-proof” encrypted technology by terrorists and other bad actors to conceal illicit behavior".

Privacy News Online | Weekly Review: July 3, 2020

Privacy News Online | Weekly Review: July 3, 2020

A new project started by Andrew Yang is floating the idea of making tech companies pay users for the personal information given up.A new feature called a “paste notification” will even let you know when an app pastes what you have copied to your clipboard.

The New EARN IT Bill Still Threatens Encryption and Free Speech

The New EARN IT Bill Still Threatens Encryption and Free Speech

State lawmakers will be able to create new laws allowing private lawsuits and criminal prosecutions against Internet platforms, as long as they say their purpose is to stop crimes against children.

Act now to protect encryption and make sure that there is no EARN IT Act passed

Act now to protect encryption and make sure that there is no EARN IT Act passed

This bill is a heinous attack on our free speech right to use encryption and will have drastic impacts on privacy if passed.By participating in the Day of Action, you’ll be making a political difference by exerting pressure on the Senate Judiciary Committee to kill the EARN IT Act in committee.

The Lawful Access to Encrypted Data Act shows that politicians still don’t understand encryption

The Lawful Access to Encrypted Data Act shows that politicians still don’t understand encryption

The government has a long , long history of trying to ban encryption and force tech companies to include encryption backdoors that can be opened by the government; however, they willfully miss the point that such requests are mutually exclusive to their wishes.

The Senate’s New Anti-Encryption Bill Is Even Worse Than EARN IT, and That’s Saying Something

The Senate’s New Anti-Encryption Bill Is Even Worse Than EARN IT, and That’s Saying Something

The best that EARN IT’s sponsors can muster in defense is that the bill itself doesn’t use the word “encryption”—asking us to trust that the commission won’t touch encryption.

Republicans push bill requiring tech companies to help access encrypted data

Republicans push bill requiring tech companies to help access encrypted data

Tom Williams-Pool/Getty Images A group of Senate Republicans is looking to force tech companies to comply with "lawful access" to encrypted information, potentially jeopardizing the technology's security features.The Justice Department has criticized tech companies like Apple and Facebook for embracing encryption, arguing the technology is protecting terrorists and child predators.

Graham, Cotton, Blackburn Introduce Balanced Solution to Bolster National Security, End Use of Warrant-Proof Encryption that Shields Criminal Activity

Graham, Cotton, Blackburn Introduce Balanced Solution to Bolster National Security, End Use of Warrant-Proof Encryption that Shields Criminal Activity

WASHINGTON – Senate Judiciary Committee Chairman Lindsey Graham (R-South Carolina) and U.S. Senators Tom Cotton (R-Arkansas) and Marsha Blackburn (R-Tennessee) today introduced the Lawful Access to Encrypted Data Act, a bill to bolster national security interests and better protect communities across the country by ending the use of “warrant-proof” encrypted technology by terrorists and other bad actors to conceal illicit behavior.

Russia lifts its ban on the Telegram messenger app

Russia lifts its ban on the Telegram messenger app

A Russian court blocked the app in April 2018, after Telegram refused to share its encryption keys — a means of accessing users’ data — with Roskomnadzor.

Zoom does 180 on encryption plans, will bring it to all users including free accounts in July

Zoom does 180 on encryption plans, will bring it to all users including free accounts in July

Now after previously planning to keep end-to-end encryption as just a feature for paying customers, the company has reversed course and says free users will see it arrive in a beta coming in July alongside paid accounts.

Privacy News Online | Weekly Review: June 12th, 2020

Privacy News Online | Weekly Review: June 12th, 2020

To work together with law enforcement, Zoom won’t provide end-to-end encryption for free users.Of course, to be able to track the development of a potentially fake news chain message, apps would have to do away with end-to-end encryption and continuously monitor their users.

The coming Pakistan VPN ban: PTA sets deadline for VPN users to register by June 30th

The coming Pakistan VPN ban: PTA sets deadline for VPN users to register by June 30th

The Pakistan Telecommunications Authority (PTA) has issued a reminder that all VPN users need to register their VPN tunnel with their internet service provider (ISP) by June 30th, 2020.

Battling anti-encryption drive, tech companies pledge new child abuse disclosures

Battling anti-encryption drive, tech companies pledge new child abuse disclosures

SAN FRANCISCO (Reuters) - Tech companies including Facebook, Google and Microsoft on Thursday pledged to improve and standardise annual disclosures around online child exploitation, as they fight off moves to limit encryption.

Zoom to exclude free calls from end-to-end encryption to allow FBI cooperation

Zoom to exclude free calls from end-to-end encryption to allow FBI cooperation

, the popular video conferencing platform, has announced it will provide end-to-end encryption after facing a litany of privacy and security concerns – but only to users who pay for it.

To work together with law enforcement, Zoom won’t provide end-to-end encryption for free users

To work together with law enforcement, Zoom won’t provide end-to-end encryption for free users

Zoom CEO Eric Yuan has admitted that he won’t provide end-to-end encryption to free users in favor of being able to work with law enforcement.Because we also want to work together, say, with FBI, with local law enforcement in case some people that use Zoom for a bad purpose, right?”.

Wyden, Rounds and Eshoo Lead Bipartisan Call to Secure U.S. Capitol Phone Networks

Wyden, Rounds and Eshoo Lead Bipartisan Call to Secure U.S. Capitol Phone Networks

– U.S. Senators Ron Wyden, D-Ore., and Mike Rounds, R-S.D., with Rep. Anna Eshoo, D-Calif., led 20 members of the House and Senate in a request to encrypt phone calls between the chambers to protect communications against foreign surveillance.

FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help

FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help

Law enforcement officials have been critical of Apple’s stance on privacy and encryption dating back to 2015 when the FBI got a court order demanding Apple unlock a dead terrorist’s iPhone.

April Extensions for Firefox Preview

April Extensions for Firefox Preview

We’d like to thank the developers of these add-ons for supporting Firefox Preview.While we’re pleased to offer these six highly recommended add-ons as a starting point, it’s clear that add-on developers have more great ideas for extensions that can enhance the mobile browsing experience.

Cross-signing and End-to-end Encryption by Default is HERE!!!

Cross-signing and End-to-end Encryption by Default is HERE!!!

Three years have passed since we first announced End-to-end Encryption in Matrix and started to beta test it in Riot - and after an enormous amount of polishing and refinement on its user experience, we are finally declaring it out of beta and enabling it by default for all new private conversations in Riot.

Decentralized Communication: The Way of the Future

Decentralized Communication: The Way of the Future

Decentralization, as the name suggests, works by making a network run on a variety of providers rather than a single centralized network.So personally, I’m placing emphasis on self-hosted and decentralized solutions in the future to try to prepare for this eventuality.

Documents reveal FBI head defended encryption for WhatsApp before becoming fierce critic

Documents reveal FBI head defended encryption for WhatsApp before becoming fierce critic

Christopher Wray, the FBI director who has been one of the fiercest critics of encryption under the Trump administration, previously worked as a lawyer for WhatsApp, where he defended the practice, according to new court filings.

GitHub - ddz/whatsapp-media-decrypt: Decrypt WhatsApp encrypted media files

GitHub - ddz/whatsapp-media-decrypt: Decrypt WhatsApp encrypted media files

A recent high-profile forensic investigation reported that “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file] to determine if it contained any malicious code in addition to the delivered video.”.

Security lapses plague messaging and video apps

Security lapses plague messaging and video apps

However, in February, the European Commission suddenly instructed employees to switch to the popular messaging app Signal due to growing security and data privacy concerns with WhatsApp. Numerous reports have emerged in recent years that WhatsApp's end-to-end encryption may not be sufficient to ensure the privacy of users' data or prevent hackers from using the app to install spyware on devices.

The Execution of the Warrant

The Execution of the Warrant

As though by some predictable ebb and flow of attention to our privacy, we are yet again considering vast, sweeping legislation to kneecap the use of end-to-end encryption (a technology that allows only the participants to read the contents even if a third party is relaying the data).

This is what end-to-end encryption should look like!

This is what end-to-end encryption should look like!

HIPS is about using a new Chrome WebRTC API called “Insertable Streams” to add a second layer of end-to-end encryption to media streams in a way that would make them inaccessible to the video router.The important part is: end-to-end encryption is on its way to protect your Jitsi Meetings.

Private messaging app Signal suggests it could pull out of the US market if draconian EARN IT bill is approved

Private messaging app Signal suggests it could pull out of the US market if draconian EARN IT bill is approved

Lund speculates that as once companies let go of the end-to-end encryption protection, they may potentially lose legal immunity granted to them under section 230 of the Communications Decency Act.

Signal >> Blog >> 230, or not 230? That is the EARN IT question.

Signal >> Blog >> 230, or not 230? That is the EARN IT question.

At a high level, what the bill proposes is a system where companies have to earn Section 230 protection by following a set of designed-by-committee “best practices” that are extraordinarily unlikely to allow end-to-end encryption.