mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#e2ee

13 Beiträge12 Beteiligte1 Beitrag heute
adb<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@pancake" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>pancake</span></a></span> every post, comment and like in the social network is <a href="https://mastodon.social/tags/e2ee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>e2ee</span></a> thanks to <a href="https://mastodon.social/tags/DeltaChat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeltaChat</span></a>, the container super-app, but if you want forward-secrecy-secure ephemeral <a href="https://mastodon.social/tags/p2p" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>p2p</span></a> communications inside a Delta Chat chat, there is the "Live Chat" mini-app in the store (IRC style plus /me and "foo is typing..." support!!) </p><p><span class="h-card" translate="no"><a href="https://chaos.social/@delta" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>delta</span></a></span></p>
xoron :verified:<p><a href="https://glitr.io" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">glitr.io</span><span class="invisible"></span></a></p><p>im looking for feedback on my project.</p><p>IMPORTANT NOTES (PLEASE READ!):<br>* this is NOT a product. It's for <a href="https://infosec.exchange/tags/testing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>testing</span></a> and <a href="https://infosec.exchange/tags/demonstration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>demonstration</span></a> purposes only.<br>* It has NOT been reviewed or audited. Do NOT use for sensitive data.<br>* All functionality demonstrated is experimental.<br>* This is NOT meant to replace robust solutions like <a href="https://infosec.exchange/tags/magicwormhole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>magicwormhole</span></a> </p><p><a href="https://infosec.exchange/tags/p2p" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>p2p</span></a> <a href="https://infosec.exchange/tags/e2ee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>e2ee</span></a> <a href="https://infosec.exchange/tags/encrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encrypted</span></a> <a href="https://infosec.exchange/tags/pwa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pwa</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/filetransfer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filetransfer</span></a> <a href="https://infosec.exchange/tags/webrtc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webrtc</span></a> <a href="https://infosec.exchange/tags/secure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secure</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Open Rights Group<p>Make our voice heard at the Apple encryption hearing!</p><p>On the sly, the UK government tried to force a backdoor into the firewall that protects your privacy. We made the hearing public.</p><p>Now we need to win in court ✊</p><p>Donate now to fund legal representation ⬇️</p><p><a href="https://action.openrightsgroup.org/make-our-voice-heard-apple%E2%80%99s-encryption-hearing" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">action.openrightsgroup.org/mak</span><span class="invisible">e-our-voice-heard-apple%E2%80%99s-encryption-hearing</span></a></p><p><a href="https://social.openrightsgroup.org/tags/e2ee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>e2ee</span></a> <a href="https://social.openrightsgroup.org/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://social.openrightsgroup.org/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://social.openrightsgroup.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://social.openrightsgroup.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.openrightsgroup.org/tags/ukpolitics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ukpolitics</span></a> <a href="https://social.openrightsgroup.org/tags/ukpol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ukpol</span></a> <a href="https://social.openrightsgroup.org/tags/crowdfunder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crowdfunder</span></a> <a href="https://social.openrightsgroup.org/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://social.openrightsgroup.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Jon Yoder<p>It's been quite some time since I posted about <a href="https://mstdn.social/tags/Mensago" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mensago</span></a>, and there's good reason: <a href="https://mstdn.social/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> device sync is HARD. *sigh*</p><p>It's frustrating because once device sync is out of the way, I can get user-facing stuff like replying to messages going and try to get this thing out the door.</p>
Ian Brown 👨🏻‍💻<p>WOW! <a href="https://eupolicy.social/tags/Beeper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Beeper</span></a> goes <a href="https://eupolicy.social/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> (and MUCH more) 👏🔥😍<br><a href="https://eupolicy.social/tags/UniversalInbox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UniversalInbox</span></a><br> <a href="https://blog.beeper.com/2025/07/16/the-new-beeper/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.beeper.com/2025/07/16/the</span><span class="invisible">-new-beeper/</span></a></p>
Strypey<p>New <a href="https://mastodon.nzoss.nz/tags/Disintermedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Disintermedia</span></a> blog post, on the challenges of keeping communications private in networked software; </p><p><a href="https://disintermedia.substack.com/p/get-a-room" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">disintermedia.substack.com/p/g</span><span class="invisible">et-a-room</span></a></p><p>As I say at the outset, I am not a security professional, and this is not security advice. I’m just an old school Direct Action activist and indymediatista, with some information to add to the mix. Add a grain of salt and stir well.</p><p><a href="https://mastodon.nzoss.nz/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.nzoss.nz/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a></p>
Kevin Karhan :verified:<p>I mean, these ain't like in the old days where a few Megabytes got you <a href="https://infosec.space/tags/Pidgin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pidgin</span></a> and other <a href="https://en.wikipedia.org/wiki/Comparison_of_cross-platform_instant_messaging_clients" rel="nofollow noopener" target="_blank">Multi-Protocol Clients</a> of <em>the old days</em> where everyone had to implement bespoke, custom and incompatible and *often completely undocumented, proprietary * protocols like <a href="https://infosec.space/tags/ICQ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICQ</span></a>, <a href="https://infosec.space/tags/AIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIM</span></a>, <a href="https://infosec.space/tags/SIPE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIPE</span></a>, etc.</p><ul><li>Nowadays all these do have <em>some kind of <a href="https://infosec.space/tags/WebApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebApp</span></a></em> or <em>Web Interface</em> one can just login (because *none of them do proper <a href="https://infosec.space/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> with <a href="https://infosec.space/tags/SelfCustody" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfCustody</span></a> of all the keys!) so this should be way easier these days: All they do is do HTTP(S) GET/POST so the most critical part is to attain credentials like a <a href="https://infosec.space/tags/Login" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Login</span></a> <a href="https://infosec.space/tags/cookie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cookie</span></a> and to basically run a console on i.e. <a href="https://infosec.space/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> to reverse-engineer the <a href="https://infosec.space/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a>...</li></ul>
9x0rg<p><span class="h-card" translate="no"><a href="https://tux.social/@Rhababerbarbar" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Rhababerbarbar</span></a></span></p><p>[Correction]: </p><p>LeastAuthority [1] implements a web application of <a href="https://mamot.fr/tags/MagicWormhole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MagicWormhole</span></a> called <a href="https://mamot.fr/tags/Winden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Winden</span></a>, available at <a href="https://winden.app/s" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">winden.app/s</span><span class="invisible"></span></a>. </p><p>Haven't used it though.</p><p><span class="h-card" translate="no"><a href="https://io.mwl.io/@mwl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mwl</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@alternativeto" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>alternativeto</span></a></span> </p><p>[1]: <a href="https://github.com/LeastAuthority/winden" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/LeastAuthority/wind</span><span class="invisible">en</span></a></p><p><a href="https://mamot.fr/tags/WeTransfer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WeTransfer</span></a> <a href="https://mamot.fr/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataPrivacy</span></a> <a href="https://mamot.fr/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://mamot.fr/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a></p>
9x0rg<p>Hi <span class="h-card" translate="no"><a href="https://tux.social/@Rhababerbarbar" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Rhababerbarbar</span></a></span></p><p>Agreed.</p><p>Magic Wormhole [1] uses a PAKE construction to ensure high-security, end-to-end encryption with human-sized codes. </p><p>It is a peer-to-peer protocol that requires both the sender and recipient to have it running, which can be less convenient than `Send`, for instance. It works great. </p><p>A list of available clients can be found here [2].</p><p><span class="h-card" translate="no"><a href="https://io.mwl.io/@mwl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mwl</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@alternativeto" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>alternativeto</span></a></span> </p><p>[1]: <a href="https://github.com/warner/magic-wormhole" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/warner/magic-wormho</span><span class="invisible">le</span></a><br>[2]: <a href="https://magic-wormhole.readthedocs.io/en/latest/ecosystem.html#end-user-client-applications" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">magic-wormhole.readthedocs.io/</span><span class="invisible">en/latest/ecosystem.html#end-user-client-applications</span></a></p><p><a href="https://mamot.fr/tags/WeTransfer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WeTransfer</span></a> <a href="https://mamot.fr/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> <a href="https://mamot.fr/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://mamot.fr/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataPrivacy</span></a></p>
zeitkapsl.eu<p>👤 Face recognition is almost here — and it’s built the zeitkapsl way:</p><p>🔍 Find and group photos by people<br>🔐 Fully end-to-end encrypted<br>📱 Runs locally on your phone<br>🛑 No cloud processing, no leaks</p><p>🙏 Sorry it takes a bit longer we expected, but it's worth the wait.</p><p>Here’s a first look at what’s coming. 👇</p><p><a href="https://mastodon.social/tags/zeitkapsl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeitkapsl</span></a> <a href="https://mastodon.social/tags/facerecognition" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>facerecognition</span></a> <a href="https://mastodon.social/tags/e2ee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>e2ee</span></a> <a href="https://mastodon.social/tags/privacyfirst" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacyfirst</span></a> <a href="https://mastodon.social/tags/photobackup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>photobackup</span></a> <a href="https://mastodon.social/tags/madeineu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>madeineu</span></a> <a href="https://mastodon.social/tags/europeanalternatives" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>europeanalternatives</span></a></p>
Marcel Waldvogel<p>7️⃣ Gleich mehrere Artikel der letzten Tage beschäftigen sich mit der Sicherheit von Ende-zu-Ende-verschlüsselten Messengern wie <a href="https://waldvogel.family/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a> oder <a href="https://waldvogel.family/tags/Threema" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Threema</span></a>.</p><p>Alle laufen darauf hinaus, dass der Firmen- oder Serverstandort eigentlich keine Rolle spielt, wenn die Verschlüsselung und der Client sicher sind.</p><p>Wir von <a href="https://waldvogel.family/tags/DNIP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNIP</span></a> sehen das grundsätzlich auch so. Aber natürlich gibt es noch ein paar Rahmenbedingungen, die man durch <a href="https://waldvogel.family/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> nicht wegbekommt. Lest selbst.</p><p><a href="https://dnip.ch/2025/07/15/dnip-briefing-33-mcpasswort-mit-sicherheitsluecke/#Bei-einem-sicheren-Messenger-ist-der-Server-irrelevant" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2025/07/15/dnip-briefi</span><span class="invisible">ng-33-mcpasswort-mit-sicherheitsluecke/#Bei-einem-sicheren-Messenger-ist-der-Server-irrelevant</span></a></p>
ThePfromtheO<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@Em0nM4stodon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Em0nM4stodon</span></a></span> <br><a href="https://social.vivaldi.net/tags/VivaldiBrowser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VivaldiBrowser</span></a> does have both!<br><a href="https://social.vivaldi.net/tags/endToEndEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endToEndEncryption</span></a> and <a href="https://social.vivaldi.net/tags/NoAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoAI</span></a>! </p><p><a href="https://social.vivaldi.net/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> <a href="https://social.vivaldi.net/tags/no_ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>no_ai</span></a> <a href="https://social.vivaldi.net/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://social.vivaldi.net/tags/dataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataPrivacy</span></a> <a href="https://social.vivaldi.net/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://social.vivaldi.net/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://social.vivaldi.net/tags/AIcrap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIcrap</span></a> <a href="https://social.vivaldi.net/tags/European" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>European</span></a> <a href="https://social.vivaldi.net/tags/VivaldiTechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VivaldiTechnologies</span></a> <a href="https://social.vivaldi.net/tags/Vivaldi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vivaldi</span></a></p>
maexchen1<p><span class="h-card" translate="no"><a href="https://toot.teckids.org/@nik" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nik</span></a></span> </p><p>Für <a href="https://nrw.social/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> Emails die nicht bei <a href="https://nrw.social/tags/gmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gmail</span></a> landen wird dem Empfänger ein Code übermittelt, lese ich aus den Anleitungen.</p><p> <br><span class="h-card" translate="no"><a href="https://nerdculture.de/@ulfi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ulfi</span></a></span></p>
maexchen1<p>Ich lese gerade vermehrt das <a href="https://nrw.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://nrw.social/tags/Gmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gmail</span></a> die Inhalte von empfangenen <a href="https://nrw.social/tags/Emails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emails</span></a> verändert.</p><p>Wie geht das wenn <a href="https://nrw.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> selber schreibt das sie wegen der <a href="https://nrw.social/tags/EndeZuEndeVerschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndeZuEndeVerschlüsselung</span></a> keinen Zugriff auf die <a href="https://nrw.social/tags/Emails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emails</span></a> hat? </p><p>Nachtrag Bild.</p><p>Es scheint nicht bekannt zu sein das Gmail <a href="https://nrw.social/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> kann.</p><p><a href="https://nrw.social/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://nrw.social/tags/digitalcourage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalcourage</span></a></p>
Hans-Christoph Steiner<p>Does anyone know of any <a href="https://social.librem.one/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeSoftware</span></a> implementations of the <a href="https://social.librem.one/tags/RCS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCS</span></a> encrypted messaging protocol? There is the nine year old<br><a href="https://github.com/android-rcs/rcsjta" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">github.com/android-rcs/rcsjta</span><span class="invisible"></span></a> I wonder if that is usable?</p><p><a href="https://social.librem.one/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> <a href="https://social.librem.one/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://social.librem.one/tags/messaging" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>messaging</span></a></p>
khaleesi (Elina Eickstädt)<p><a href="https://eupolicy.social/tags/Chatkontrolle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chatkontrolle</span></a><br>Mit <span class="h-card" translate="no"><a href="https://chaos.social/@Chatgeheimnis" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Chatgeheimnis</span></a></span> sind wir weiter zusammen dran. Einen guten Überblick findet ihr hier: </p><p><a href="https://chat-kontrolle.eu/index.php/2025/07/08/neuer-anlauf-zur-chatkontrolle/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">chat-kontrolle.eu/index.php/20</span><span class="invisible">25/07/08/neuer-anlauf-zur-chatkontrolle/</span></a></p><p>Wenn ihr Organisationen kennt die sich dem Büdnis anschließen sollten immer her damit. Wir setzen uns für den Schutz von <a href="https://eupolicy.social/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> ein egal ob <a href="https://eupolicy.social/tags/Chatkontrolle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chatkontrolle</span></a> oder <a href="https://eupolicy.social/tags/ProtectEU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProtectEU</span></a></p>
Strypey<p>Hey <span class="h-card" translate="no"><a href="https://mastodon.matrix.org/@matrix" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>matrix</span></a></span>, given recent events around the world, I think it would be really helpful to have a regularly reviewed security status page on your website, summarising all known information affecting the security of the Matrix protocol. Threat models, security audits, disclosed vulnerabilities and mitigations, etc.</p><p>If such a thing already exists, please link me!</p><p>Oh and <span class="h-card" translate="no"><a href="https://mastodon.matrix.org/@element" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>element</span></a></span>, same for you and the software you steward.</p><p><a href="https://mastodon.nzoss.nz/tags/chat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chat</span></a> <a href="https://mastodon.nzoss.nz/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> <a href="https://mastodon.nzoss.nz/tags/Matrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Matrix</span></a> <a href="https://mastodon.nzoss.nz/tags/SecurityStatus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityStatus</span></a></p>
Strypey<p>"This article charts the privacy–public safety debate with a focus on its relevance to a sound philosophical, legal and ethical position on E2EE for Aotearoa New Zealand’s legal system ... Ultimately, Aotearoa New Zealand should adopt a technologically and legally defensible position rather than enacting emotionally clouded emergency legislation in the wake of a crisis exacerbated by E2EE."</p><p><a href="https://mastodon.nzoss.nz/tags/BejaminChristy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BejaminChristy</span></a>, Public Interest Law Journal of New Zealand, 2022</p><p><a href="https://www.auckland.ac.nz/en/law/our-research/research-publications/piljnz/past-issues.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">auckland.ac.nz/en/law/our-rese</span><span class="invisible">arch/research-publications/piljnz/past-issues.html</span></a></p><p><a href="https://mastodon.nzoss.nz/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> <a href="https://mastodon.nzoss.nz/tags/PILJNZ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PILJNZ</span></a></p>
Deutschland<p><a href="https://www.europesays.com/de/248172/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/de/248172/</span><span class="invisible"></span></a> „Beispielloser Angriff“: Bürgerrechtler reagieren auf iCloud-Anordnung in UK <a href="https://pubeurope.com/tags/AktuelleNachrichten" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AktuelleNachrichten</span></a> <a href="https://pubeurope.com/tags/AktuelleNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AktuelleNews</span></a> <a href="https://pubeurope.com/tags/CryptoWars" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CryptoWars</span></a> <a href="https://pubeurope.com/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> <a href="https://pubeurope.com/tags/Headlines" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Headlines</span></a> <a href="https://pubeurope.com/tags/iCloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iCloud</span></a> <a href="https://pubeurope.com/tags/Nachrichten" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nachrichten</span></a> <a href="https://pubeurope.com/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzpolitik</span></a> <a href="https://pubeurope.com/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://pubeurope.com/tags/Schlagzeilen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schlagzeilen</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a> <a href="https://pubeurope.com/tags/UnitedKingdomOfGreatBritainAndNorthernIreland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdomOfGreatBritainAndNorthernIreland</span></a> <a href="https://pubeurope.com/tags/VereinigtesK%C3%B6nigreich" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VereinigtesKönigreich</span></a> <a href="https://pubeurope.com/tags/VereinigtesK%C3%B6nigreichGro%C3%9FbritannienUndNordirland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VereinigtesKönigreichGroßbritannienUndNordirland</span></a> <a href="https://pubeurope.com/tags/VereinigtesK%C3%B6nigreichVonGrossbritannienUndNordirland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VereinigtesKönigreichVonGrossbritannienUndNordirland</span></a> <a href="https://pubeurope.com/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a></p>
Em :official_verified:<p>Magical backdoor only for "the good guys" is a complete fantasy 🔑✨</p><p>Let's say the strategy is akin to creating a MagicalKey that unlocks every door (a magical key because thinking encryption backdoors would only be used by "the good guys" is a great example of magical thinking).</p><p>Imagine only 1000 police officers have MagicalKeys. </p><p>Overtime, let's say only 1% of the police officers accidentally lose their MagicalKey. Now 10 MagicalKeys are lost in the wild and could be used by anyone else, for any purposes, including crime.</p><p>Then, let's say only 0.1% of police officers get corrupted by a crime gang. That's just one right? This corrupted "good guy" lets the gang create a double of the MagicalKey. Which crime gang wouldn't want a key that can magically open any door? </p><p>Now, the gang creates doubles of the MagicalKey they have. They use it subtly at first to avoid detection. They make sure they never leave traces behind, so victims have no idea their door got unlocked.</p><p>During this time, they steal your data, they sell it, they use it to impersonate you, they use it to harm you and your loved ones.</p><p>Then, another criminal figures out on their own how to emulate a MagicalKey without even having access to one. </p><p>The criminal creates a reproducible mold for this Emulated-MagicalKey and sells it to other criminals on the criminal market. Now, the MagicalKey™️ is available to any criminals looking for it. </p><p>Restrictions on the backdoor are off. Your personal data is up for grabs.</p><p>This is what is going to happen if backdoors are implemented in end-to-end encryption. But don't worry they say, "it's only for the good guys!".</p><p>At least, the criminals' data will also be up for grabs, right?</p><p>Nope! The criminals knew about this, so they just started using different channels that weren't impacted. </p><p>Criminals will have their privacy intact, they don't care about using illegal tools, but your legal privacy protections will be gone.</p><p>Backdoored end-to-end encryption isn't end-to-end anymore, it's just open-ended encryption. This offers pretty much no protection at all.</p><p>Extract from: <a href="https://www.privacyguides.org/articles/2025/04/11/encryption-is-not-a-crime/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">privacyguides.org/articles/202</span><span class="invisible">5/04/11/encryption-is-not-a-crime/</span></a></p><p><a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://infosec.exchange/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> <a href="https://infosec.exchange/tags/RootForE2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RootForE2EE</span></a></p>