Encryption's posts - Ukrainian uPOST

Skype and Signal Are Partnering on End-to-End Encryption Skype and Signal Are Partnering on End-to-End Encryption

While messaging platforms like WhatsApp, Facebook Messenger, and Google Allo have all incorporated end-to-end encryption into their products over the last few years, Skype has lagged behind. But that’s changing today—Skype is adding end-to-end encrypted messaging, with the help of Signal.

The US Claims It Doesn't Need a Court Order to Ask Tech Companies to Build Encryption Backdoors The US Claims It Doesn't Need a Court Order to Ask Tech Companies to Build Encryption Backdoors

Federal authorities say they can request a U.S. tech company build surveillance backdoors into their products without any kind of court order, according to statements from July released this weekend, ZDNet reported.

The Beginner's Guide to VPNs The Beginner's Guide to VPNs

In our new series Getting It, we’ll give you all you need to know to get started with and excel at a wide range of technology, both on and offline. Here, we’re arming you with everything you need to know to understand and use virtual private networks.

Apple Received a Warrant for the Sutherland Springs Shooter's iPhone Data Apple Received a Warrant for the Sutherland Springs Shooter's iPhone Data

Law enforcement officials investigating the Nov. 5 mass shooting in Sutherland Springs, Texas, have served Apple with a warrant for the data held on an iPhone SE used by the shooter.

DOJ Fires Up New War With Apple Over Encryption  DOJ Fires Up New War With Apple Over Encryption 

The DOJ and FBI have been in a bit of a cold war with Apple and the tech community ever since the controversy in 2015 over unlocking the San Bernardino shooter’s iPhone. This week, the war heated up again with the FBI and Apple exchanging words about encryption, and on Thursday, the Deputy Attorney General of the…

The FBI Is Seeking Access to the Sutherland Springs Shooter's iPhone The FBI Is Seeking Access to the Sutherland Springs Shooter's iPhone

The Federal Bureau of Investigation apparently missed a key window in which they could have sought Apple’s assistance with accessing data on an iPhone used by the Sutherland Springs shooter.

The FBI Can't Decrypt the Texas Shooter's Phone The FBI Can't Decrypt the Texas Shooter's Phone

The Federal Bureau of Investigation revealed today that it has been unable to decrypt a phone belonging to the gunman who killed 26 people in Sutherland Springs, Texas—an announcement that is likely to start another battle between law enforcement and technology companies over encryption.

One of the Secrets Guarding the Secure Internet Is a Wall of Lava Lamps One of the Secrets Guarding the Secure Internet Is a Wall of Lava Lamps

Cloudflare provides security and domain name services for millions of the most prominent sites on the web. The company has built a solid reputation for its secure encryption and one of the key factors in its system is a wall of 100 lava lamps in the lobby of its San Francisco headquarters.

The FBI Can't Stop Fearmongering About Encryption The FBI Can't Stop Fearmongering About Encryption

Never in the past century has the FBI ever had greater access to consumer data than it does today. It has never been easier to locate a person of interest—be it a terrorist, a counterfeiter, or a child predator. The quickening pace of technology has given rise to new forms of surveillance, the likes of which, two…

Adobe's Product Security Team Accidentally Posted Its Private PGP Encryption Key to Its Blog Adobe's Product Security Team Accidentally Posted Its Private PGP Encryption Key to Its Blog

The past few weeks have been a nightmare for data breaches, so good news: Here’s another easily preventable security problem. Adobe’s Product Security Incident Response Team accidentally posted the private PGP encryption key—necessary to decrypt encoded messages transmitted to them using their public PGP…

Why You Should Be Encrypting Your Devices and How to Easily Do It Why You Should Be Encrypting Your Devices and How to Easily Do It

Is the data on your phone or laptop encrypted? Should it be? And what does encrypting your data do to it anyway? Here we’ll explain the ins and outs of encryption, and how you can make sure that everything in your digital life is safe from prying eyes.

Prime Minister Says the Laws of Australia Can Beat the Laws of Math Prime Minister Says the Laws of Australia Can Beat the Laws of Math

Australian Prime Minister Malcolm Turnbull has been threatening to pass a law to effectively end the use of secure encryption in Australia for a while now. On Friday, he made his intentions more concrete and said that legislation mandating a government back door of some type will be introduced before the end of the…

Secure Chat App Wickr Thinks It’s Solved the Encrypted Conference Calls Problem Secure Chat App Wickr Thinks It’s Solved the Encrypted Conference Calls Problem

Remember when encrypting stuff was really hard? It kinda drives me crazy to think about how much time I wasted trying to set up encrypted OTR chat on Adium a few years ago, and now we can just download Signal or WhatsApp or Messenger and bam! Our chats are encrypted, just like that. We can even have an encrypted group…

German Enigma Machine Found at Flea Market Fetches $51,000 at Auction German Enigma Machine Found at Flea Market Fetches $51,000 at Auction

A professor of cryptology has auctioned off a rare and fully-functional Enigma machine used by the Nazis to encrypt messages during the Second World War. Incredibly, the collector found the machine at a flea market in Bucharest—which suggests Romania may house other machines still waiting to be discovered.

Trump’s Election Commission Plans to Abandon Insecure Voter Data Collection Methods Trump’s Election Commission Plans to Abandon Insecure Voter Data Collection Methods

Since the president’s Advisory Commission on Election Integrity requested voter rolls from state election officials—allegedly for the purpose of investigating Trump’s unproven claims about widespread voter fraud—45 states and the District of Columbia have either partially or wholly declined to share their data, and…

OneLogin Data Breach May Have Revealed Encrypted Data OneLogin Data Breach May Have Revealed Encrypted Data

OneLogin, an identity management software company, announced yesterday that it suffered a data breach. Although the firm hasn’t provided many details, the few that it has released suggest that the breach is extensive.

Days After London Terror Attack, the UK Government Is Already Going After WhatsApp's Encryption Days After London Terror Attack, the UK Government Is Already Going After WhatsApp's Encryption

After the horrifying terror attack in London last week, the familiar debate over government access to encrypted communications has reared its head again.

Some Hackers Figured Out How to Take Control of Any WhatsApp Account Some Hackers Figured Out How to Take Control of Any WhatsApp Account

Security researchers just announced the discovery of major vulnerabilities in WhatsApp and Telegram, two popular messaging apps with end-to-end encryption, when used in an internet browser. In related news, you can use WhatsApp and Telegram in an internet browser.

Trump's Attorney General Pick Wants to Give Cops Encryption Backdoors Trump's Attorney General Pick Wants to Give Cops Encryption Backdoors

Alabama Senator Jeff Sessions, who is currently waiting approval for the US Attorney General job, has his fair share of backwards ideas. But another one of his ideas—that law enforcement should be able to “overcome” encryption—is just plain reckless and potentially destructive.

More Encryption's posts »

Language