Skip to main content

Search

Items tagged with: encryption


Google Chrome will make it much harder for ad blockers. ๐Ÿ˜ค

This is the final drop, it needed to make everyone switch to a more private solution! ๐Ÿฅณ๐Ÿ”’

Check our recommendations! ๐Ÿ‘‡
https://tuta.com/blog/best-private-browsers

#privacy #encryption #chrome #google #deGoogle #browsers


The Tuta Team is composed of dedicated privacy activists who are working hard to protect your online data!๐Ÿ’ช

With a wide array of backgrounds and expertise we are committed to providing you with the world's most secure end-to-end encrypted email experience!๐Ÿ”’

This is privacy done right.๐ŸŽ‰

Check out our new additions and get to know the crew who is fighting to make the internet a better place! ๐Ÿ‘‰ https://tuta.com/team

#privacy #teamwork #diversity #encryption #email #postquantumcryptography


Are you looking for a new email address?

๐Ÿ”ฅ Grab YourName@tuta.com while you still can. ๐Ÿ”ฅ

Pick you favorite now! โœŠ Go Revolutionary: https://tuta.com/create-email-account?t-src=m

#privacy #privateemail #encryption #emailaddress #security


Sending end-to-end encrypted emails has never been easier! ๐Ÿ˜

With a few simple clicks you can communicate securely and converse in total privacy.๐Ÿ”’

Protect yourself today with a new Tuta.com address!๐Ÿ‘‡
https://tuta.com/

#privacy #encryption #opensource #security #sunday


Exciting News! The tuta.com email domain is now available to all users taking advantage of our new subscription plans.๐ŸŽ‰

Grab your name at https://tuta.com/ now!

Enjoy the convenience of a 4-letter domain name and the privacy you've come to know and love.โค๏ธ ๐Ÿ”’

#privacy #email #encryption


The new tuta.com email domain will be available soon to everyone using one of our new subscription plans!๐Ÿ˜Ž

Be quick and create your favorite new address as soon as they go live. Shorter addresses are sure to be gone fast!๐Ÿƒโ€โ™€๏ธ๐Ÿ’จ

#privacy #encryption #domain #newname


Does your social media feed lack fast & witty jokes about encryption? ๐Ÿ”’

Are you looking for quick & helpful privacy tips on the go? ๐Ÿ‘Ÿ

We've got a gift for you! ๐ŸŽ

Tuta is now live on TikTok! After all, we need to teach kids why #privacymatters!

๐Ÿ‘ฏ https://www.tiktok.com/@tutaprivacy

#privacy #encryption #fun


Google is taking pay-to-play to the next level. Recent court testimony shows that Google paid $21 Billion USD to remain the Internet's dominant search engine. ๐Ÿ˜ฑ

๐Ÿ’ช Fight back against Big Tech's monopoly by switching to a more private search engine today! ๐Ÿ‘‡
https://tutanota.com/blog/google-search-monopoly

#privacy #encryption #google #monopoly #bigtech


๐Ÿ“ข The EU Parliament will not be moving forward with chat control! The indiscriminate mass surveillance measures have been removed and secure end-to-end encryption will not be compromised! ๐Ÿฅณ

๐Ÿ’ชLet's keep pushing for strong privacy rights!๐Ÿ‘‡
https://tutanota.com/blog/chat-control
#chatcontrol #eu #privacy #datenschutz #encryption #politics #goodnews


In case you missed it. Meredith at @signalapp was excellent at setting out the problems with UK Govโ€™s plans to back door end-to-end encryption. If you havenโ€™t done already please support @openrightsgroup campaign on this https://action.openrightsgroup.org/dont-scan-me #encryption #privacy #onlinesafetybill


Journalists, whistleblowers, activists - they all risk their lives to make the truth public.

Let's fight for the right to #privacy and #pressfreedom.

Together with #Threema, #Tor #FightfortheFuture and others we call on policymakers to not undermine #encryption.

We ALL depend on encryption for #security and #privacy! ๐Ÿ’ช๐Ÿ”’

Read more: https://tutanota.com/blog/posts/press-freedom-day-encryption


Today is #worldpressfreedomday
๐Ÿ“ป๐Ÿ“บ๐Ÿ—ž๏ธ

Together with 45+ pro-privacy organizations such as @threemaapp @mozilla @nextcloud and others we are calling on democratic world leaders to uphold encryption, privacy & press freedom: https://tutanota.com/blog/posts/press-freedom-day-encryption

Our asks are simple:

โ–ช๏ธ Do NOT undermine encryption via overreaching legislative initiatives ๐Ÿ”’

โ–ช๏ธ Do NOT block or throttle technologies providing secure, encrypted services ๐Ÿ”’

#privacy #encryption #pressfreedom #pressfreedomday #worldpressfreedomday


Stay strong: Desperate governments worldwide want to downright criminalize #privacy and #encryption now, using laughable pretexts like #cybersecurity causing #childabuse to literally put everyone on the planet under a permanent wiretapping mandate like we're common criminals by default.

Smartphones are especially susceptible to surveillance, and among those devices we have the least control over instead of corporations merely renting them to us: It's time for that to change!


#ChatControl #OnlineSafetyBill #EarnIt - Lots of politicians want to undermine encryption once again. When will they ever learn that a "backdoor for the good guys only" is simply not possible?

Learn here why we must keep fighting for strong #encryption: https://tutanota.com/blog/posts/why-a-backdoor-is-a-security-risk

#OSB #CSAM #ClientSideScanning #Privacy

Politiker wollen wieder einmal die Verschlรผsselung untergraben. Wann werden sie jemals lernen, dass eine "Hintertรผr nur fรผr die Guten" einfach nicht mรถglich ist?


Did you ever wonder how Tutanota's encryption is able to protect all your data? Check out our new encryption page with lots of interesting facts! ๐Ÿ”’๐Ÿ˜

We โ™ฅ๏ธ #encryption!

๐Ÿ‘‰ https://tutanota.com/encryption

#security #privacy #email #data


The encrypted Tutanota mailbox makes sure your data belongs to you, and to you alone! ๐Ÿ˜Ž๐Ÿ”’

Make sure your friends enjoy the same level of privacy. Invite them to Tutanota! ๐Ÿคฉ

๐Ÿ‘‰ https://tutanota.com/blog/posts/refer-a-friend

#privacy #security #Encryption


In an era of quantum computing "arms race", it is time to transition to quantum-safe systems.

Tutanota is well ahead of the race: We already have a working prototype with post-quantum secure encryption. Stay tuned for future updates! ๐Ÿค“๐Ÿ’ช

#postquantumcryptography #encryption #cryptography

https://tutanota.com/blog/posts/cybersecurity-strategy-post-quantum-encryption


The EU Commission is planning what Apple stopped after a huge backslash: Turning your own device into a surveillance machine via client-side scanning.

Stop #ChatControl now! ๐Ÿ’ช

Check here how you can join the fight for #privacy: https://tutanota.com/blog/posts/csam-apple-eu-surveillance

And don't forget: Use #encryption. ๐Ÿ”’


Impressive campaign by @mullvadnet against the CSA Regulation #chatcontrol Here's more info: https://tutanota.com/blog/posts/chat-control

Do you want to help as a citizen against scanning of all your chat messages? Sign the petition: https://civicrm.edri.org/stop-scanning-me #privacy #encryption #stopscanningme


Let's fight chat control!

Congrats to @mullvadnet - you really nail it with your new campaign against client-side scanning! ๐Ÿ’ช๐Ÿ”’

#privacy #e2ee #encryption #clientsidescanning #chatcontrol

https://tutanota.com/blog/posts/chat-control


You have nothing to hide until the government suddenly declares your behaviour illegal. #abortion #usa #meta #facebook #google #e2ee #encryption


"There is no prosecution at any cost!"

Germany opposes EU plans for client-side scanning - it would create an unprecedented surveillance monster that violates fundamental rights.

#Fight4Privacy #encryption #no2backdoors #CSAM #clientsidescanning

Read more: ๐Ÿ‘‡
https://tutanota.com/blog/posts/germany-against-client-side-scanning-csam


Encryption guarantees the right to privacy. ๐Ÿ’ช

Join the privacy movement now:
https://tutanota.com/big-tech-alternative?t-src=m

#privacy #encryption #tutanota


Today I learned that when you "edit" or "correct" a message in #XMPP, the original message is still technically stored on the server or device. It's the client side that understands that the new message is an edit of the previous message, and "displays" it as such. But, if you send a password or something sensitive, "editing" the message after it has been sent might not remove the actual contents of the original version of the message, so make sure you use #encryption too.

#privacy #security


Happy #DataPrivacyDay! ๐Ÿฅณ

Here are some privacy-first apps frequently recommended by the Tutanota community.

What are your favorite apps to quit #BigTech?

#DataProtection #Encryption #Security #Privacy


I recently wrote a post detailing the recent #LastPass breach from a #password cracker's perspective, and for the most part it was well-received and widely boosted. However, a good number of people questioned why I recommend ditching LastPass and expressed concern with me recommending people jump ship simply because they suffered a breach. Even more are questioning why I recommend #Bitwarden and #1Password, what advantages they hold over LastPass, and why would I dare recommend yet another cloud-based password manager (because obviously the problem is the entire #cloud, not a particular company.)

So, here are my responses to all of these concerns!

Let me start by saying I used to support LastPass. I recommended it for years and defended it publicly in the media. If you search Google for "jeremi gosney" + "lastpass" you'll find hundreds of articles where I've defended and/or pimped LastPass (including in Consumer Reports magazine). I defended it even in the face of vulnerabilities and breaches, because it had superior UX and still seemed like the best option for the masses despite its glaring flaws. And it still has a somewhat special place in my heart, being the password manager that actually turned me on to password managers. It set the bar for what I required from a password manager, and for a while it was unrivaled.

But things change, and in recent years I found myself unable to defend LastPass. I can't recall if there was a particular straw that broke the camel's back, but I do know that I stopped recommending it in 2017 and fully migrated away from it in 2019. Below is an unordered list of the reasons why I lost all faith in LastPass:

- LastPass's claim of "zero knowledge" is a bald-faced lie. They have about as much knowledge as a password manager can possibly get away with. Every time you login to a site, an event is generated and sent to LastPass for the sole purpose of tracking what sites you are logging into. You can disable telemetry, except disabling it doesn't do anything - it still phones home to LastPass every time you authenticate somewhere. Moreover, nearly everything in your LastPass vault is unencrypted. I think most people envision their vault as a sort of encrypted database where the entire file is protected, but no -- with LastPass, your vault is a plaintext file and only a few select fields are encrypted. The only thing that would be worse is if...

- LastPass uses shit #encryption (or "encraption", as @sc00bz calls it). Padding oracle vulnerabilities, use of ECB mode (leaks information about password length and which passwords in the vault are similar/the same. recently switched to unauthenticated CBC, which isn't much better, plus old entries will still be encrypted with ECB mode), vault key uses AES256 but key is derived from only 128 bits of entropy, encryption key leaked through webui, silent KDF downgrade, KDF hash leaked in log files, they even roll their own version of AES - they essentially commit every "crypto 101" sin. All of these are trivial to identify (and fix!) by anyone with even basic familiarity with cryptography, and it's frankly appalling that an alleged security company whose product hinges on cryptography would have such glaring errors. The only thing that would be worse is if...

- LastPass has terrible secrets management. Your vault encryption key always resident in memory and never wiped, and not only that, but the entire vault is decrypted once and stored entirely in memory. If that wasn't enough, the vault recovery key and dOTP are stored on each device in plain text and can be read without root/admin access, rendering the master password rather useless. The only thing that would be worse is if...

- LastPass's browser extensions are garbage. Just pure, unadulterated garbage. Tavis Ormandy went on a hunting spree a few years back and found just about every possible bug -- including credential theft and RCE -- present in LastPass's browser extensions. They also render your browser's sandbox mostly ineffective. Again, for an alleged security company, the sheer amount of high and critical severity bugs was beyond unconscionable. All easy to identify, all easy to fix. Their presence can only be explained by apathy and negligence. The only thing that would be worse is if...

- LastPass's API is also garbage. Server-can-attack-client vulns (server can request encryption key from the client, server can instruct client to inject any javascript it wants on every web page, including code to steal plaintext credentials), JWT issues, HTTP verb confusion, account recovery links can be easily forged, the list goes on. Most of these are possibly low-risk, except in the event that LastPass loses control of its servers. The only thing that would be worse is if...

- LastPass has suffered 7 major #security breaches (malicious actors active on the internal network) in the last 10 years. I don't know what the threshold of "number of major breaches users should tolerate before they lose all faith in the service" is, but surely it's less than 7. So all those "this is only an issue if LastPass loses control of its servers" vulns are actually pretty damn plausible. The only thing that would be worse is if...

- LastPass has a history of ignoring security researchers and vuln reports, and does not participate in the infosec community nor the password cracking community. Vuln reports go unacknowledged and unresolved for months, if not years, if not ever. For a while, they even had an incorrect contact listed for their security team. Bugcrowd fields vulns for them now, and most if not all vuln reports are handled directly by Bugcrowd and not by LastPass. If you try to report a vulnerability to LastPass support, they will pretend they do not understand and will not escalate your ticket to the security team. Now, Tavis Ormandy has praised LastPass for their rapid response to vuln reports, but I have a feeling this is simply because it's Tavis / Project Zero reporting them as this is not the experience that most researchers have had.

You see, I'm not simply recommending that users bail on LastPass because of this latest breach. I'm recommending you run as far way as possible from LastPass due to its long history of incompetence, apathy, and negligence. It's abundantly clear that they do not care about their own security, and much less about your security.

So, why do I recommend Bitwarden and 1Password? It's quite simple:

- I personally know the people who architect 1Password and I can attest that not only are they extremely competent and very talented, but they also actively engage with the password cracking community and have a deep, *deep* desire to do everything in the most correct manner possible. Do they still get some things wrong? Sure. But they strive for continuous improvement and sincerely care about security. Also, their secret key feature ensures that if anyone does obtain a copy of your vault, they simply cannot access it with the master password alone, making it uncrackable.

- Bitwarden is 100% open source. I have not done a thorough code review, but I have taken a fairly long glance at the code and I am mostly pleased with what I've seen. I'm less thrilled about it being written in a garbage collected language and there are some tradeoffs that are made there, but overall Bitwarden is a solid product. I also prefer Bitwarden's UX. I've also considered crowdfunding a formal audit of Bitwarden, much in the way the Open Crypto Audit Project raised the funds to properly audit TrueCrypt. The community would greatly benefit from this.

Is the cloud the problem? No. The vast majority of issues LastPass has had have nothing to do with the fact that it is a cloud-based solution. Further, consider the fact that the threat model for a cloud-based password management solution should *start* with the vault being compromised. In fact, if password management is done correctly, I should be able to host my vault anywhere, even openly downloadable (open S3 bucket, unauthenticated HTTPS, etc.) without concern. I wouldn't do that, of course, but the point is the vault should be just that -- a vault, not a lockbox.

I hope this clarifies things! As always, if you found this useful, please boost for reach and give me a follow for more password insights!


Nice to have you on board @mozilla, but we need more than another instance:

"If you buy into the idea that #Mozilla should be spending resources on #Mastodon, at the very least [they] could do something meaningful like finance and supply labour to build better moderation tools, end to end #encrypted DMs or some other meaningful effort. Yet this is not what is proposed."

Source:
https://post.lurk.org/@shibacomputer/109548784095427843

#encryption #MastodonDevelopment #encryptedDMs #e2ee


Members of German Chaos Computer Club (CCC) have demonstratively patched "highly secure" VPN-routers encrypting medical data
in order to enable the use of updated encryption certificates.

Router manufacturers had provided devices without a certificate update option.
The hack could save health insurances & their customers from up to 400 mio โ‚ฌโ‚ฌโ‚ฌ of extra cost for new hardware.

Press release (German)
https://www.ccc.de/en/updates/2022/konnektoren-400-millionen-geschenk

/2

#medicaldata #encryption #hack #health #vpn


Must-read from @iverna1@twitter.com: The EU ๐Ÿ‘# # # proposal "would actually make everyone in the EU, including children, less safe", "break #" and "open the door for authoritarian governments around the world". https://www.politico.eu/article/europe-online-child-abuse-law-make-us-less-safe/ (1/2)


Don't understand why people are talking about encrypted communication, or even where to start in how to think about that?

Here is a free, quickly read, and highly recommended novel to get started on changing one's thinking about encryption and privacy:

https://craphound.com/littlebrother/download/

# # #

Feel free to boost for those who don't know.


I donโ€™t understand what the story is here. If the USB stick was properly encrypted, as the article appears to state, the data is not โ€œlostโ€. The loss of the USB stick itself is incidental.

https://inkl.com/a/rMxWPJTJbqJ

# # #


The EU Commission is planning what Apple stopped after backslash from privacy groups: Automatic CSAM scanning of your private communication. Act now to stop surveillance! ๐Ÿ’ช๐Ÿ‘‡
https://tutanota.com/blog/posts/csam-apple-eu-surveillance
# # # # #

โ‡ง