close

monocles chat is an Open Source XMPP/Jabber Messenger for Android

blabber.im Messenger App Ein Jabber/XMPP Client für Android Smartphones, der für ein einzigartiges mobiles Erlebnis optimiert wurde.

#xmpp #OMEMO #e2ee #Encryption #Jabber #monocles #blabber #conversations

  • chevron_right

    Google Fi is getting end-to-end encrypted phone calls

    news.movim.eu / ArsTechnica · Friday, 29 October - 15:48

Google Fi is getting end-to-end encrypted phone calls

Enlarge

Google's MVNO cell phone service, Google Fi, is getting a surprise new feature: encrypted phone calls . Encrypted voice chats via messaging apps have been available for a while, but this is the first time we've seen a company hijack the regular phone system for end-to-end encrypted calls. Open the phone app, dial a number, and your call can be encrypted.

End-to-end encryption is not a normal phone standard, so both parties on the call will need to be firmly in the Google Fi ecosystem for the feature to work. Google's description says that "calls between two Android phones on Fi will be secured with end-to-end encryption by default." Google Fi works on the iPhone, too, but given that Google would have to use Apple's default phone app, it can't add encryption.

For encrypted Fi-to-Fi calls, Google will show a new "Encrypted by Google Fi" message in both users' phone apps, along with the ubiquitous lock icon. The company says there will be "unique audio cues" as well.

Read 2 remaining paragraphs | Comments

index?i=B7eGJbYwIZA:4c42UcLece0:V_sGLiPBpWUindex?i=B7eGJbYwIZA:4c42UcLece0:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA

ROT8000 is the Unicode equivalent of ROT13 . What’s clever about it is that normal English looks like Chinese, and not like ciphertext (to a typical Westerner, that is).

  • chevron_right

    Ransomware victims panicked while FBI secretly held REvil decryption key

    news.movim.eu / ArsTechnica · Tuesday, 21 September - 20:55

Circular seal against a marble wall.

Enlarge / The seal of the Federal Bureau of Investigation (FBI) is seen at the J. Edgar Hoover building in Washington, D.C. (credit: Andrew Harrer/Bloomberg )

For three weeks during the REvil ransomeware attack this summer, the FBI secretly withheld the key that would have decrypted data and computers on up to 1,500 networks, including those run by hospitals, schools, and businesses.

The FBI had penetrated the REvil gang’s servers to obtain the key, but after discussing it with other agencies, the bureau decided to wait before sending it to victims for fear of tipping off the criminals, The Washington Post reports. The FBI hadn’t want to tip off the REvil gang and had hoped to take down their operations, sources told the Post.

Instead, REvil went dark on July 13 before the FBI could step in. For reasons that haven’t been explained, the FBI didn’t cough up the key until July 21 .

Read 6 remaining paragraphs | Comments

index?i=NlLgCPVEjXs:gIOSR6ycwYg:V_sGLiPBpWUindex?i=NlLgCPVEjXs:gIOSR6ycwYg:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
  • chevron_right

    A new app helps Iranians hide messages in plain sight

    news.movim.eu / ArsTechnica · Saturday, 18 September - 11:00

An anti-government graffiti that reads in Farsi "Death to the dictator" is sprayed at a wall north of Tehran on September 30, 2009.

Enlarge / An anti-government graffiti that reads in Farsi "Death to the dictator" is sprayed at a wall north of Tehran on September 30, 2009. (credit: Getty Images)

Amid ever-increasing government Internet control, surveillance, and censorship in Iran , a new Android app aims to give Iranians a way to speak freely.

Nahoft, which means “hidden” in Farsi, is an encryption tool that turns up to 1,000 characters of Farsi text into a jumble of random words. You can send this mélange to a friend over any communication platform—Telegram, WhatsApp, Google Chat, etc.—and then they run it through Nahoft on their device to decipher what you’ve said.

Released last week on Google Play by United for Iran, a San Francisco–based human rights and civil liberties group, Nahoft is designed to address multiple aspects of Iran's Internet crackdown. In addition to generating coded messages, the app can also encrypt communications and embed them imperceptibly in image files, a technique known as steganography . Recipients then use Nahoft to inspect the image file on their end and extract the hidden message.

Read 13 remaining paragraphs | Comments

index?i=ZUtHM1zZujU:4r8gA45Wjbk:V_sGLiPBpWUindex?i=ZUtHM1zZujU:4r8gA45Wjbk:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
  • chevron_right

    WhatsApp “end-to-end encrypted” messages aren’t that private after all

    news.movim.eu / ArsTechnica · Wednesday, 8 September - 21:33

WhatsApp logo

Enlarge / The security of Facebook's popular messaging app leaves several rather important devils in its details. (credit: WhatsApp )

Yesterday, independent newsroom ProPublica published a detailed piece examining the popular WhatsApp messaging platform's privacy claims. The service famously offers "end-to-end encryption," which most users interpret as meaning that Facebook, WhatsApp's owner since 2014, can neither read messages itself nor forward them to law enforcement.

This claim is contradicted by the simple fact that Facebook employs about 1,000 WhatsApp moderators whose entire job is—you guessed it—reviewing WhatsApp messages that have been flagged as "improper."

End-to-end encryption—but what’s an “end”?

security and privacy page seems easy to misinterpret.' src='https://cdn.arstechnica.net/wp-content/uploads/2021/09/whatsapp-end-to-end-screenshot-640x141.png' >

This snippet from WhatsApp's security and privacy page seems easy to misinterpret. (credit: Jim Salter )

The loophole in WhatsApp's end-to-end encryption is simple: the recipient of any WhatsApp message can flag it. Once flagged, the message is copied on the recipient's device and sent as a separate message to Facebook for review.

Read 14 remaining paragraphs | Comments

index?i=mM8-5GQzxAI:A6MEMK1_Qo8:V_sGLiPBpWUindex?i=mM8-5GQzxAI:A6MEMK1_Qo8:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
  • chevron_right

    Avoid Windscribe VPN (Toronto-based)

    Mathias Poujol-Rost ✅ · Tuesday, 27 July - 16:20

Via https://nitter.fdn.fr/dangoodin001/status/1419799335206752260

#encryption

  • favorite

    1 Like

    adnan360