• Sc chevron_right

    The NSA Says that There are No Known Flaws in NIST’s Quantum-Resistant Algorithms / Schneier · 4 days ago - 03:38 · 1 minute

Rob Joyce, the director of cybersecurity at the NSA, said so in an interview:

The NSA already has classified quantum-resistant algorithms of its own that it developed over many years, said Joyce. But it didn’t enter any of its own in the contest. The agency’s mathematicians, however, worked with NIST to support the process, trying to crack the algorithms in order to test their merit.

“Those candidate algorithms that NIST is running the competitions on all appear strong, secure, and what we need for quantum resistance,” Joyce said. “We’ve worked against all of them to make sure they are solid.”

The purpose of the open, public international scrutiny of the separate NIST algorithms is “to build trust and confidence,” he said.

I believe him. This is what the NSA did with NIST’s candidate algorithms for AES and then for SHA-3. NIST’s Post-Quantum Cryptography Standardization Process looks good.

I still worry about the long-term security of the submissions, though. In 2018, in an essay titled “ Cryptography After the Aliens Land ,” I wrote:

…there is always the possibility that those algorithms will fall to aliens with better quantum techniques. I am less worried about symmetric cryptography, where Grover’s algorithm is basically an upper limit on quantum improvements, than I am about public-key algorithms based on number theory, which feel more fragile. It’s possible that quantum computers will someday break all of them, even those that today are quantum resistant.

It took us a couple of decades to fully understand von Neumann computer architecture. I’m sure it will take years of working with a functional quantum computer to fully understand the limits of that architecture. And some things that we think of as computationally hard today will turn out not to be.

  • chevron_right

    Researcher uses 600-year-old algorithm to crack crypto keys found in the wild / ArsTechnica · Monday, 14 March - 21:31

Stylized illustration of key.

Enlarge (credit: Getty Images )

Cryptographic keys generated with older software now owned by technology company Rambus are weak enough to be broken instantly using commodity hardware, a researcher reported on Monday. This revelation is part of an investigation that also uncovered a handful of weak keys in the wild.

The software comes from a basic version of the SafeZone Crypto Libraries, which were developed by a company called Inside Secure and acquired by Rambus as part of its 2019 acquisition of Verimatrix, a Rambus representative said. That version was deprecated prior to the acquisition and is distinct from a FIPS-certified version that the company now sells under the Rambus FIPS Security Toolkit brand.

Mind your Ps and Qs

Researcher Hanno Böck said that the vulnerable SafeZone library doesn't sufficiently randomize the two prime numbers it used to generate RSA keys. (These keys can be used to secure Web traffic, shells, and other online connections.) Instead, after the SafeZone tool selects one prime number, it chooses a prime in close proximity as the second one needed to form the key.

Read 12 remaining paragraphs | Comments

  • chevron_right

    Movim 0.20 - Skiff

    Timothée Jaussoin · / Movim · Saturday, 19 February - 10:25 edit · 3 minutes

I was used to #release a new version of #Movim twice a year. Skiff is an exception. One year of work was required to release the 20th major version of the project.

The main reason is mostly based on the amount of work and adjustments required to integrate the main feature of this release: the support of end-to-end #encryption through the implementation of OMEMO.

So let's dive in all the new exciting features that you will discover in this major release.


The technical part was already extensively covered by the dedicated article End to end encryption in Movim - OMEMO is (finally) there!.

The user experience and flow is not very different than on other XMPP clients, if Movim detects that you can start an encrypted conversation with a contact a small lock icon will be displayed next to the chatbox. You can always choose to toggle it back to have a non-encrypted discussion.

The new redesigned chatbox

It is also possible to see all the encryption fingerprints in the Contact drawer under the dedicated "Fingerprints" tab. You can also enable and disable encryption to each fingerprint manually there. Movim is displaying the last message sent or received and the client linked to the fingerprint to help you with your configuration. But rest assured, those settings are only for those that wants to configure in detail their encryption levels.

OMEMO Fingerprints

End-to-end encryption is also available for group chats, the flow is exactly the same as for single contacts.

There is some chances that you encounter encryption issues in some cases, even after a lot of debug and refactoring end-to-end encryption is a really complex beast that is difficult to handle. Feel free to open a ticket with all the details to reproduce the issue if you encounter one.

I'd like to thank again NLNet for their help on this project ! With the funding I was able to free-up time to finally integrate end-to-end encryption in Movim.

NLNet Logo


A few changes were made regarding the posts and their integration within Movim.

The post publication form was slightly redesigned and now allows several images, files or links to be attached. Linked to that change, post cards were also redesigned with a more compact design.

Multiple attached pictures

The public Communities and Blog pages now have the same 2-columns design as their private version. The displayed Communities and Contacts information are also now more compact.

Two column design for the public pages

The tags were redesigned and are now more clearly visible and navigable.

Now design for the tags


The contacts and chatrooms drawers were redesigned and now include some really useful information. Pictures and links sent in conversations are now quickly available in dedicated tabs.

Redesigned chat drawer

Chat bubbles are now properly displaying quotes and support message styling.

Chat bubble with styling

A big refactoring was also done regarding how the edited messages are handled in Movim. This refactoring allowed messages to be edited in Group Chats and the support of several edits on a single message (which caused some weird message duplication bug).


Chatrooms administrators can now manage affiliations and ban/unban users.

Changing affiliation for a user

You can now prioritize your most important chatrooms on top of the list with the pin feature.

Pinned chatrooms

...and many other things

The old Movim API code was fully removed. It had been left untouched for years and not really used nor up-to-date anymore.

When you are in a chat conversation, the other chats counter is displayed on the back button.

The internal picture library was rewritten and simplified, it now supports transparent avatars. All pictures are now compressed in WebP by default.

Admins can now fully disable the registration feature. It is quite useful if you have a dedicated Movim setup and a specific separated flow to register your users (using an internal LDAP in a company or school for example).

Plenty of new emojis were integrated with the support of Unicode 13.0.

Movim is now a Progressive Web App

Movim used to have some "native" apps, on desktop and Android. All those app are now deprecated and replaced by work that was done to make Movim a full Progressive Web App. From any browsers you can now install Movim as an app on your phone or desktop in a single click.


Lots of other small improvements and features were integrated in this release but not listed there, it's time for you to discover them. Enjoy this new version!

That's all folks!

  • Ga chevron_right

    5 Different Free Options to Safely Store Sensitive Files in the Cloud

    Danie van der Merwe · / gadgeteerza-tech-blog · Monday, 14 February - 16:47

Ideally, you wouldn’t store any sensitive personal information in the cloud. There’s always a risk your online accounts will get hacked, so in theory you’re better off storing all your documents and data offline. But that’s not really how the world works anymore, and the convenience (or necessity) of maintaining easy access to financial records, IDs, and medical documents often means taking a calculated risk.

But lots of people risk more than they need to, and end up storing quite a lot of personal information on a cloud storage service like Google Drive, iCloud, or OneDrive. If you do too, consider better protecting the data by encrypting it with a password.


#technology #cloudstorage #encryption #security

  • Ga chevron_right

    Cryptgeon is a secure, open source sharing note / file service inspired by PrivNote

    Danie van der Merwe · / gadgeteerza-tech-blog · Friday, 24 December - 14:05

The note can have a file attachment, and self-destructs based on either a time or view number limit. The unique link generated, is how the note contents are retrieved, so no separate passwords are needed.

Each note has a 512bit generated ID that is used to retrieve the note. Data is stored in memory and never persisted to disk. The note is then encrypted with AES in GCM mode on the client side and then sent to the server. Data is stored in memory and never persisted to disk. The server never sees the encryption key and cannot decrypt the contents of the notes even if it tried to.


#technology #encryption #security #notes #cryptgeon

monocles chat is an Open Source XMPP/Jabber Messenger for Android Messenger App Ein Jabber/XMPP Client für Android Smartphones, der für ein einzigartiges mobiles Erlebnis optimiert wurde.

#xmpp #OMEMO #e2ee #Encryption #Jabber #monocles #blabber #conversations

  • chevron_right

    Google Fi is getting end-to-end encrypted phone calls / ArsTechnica · Friday, 29 October, 2021 - 15:48

Google Fi is getting end-to-end encrypted phone calls


Google's MVNO cell phone service, Google Fi, is getting a surprise new feature: encrypted phone calls . Encrypted voice chats via messaging apps have been available for a while, but this is the first time we've seen a company hijack the regular phone system for end-to-end encrypted calls. Open the phone app, dial a number, and your call can be encrypted.

End-to-end encryption is not a normal phone standard, so both parties on the call will need to be firmly in the Google Fi ecosystem for the feature to work. Google's description says that "calls between two Android phones on Fi will be secured with end-to-end encryption by default." Google Fi works on the iPhone, too, but given that Google would have to use Apple's default phone app, it can't add encryption.

For encrypted Fi-to-Fi calls, Google will show a new "Encrypted by Google Fi" message in both users' phone apps, along with the ubiquitous lock icon. The company says there will be "unique audio cues" as well.

Read 2 remaining paragraphs | Comments