Friday, August 14, 2020
- Advertisement -
Speed up your site performance today, Free site transfer, same renewal price
This is what end-to-end encryption should look like! – Jitsi

This is what end-to-end encryption should look like! – Jitsi

Blog Some of the people watching our repos have been asking us what the deal was with this little new HIPS project (which by the way stands for Hidden In Plain Sight). Well, now you know! HIPS is about using a new Chrome WebRTC API called “Insertable Streams” to add a second layer of end-to-end…
This is what end-to-end encryption should look like! – Jitsi

This is what end-to-end encryption should look like! – Jitsi

April 12, 2020 / Jitsi Meet / Jitsi Videobridge / meet.jit.si / Security and Privacy / Uncategorized / WebRTC Some of the people watching our repos have been asking us what the deal was with this little new HIPS project (which by the way stands for Hidden In Plain Sight). Well, now you know! HIPS…
Does Zoom use end-to-end encryption?

Does Zoom use end-to-end encryption?

TL;DR: It’s complicated. Yesterday Zoom (the videoconferencing company, not the defunct telecom) put out a clarification post describing their encryption practices. This is a nice example of a company making necessary technical clarifications during a difficult time, although it comes following widespread criticism the company received over their previous, and frankly slightly misleading, explanation. Unfortunately,…
Zoom’s Encryption Is “Not Suited for Secrets” and Has Surprising Links To China, Researchers Discover

Zoom’s Encryption Is “Not Suited for Secrets” and Has Surprising Links To China, Researchers...

Meetings on Zoom, the increasingly popular video conferencing service, are encrypted using an algorithm with serious, well-known weaknesses, and sometimes using keys issued by servers in China, even when meeting participants are all in North America, according to researchers at the University of Toronto. The researchers also found that Zoom protects video and audio content…
Barr’s Encryption Push Is Decades in the Making, but Troubles Some at FBI

Barr’s Encryption Push Is Decades in the Making, but Troubles Some at FBI

WASHINGTON—When Attorney General William Barr returned to the Justice Department last year, law-enforcement officials briefed him on how encryption and other digital-security measures were hindering investigations into everything from child sex abuse to terrorism. Mr. Barr was surprised and puzzled, according to people familiar with the meeting. The government was struggling with similar problems when…
Microsoft CEO says encryption backdoors are a ‘terrible idea’

Microsoft CEO says encryption backdoors are a ‘terrible idea’

As Apple squares off for another encryption fight, Microsoft CEO Satya Nadella offered mixed messages on the encryption question. In a Monday meeting with reporters in New York, Nadella reiterated the company’s opposition to encryption backdoors, but expressed tentative support for legal and technical solutions in the future. “I do think backdoors are a terrible…
Over two dozen encryption experts call on India to rethink changes to its intermediary liability rules

Over two dozen encryption experts call on India to rethink changes to its intermediary...

Security and encryption experts from around the world are joining a number of organizations to call on India to reconsider its proposed amendments to local intermediary liability rules. In an open letter to India’s IT Minister Ravi Shankar Prasad on Thursday, 27 security and cryptography experts warned the Indian government that if it goes ahead…
Encryption software: German BSI withholds Truecrypt security report – Golem.de

Encryption software: German BSI withholds Truecrypt security report – Golem.de

The German Federal Office for Information Security (BSI) has kept a detailed examination of the encryption software Truecrypt secret for nine years. On more than 400 pages the documents contain a detailed description of the architecture of the encryption tool, list various security problems and make recommendations on how to fix them. Golem.de learned about…
FortiGuard XOR Encryption in Multiple Fortinet Products

FortiGuard XOR Encryption in Multiple Fortinet Products

Bugtraq mailing list archives SEC Consult SA-20191125-0 :: FortiGuard XOR Encryption in Multiple Fortinet Products From: SEC Consult Vulnerability Lab Date: Mon, 25 Nov 2019 14:43:45 +0100SEC Consult Vulnerability Lab Security Advisory ======================================================================= title: FortiGuard XOR Encryption product: Multiple Fortinet Products (see Vulnerable / tested versions) vulnerable version: Multiple (see Vulnerable /…
Facebook’s Encryption Makes it Harder to Detect Child Abuse

Facebook’s Encryption Makes it Harder to Detect Child Abuse

In 2018, the National Center for Missing and Exploited Children received more than 18 million reports to their CyberTipline, constituting 45 million images depicting child sexual abuse. Most of these children were under the age of 12, and some were as young as a few months old.Since its inception in 1998, the CyberTipline has received…

APPLICATIONS

HackerOne pays $20,000 bug bounty after ‘sloppy’ breach – BBC News

Image copyright Getty Images A company which helps big businesses uncover security holes in their platforms has itself been hacked.HackerOne, which pays hackers who find bugs in products, services and websites for the likes of Uber and Goldman Sachs, was breached by one of its own community members. The vulnerability was exposed by a user…

HOT NEWS

Skip to toolbar