“In order to ensure the government is added to the conversation in secret, GCHQ’s proposal would require messaging apps, service providers, and operating systems to change their software so that it would 1) change the encryption schemes used, and/or 2) mislead users by suppressing the notifications that routinely appear when a new communicant joins a chat.”
Source : Apple and WhatsApp condemn GCHQ plans to eavesdrop on encrypted chats | UK news | The Guardian
“The inability of intelligence and law enforcement agencies to lawfully access encrypted data and communications poses challenges to law enforcement agencies’ efforts to protect our communities. Therefore, we agreed to the urgent need for law enforcement to gain targeted access to data, subject to strict safeguards, legal limitations, and respective domestic consultations”.
Source : Five Country Ministerial 2018
«One of the many advantages of having a robot run your organization is that it is immune to any outside influence as it’s guaranteed to execute only what it was programmed to. And because the Ethereum network is decentralized, you’ll be able to provide services with a 100% uptime guarantee».
Source : Ethereum Project
«When a ProtonMail user sends an expiring message to another ProtonMail user, it looks like a regular email in the inbox. After the message expires, it is automatically deleted from the inbox and the sender’s outbox. In Gmail’s current implementation, it sounds like Google simply generates an email with a link. The message behind the link disappears after a while, but not necessarily the intermediate email. It’s also worth noting that Google doesn’t mention end-to-end encryption anywhere. A “confidential” message doesn’t have to be encrypted. It’s likely that Google could still see the content of that message and comply with warrants».
Source : Google is testing self-destructing emails in new Gmail | TechCrunch
«IDEA is a series of nonverbal algorithm assembly instructions by Sándor P. Fekete, Sebastian Morr, and Sebastian Stiller. They were originally created for Sándor’s algorithms and datastructures lecture at TU Braunschweig, but we hope they will be useful in all sorts of context».
Source : PUBLIC KEY KRÜPTO
«Avec Gram, les utilisateurs de la messagerie cryptée pourraient ainsi contourner les frais de transfert lorsqu’ils envoient des fonds, s’affranchissant notamment des règles internationales. Grâce à la technologie de la blockchain les utilisateurs pourront déplacer des sommes d’argent en toute discrétion, grâce au cryptage de l’application».
Source : La messagerie Telegram prête à lancer sa propre cryptomonnaie
«’If you build a system where everything comes down to trusting the server, you might as well dispense with all the complexity and forget about end-to-end encryption,’ says Matthew Green, a cryptography professor at Johns Hopkins University who reviewed the Ruhr University researchers’ work. ‘It’s just a total screwup. There’s no excuse.’»
Source : WhatsApp Encryption Security Flaws Could Allow Snoops to Slide Into Group Chats | WIRED
«To put it mildly, this is a huge, huge problem,” Wray said. “It impacts investigations across the board — narcotics, human trafficking, counterterrorism, counterintelligence, gangs, organized crime, child exploitation. […] I get it, there’s a balance that needs to be struck between encryption and the importance of giving us the tools we need to keep the public safe» – Christopher Wray (FBI Director).
Source : FBI couldn’t access nearly 7K devices because of encryption
«I don’t need to understand how encryption works to understand how it’s helping – end-to-end encryption – the criminals. »I will engage with the security services to find the best way to combat that» – Amber Rudd (Home Secretary – United Kingdom).
Source : Amber Rudd accuses tech giants of ‘sneering’ at politicians – BBC News
« Forensic examination also disclosed that Doe [Rawls] had downloaded thousands of files known by their « hash » values to be child pornography. The files, however, were not on the Mac Pro, but instead had been stored on the encrypted external hard drives. Accordingly, the files themselves could not be accessed ».
Source : Man jailed indefinitely for refusing to decrypt hard drives loses appeal | Ars Technica