Em0nM4stodon, to privacy

Tiny Privacy Tip About Encryption News 🔒🎉

As end-to-end encryption becomes more popular (yay! :rainbowdance:​),

Celebrate yes,

But also remain skeptical about how this word is used and if this claim warrants your trust.

Do not trust blindly.

End-to-end encryption is a wonderful protection when well implemented. But not all apps that use end-to-end encryption are equals.

Verify that:

  1. The provider is trustworthy :blobcatthinkingglare:​​

  2. Trustworthy third-parties have verified and confirmed the provider's claims 🔍​

  3. Metadata is also encrypted and/or that, ideally, its collection is minimized :blobcatpeekaboo:​

  4. Solid security measures protect the data as well (For example, if your data is end-to-end encrypted from your password but your password is vulnerable then your data is vulnerable as well) 🛡️​

  5. Encryption is truly end-to-end, meaning only the sender and the receiver can access the data and nobody else ​:ablobcatpeek:​

Finally keep in mind that even if a service uses minimal encryption (for example one that still collects a lot of unencrypted metadata) it is still better than the same service using no content encryption at all,

BUT there are almost always much better services that offer truly complete and well implemented end-to-end encryption for their services.

Always favor the latter when you have a choice 🔒✨

unixjunk1e,

@Em0nM4stodon

Read the fine print (when possible)... Any sufficiently large tech company has had to, by necessity, build in the means of complying with various nation states' laws. And if it's a means in one country, its a means available elsewhere (if even non-retroactively), so pay attention to the 'policy' updates - the situation can change overnight. :-/

Em0nM4stodon, to privacy

The most dangerous
threat to privacy and to encryption is giving up.

Do not give up!

For yourself,
For your family,
For your friends,
For your communities,
And for the next generations,

Defend encryption.
Fight for our Digital Rights ✊✨



🎉

registrert,

@Em0nM4stodon

My secure lines will always be open to them, but I will not fight to help people who refuse to be helped. That's not helping, that's forcing.

My only wish is that they'll understand what they've done to the world before they pass.

koteisaev,
@koteisaev@mastodon.online avatar

@Em0nM4stodon Encryption itself is a thing that specific to virtual space. A way of mitigating some of effects of existing problems. But it does not solve the IRL or political or other offline problems per se.

Em0nM4stodon, to random

Come on 🎶

Let's talk about encryption, baby

Let's talk about public keys for you and me

Let's talk about all the good things

And the bad things that may be

Let's talk about encryption 🔒🎉

🎉

Em0nM4stodon, to random

Today is Global Encryption Day! 🔒✨

Today let’s talk about encryption 📢

Today let’s learn about encryption 📚

Today let’s celebrate strong encryption :ablobcatrainbow:

Today let’s fight to keep encryption ✊

Click on the hashtags below
to learn, to celebrate, and to
fight for encryption!👇

#GlobalEncryptionDay #Encryption #E2EE #RootForE2EE 🎉

SNerd,
@SNerd@lor.sh avatar

@Em0nM4stodon
Why wasn’t this message encrypted?🤔

lewiscowles1986,
@lewiscowles1986@phpc.social avatar

@Em0nM4stodon
I Had an idea, which, it turns out @joereddington built for embedding encrypted content in webpages

https://github.com/joereddington/PrivateInPublic/

pretty dope, would love to see people using and forking the concept.

Em0nM4stodon, to privacy

End-to-End Encryption is one of the greatest tool we have to keep people safe online.

Use it everywhere you can 🔒✨

#Privacy #Encryption #E2EE #RootForE2EE 🎉

elduvelle,
@elduvelle@neuromatch.social avatar

@Em0nM4stodon I wish was using it…

Em0nM4stodon,

@elduvelle Ah yes, my apologies for the abbreviation I should have been more explicit.

Indeed I do! Here I recommend two services in this mini-article, and I would also add to this the new Proton Drive service which is also excellent: https://controlaltdelete.technology/articles/easy-practical-privacy-tips-for-everyone.html#tip-cloud

Em0nM4stodon, to privacy

I am quite delighted with my new t-shirt!

Privacy is a Human Right 🔒
Encryption is not a crime ✊✨

🎉
EDIT: See t-shirt recipe below 👇

odr_k4tana,

@Em0nM4stodon "this t-shirt has nothing to hide" would be a good one, too imho

taureon,

@Em0nM4stodon Self-made drip

Em0nM4stodon, (edited ) to privacy

I just received this amazing sticker pack from Fight for the Future and I must say I am very pleased!

If you want one too,
you can order it here and support an amazing organization by doing so!👇✨
https://shop.fightforthefuture.org/products/fftf-sticker

Thanks @team ! ♥️

Privacy is a Human Right!
Encryption Keeps Us Safe! ✊🔒

#Privacy #Encryption #E2EE #RootForE2EE 🎉

carloshr,
@carloshr@lile.cl avatar

@Em0nM4stodon @team now i need them!

skymtf,

@Em0nM4stodon @team I am ordering these just kinda wish I had a way to play around with placement on my macbook. I am having to buy a ton of new stickers for my macbook anyway. Might mess around in Krita and see what I can do.

Em0nM4stodon, to random

Encryption

is

Protection 🔒

🎉

LMNOChris,

@Em0nM4stodon say it louder!

Em0nM4stodon, to random

Stop attributing
personal secrecy to malice.

Secrecy is boundary.

Secrecy is civility.

Secrecy is intimacy.

Secrecy is safety.

Secrecy is security.

Secrecy is privacy.

You do not need any reason to refuse sharing something personal.

And it’s okay to give a name that isn’t yours for your order at the coffee shop.

Only you can define your own comfort in sharing your personal information. And only you should 🔒✨

🎉

oggy,
@oggy@mamot.fr avatar

@Em0nM4stodon
honesty and secrecy are compatibles

joriki,

@Em0nM4stodon

new meme:

you have a stripper name

I have a coffee name

we are not the same

Em0nM4stodon, to random

Normalize using end-to-end encryption 🔒

Normalize using a VPN 🌐​

Normalize using Tor :tor:​✨

ch0ccyra1n,
@ch0ccyra1n@emeraldsocial.org avatar

@Em0nM4stodon
Tbh, I have severe doubts over VPNs as a tool for privacy specifically. It seems like Tor is just better for damn near any threat model

basisbit,
@basisbit@chaos.social avatar

@Em0nM4stodon We don't have a good protocol for E2EE video chat yet. All what is out there either is snake oil or it doesn't scale.

Em0nM4stodon, (edited ) to random

Them 👉 https://www.laquadrature.net/en/2023/06/05/criminalization-of-encryption-the-8-december-case/

“Do you use encrypted messaging (WhatsApp, Signal, Telegram, ProtonMail)? “

Me: Yes! Of course! Don’t you? 🤨

“For your personal data, do you use an encryption system? “

Me: Yes! Of course! Don’t you? 🤨

“Why do you use this kind of encryption and anonymization applications on the Internet?“

Me:

  1. Because Privacy is a Human Right 🔒✨
  2. To protect from thieves
  3. To protect from stalkers
  4. To protect from phishing
  5. To keep my personal data away from surveillance capitalism

Why don’t YOU want to protect yourself from that? 🤨

🎉

Em0nM4stodon, to random

“Why do you use Signal and all this Encryption!
Do you have anything to hide? 😡“

Yes! I do!

  • The color of my underwear
  • My friends’ cats photos
  • My failed gym class grades
  • My first attempt at "portrait"
  • The outcome of my last meal
  • The weird mole on my left toe
  • How much I cried watching Star Trek
  • How much cheese there is in my fridge
  • My failed knitting experiment
  • The horrible poem I just wrote
  • My bank card pin number
  • My social security number
  • My main password
  • The web search history for your birthday gift

Privacy is a Human Right! ✊

Not sharing publicly what you do not wish to share is your right! 🔒✨

🎉

t60n3,

@aut @Em0nM4stodon my response to that one is "Do you close the door to a public bathroom stall? Are you doing something 'wrong' behind a closed door? Or is privacy just a valid, human need?'

amberage,
@amberage@eldritch.cafe avatar

@Em0nM4stodon everyone has "something to hide":

Financial problems, illnesses, ridiculed hobbies, sexual preferences, the extent of their nicotine habit… and most importantly: other people's secrets.

It's not just about protecting your or my communications, it's that my emails give insight into the lives of my family, my partners, my friends, into my work, etc etc.

John Doe don't just have to consider whether he wants his private life protected, he also has to consider Aunt Mary's marital problems, Uncle Jack's alcoholism, Cousin Peter's erectal dysfunction, Grandma Anne's cancer, Cousin Jenny's dates, and his employer's internal crises.

He has to protect all that not only against overeager cops with no regard for civil rights, but also against data leaks and hackers.

How anyone who isn't a cop can attack encryption in good faith is beyond me.

Em0nM4stodon, to humanrights

I see this happening more and more often and I must say:

I LOVE IT when all my favorite organizations and companies are getting together to fight for privacy and democracy! I LOVE IT!

LET'S ALL FIGHT TOGETHER ✊🔒✨

Thank you: @eff @team @mozilla @citizenlab @torproject @Tutanota @protonmail @signalapp @threemaapp and all the others!

🎉

Em0nM4stodon, to random

Everyone has a
fundamental right to communicate without being observed by an undesired third-party.

This was the norm before. It needs to become the norm again.

Privacy is a Human Right.

End-to-end encryption enforces this right 🔒✨

#RootForE2EE #E2EE #Encryption #Privacy

droidboy,
@droidboy@social.cologne avatar

@Em0nM4stodon Where do you see this right in danger?

Em0nM4stodon,
Em0nM4stodon, to random

Sometimes criminals close the door when plotting crimes.

“We should ban doors!” 🚫🚪

Sometimes criminals hide weapons under their clothes.

“We should ban clothes!” 🚫👖

🙃

Do not fall for these misguided arguments.

Most of the time people use end-to-end encrypted apps to talk about the most mundane things.

Sometimes vulnerable people use end-to-end encryption to protect themselves and stay safe.

We should keep and cherish encryption.

We should demand it everywhere.

End-to-end encryption protects our human right to privacy and safety.

We must fight for it! ✊🔒

#RootForE2EE #E2EE #Encryption #Privacy

privacat,

@TCatInReality @patrizia @Em0nM4stodon You cannot simply have an 'only breaks for baddies' toggle for encryption. That is fundamentally not how things work. Once you break encryption to target criminals, we all become criminals.

Let's talk about the various client-side-based encryption backdoor proposals that are coming out (ChatControl, the EU CSAM proposals). Say one of these laws pass. If it's client-side (on your device), there is no way for Apple/Google/Samsung to only install the scanning tech on baddies phones (at least not preemptively, which is what the law requires). Alternatively, there's no meaningful and legal way for sites like Signal, WA, Threema to opt out. The opt-out is either a) break the law, or b) stop making the product available.

So the end result is, this affects everybody.

Client-side scanning works by alerting when something 'bad' is detected. The problem is, as we've seen from various other ML/AI ventures, detecting 'bad things' is actually really hard. For instance, how do you tell if two teenagers are just sexting one another via WA, versus a 26-year-old man grooming a 13-year-old boy? You can't. Both get flagged, and innocent lives are ruined. Even if nobody goes to jail (and they probably won't because cops and LE will absolutely be flooded with false positives), if I'm a mobile provider or Apple or Google, I'm gonna just kick those folks off my network because better safe than sorry.

Similarly, for awful stuff like CSAM, it's not as if devices will have all the awful photographs to check against stored on people's devices. Instead, they will store a hash, generated as part of a larger list of millions and millions of hashes. Except hashes can be for anything. Any photo, video or file can have a hash. And hash collissions are a very real thing. Again, lots of lives will be ruined not to get criminals, but because a machine got it wrong.

And let's not forget: Once you build in the technology and break encryption, it becomes a trivial thing to just create new lists. If you're President Xi in China, those hash lists include all the various images of Winnie the Pooh or the Tianemen Square photo. If you're Vladimir Putin, it's every image positively portraying Ukraine, or negatively portraying Russia. If you're Rick DeSantis, it's pictures of the rainbow flag, prominent gay people, or Disney.

I could keep going.

nazgul,

@TCatInReality @privacat @patrizia @Em0nM4stodon Encryption models have been cracked in the sense that if you throw enough power at it, you can crack a message or group of messages between two people.

That’s very different than having a back door where if that’s cracked or leaked, you can read all the messages every sent in the system by everyone.

The NSA tried to do what you suggest. They recommended a new encryption model for people to use, and researchers discovered that they had fine tuned it so that they could use a method they had discovered to crack it more easily. Once that info was out, anyone could use that method.

It’s math. You can’t hide something in an equation that only some people can use. You can’t make 2+2=5

The other option is to build a system where only law enforcement has access to a special key and trust that they’ll not misuse it and not lose it. But whose law enforcement? US?
China? North Korea? This has been tried too. It was called the Clipper chip. Nobody would buy or use it. Just like no other country would use encrypted systems if the US built back doors into them. They wouldn’t allow those systems to be used.

It’s not that nobody wants to do this. Cryptographers have spent their careers working on these things. There literally isn’t a way to do it securely. If the good guys can break the encryption, so can the bad:

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • khanakhh
  • mdbf
  • ethstaker
  • magazineikmin
  • GTA5RPClips
  • rosin
  • thenastyranch
  • Youngstown
  • InstantRegret
  • slotface
  • osvaldo12
  • kavyap
  • DreamBathrooms
  • JUstTest
  • Durango
  • everett
  • cisconetworking
  • normalnudes
  • tester
  • ngwrru68w68
  • cubers
  • modclub
  • tacticalgear
  • provamag3
  • Leos
  • anitta
  • lostlight
  • All magazines