"While the UK government adopted powers that could allow the private messages of everyone in the UK to be scanned, it did concede that this could not be put into practice without jeopardizing people’s security and privacy.
ORG has called for Ofcom to publish regulations that make clear that there is no available technology that can allow for scanning of user data to co-exist with strong #encryption and #privacy.“
Proton Mail automatically encrypts/decrypts messages between Proton Mail accounts via OpenPGP/PGP.
Proton Mail supports automatically encrypting/decrypting messages between Proton Mail accounts and external email accounts that support OpenPGP/PGP or GnuPG/GPG.
@protonprivacy@blueghost (can be) true, buuut, theres one thing wich mess people up - many takes writing from/to proton mail users as something wich will be encrypted "by default" without any knowledge of how pgp keys works + it just about trust that proton does not read messages when storing secret key themselves...
@iuvi@blueghost Note that Proton Mail servers don't hold your private master key directly — it is always stored encrypted with your account password. And we don't have access to your account password.
@afterdawn Sota-ajalla olen tästä eri mieltä. Voi olla aika haitallista, että vihollinen voi viestitellä meidän omalla infralla ilman että omilla joukoilla on mitään mahdollisuutta päästä väliin.
@vegai@afterdawn Juuri sota-ajan keskellä on tärkeää säilyttää salauskyky tavallisilla kansalaisilla, koska muuten ne joutuvat myös vieraiden valtioiden kohteeksi.
🇬🇧 To enable #ChatControl mass surveillance, 32 European police chiefs call for halting end-to-end encryption #E2EE. This is an attack on our security and digital privacy in violation of fundamental rights!
🇩🇪 Um #Chatkontrolle zu ermöglichen fordern 32 Europäische Polizeichefs (wohl auch das #BKA) Ende-zu-Ende-Verschlüsselungsstopp. Das ist ein grundrechtswidriger Angriff auf unsere Sicherheit und das digitale Briefgeheimnis! #E2EE
@echo_pbreyer die Menschheit ist erst dann Reif für "die Digitalisierung", wenn sich all unsere Befürchtungen bewahrheitet und so als berechtigt herausgestellt haben.
In diesem Sinne möchte ich den Lauf der Geschichte fast gerne beschleunigen, damit die sich die Erkenntnis endlich großflächig durchsetzt. Leider sind die Kollateralschäden erheblich.
Politische Überwachungsphantasien, die mit dem Vorwand gerechtfertigt werden, "schlimmste Verbrechen wie den sexuellen Missbrauch von Kindern zu bekämpfen", sind unerträglich.
Wer wirklich etwas für Kinder tun will, engagiert sich im Kampf gegen den Klimawandel, für sichere Schul- und Radwege, für Bildung, gewaltfreie Familien, Chancengleichheit und freie Entfaltungsmöglichkeiten.
@kuketzblog Uuund Präventionsarbeit! Kinder stark machen und ihnen ein Standing geben, dass sie sich gegen Täter:innen wehren können und Personen aus dem Umfeld der Kinder Aufklären. Aufklärung ist das A und O!
Auch beim Datenschutz...
🇬🇧 New #leak on #ChatControl: Privacy-friendly and #E2EE encrypted messaging services are to be penalised with chat control bulk scanning orders. They want to turn the safest services into the most monitored ones!
@echo_pbreyer If they truly pull this off we should all be advocating apps like DeltaChat (f-droid.org/en/packages/com.b4…), an E2E encrypted chat app that utilizes GPG encrypted emails in a user-friendly fashion.
And best of all the whole "walled garden messaging service" deal would be a thing of the past - all a participant ever needs is ANY single email provider and the DeltaChat app.
Wonder how they'll try to ruin a decades old backbone internet service like the MTA protocol?
@Morishima@protonprivacy Thanks for recommending our private email service. We're here to fight mass surveillance with technology; happy that you are joining this fight! 💪 Together we can build a better web. 😍 🔒
When will the two largest providers of secure encrypted email make it the default for messages sent between them to be securely encrypted? If even they can't manage it what hope is there for the rest of the email world?
Can anymany tell me how I'm "supposed" to use end-to-end encryption with XMPP?
As far as I can tell there are three totally different ways to do E2EE:
a)OTR : "[https://xmpp.org/extensions/xep-0364.html](Not intended to be a current standard), or technical specification, as better (albeit, newer and less well tested) methods of end-to-end encryption exist for XMPP. "
b)OpenPGP: There are at least two different XEPs about it. XEP-0027 is obsolete, while XEP-0373 is "experimental" but hasn't been updated in almost three years.
c)OMEMO: "Experimental" and hasn't been updated in over two years.
Is there a way to do E2EE in XMPP which is neither deprecated nor experimental? What's the "Current stable" way to do it?
@alshafei@simplex the group fanout I mentioned earlier could also be done efficiently through arbitrarily long delivery paths.
Anyway, I've implemented a protocol to do all this, but SimpleX looks better. I hope more apps are written using it, and the protocol continues to be developed.
On groups, for most public, open-to-join groups e2e encryption is needed to protect participation, not content, so we don't need pairwise ratchets between members here - we're developing the new design based on super-peers that'll do broadcasting. e2e encryption between members can indeed be added later to that design.