recentpopularlog in

encryption

« earlier   
Internet protocols are changing | APNIC Blog
Lots of major protocol changes, many from Google, and mandating encryption.
internet  networking  protocol  http2  encryption  dns 
3 days ago by emk
Internet protocols are changing | APNIC Blog
Now, significant changes to the core Internet protocols are underway. While they are intended to be compatible with the Internet at large (since they won’t get adoption otherwise), they might be disruptive to those who have taken liberties with undocumented aspects of protocols or made an assumption that things won’t change.
dns  encryption  http  tls  internet 
3 days ago by whip_lash
DPAPIck
This is a forensic tool to deal, in an offline way, with Microsoft Windows protected data, using the DPAPI (Data Protection API).
windows  encryption  dotnet 
3 days ago by andyhuey
Internet protocols are changing
per @mnot. HTTP/2; TLS 1.3; QUIC and UDP; and DOH (DNS over HTTP!)
crypto  encryption  http  https  protocols  http2  tls  quic  udp  tcp  dns  tunnelling 
3 days ago by jm
Security Planner
Improve your online safety with advice from experts

*** pass this on ***
encryption  security  privacy  guide 
3 days ago by tiredoldfellow
Internet protocols are changing | APNIC Blog
“encryption is one of best tools we have to ensure that protocols can evolve”
encryption  protocols  http  tls 
3 days ago by jhealy
Encryption Workarounds by Orin Kerr, Bruce Schneier :: SSRN
The widespread use of encryption has triggered a new step in many criminal investigations: the encryption workaround. We define an encryption workaround as any lawful government effort to reveal an unencrypted version of a target’s data that has been concealed by encryption. This essay provides an overview of encryption workarounds. It begins with a taxonomy of the different ways investigators might try to bypass encryption schemes. We classify six kinds of workarounds: find the key, guess the key, compel the key, exploit a flaw in the encryption software, access plaintext while the device is in use, and locate another plaintext copy. For each approach, we consider the practical, technological, and legal hurdles raised by its use.

The remainder of the essay develops lessons about encryption workarounds and the broader public debate about encryption in criminal investigations. First, encryption workarounds are inherently probabilistic. None work every time, and none can be categorically ruled out every time. Second, the different resources required for different workarounds will have significant distributional effects on law enforcement. Some techniques are inexpensive and can be used often by many law enforcement agencies; some are sophisticated or expensive and likely to be used rarely and only by a few. Third, the scope of legal authority to compel third-party assistance will be a continuing challenge. And fourth, the law governing encryption workarounds remains uncertain and underdeveloped. Whether encryption will be a game-changer or a speed bump depends on both technological change and the resolution of important legal questions that currently remain unanswered.
encryption  going_dark  5th_Amendment  4th_Amendment  cybercrime 
3 days ago by wck
Zbox - Zero-details, privacy-focused embeddable file system
A zero-details, privacy-focused embeddable file system. Its goal is to help application store files securely, privately and reliably. By encapsulating files and directories into an encrypted repository, it provides a virtual file system and exclusive access to authorised application.
filesystem  privacy  encryption  opensource  Rust  memory 
4 days ago by liqweed
Security Planner
Improve your online safety with tools for your needs. Answer a few simple questions to get personalized recommendations of free and open-source software. It's confidential -- no personal information is stored, and we won't access any of your online accounts.
security  privacy  encryption  citizenlab  guide  beginner 
4 days ago by e2b

Copy this bookmark:





to read