hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

9K
active users

#e2ee

9 posts9 participants0 posts today
Replied in thread

@movim @dominik

Note, that #OMEMO has been taken directly from Signal, only adapted for #XMPP.

Most modern #Jabber clients default to OMEMO for one-to-one conversations nowadays. For private groups, I believe, users still have to enable it explicitely.

I'm not aware of any public Jabber server that would still accept non-TLS connections, so you have both transport #encryption and #e2ee.

Les CHATONS sont sympas mais si vous cherchez où héberger vos données en Europe, n'oubliez pas que tous les États membres de l'UE ne sont pas égaux en matière de loi sur la divulgation des clés de chiffrement.

Voir la page **Key Disclosure Law** sur Wikipedia[1] - la législation qui exige que les individus remettent les clés cryptographiques aux autorités.

Top pick :
- Allemagne
- Islande
- Belgique (avec réserve)
- Suisse (et encore)

[1] : en.wikipedia.org/wiki/Key_disc

en.wikipedia.orgKey disclosure law - Wikipedia

If you're using Linux, and you're looking to set up encrypted network-accessible storage, I have a blog post describing how to do that using rclone.

michael.kjorling.se/blog/2024/

You can use this with any storage backend that rclone supports, which is *many*:

rclone.org/#providers

Note that you'll need to have rclone on any system you want to access your files from.

Not sure if this qualifies as a QT or addendum to social.circl.lu/@quinn/1143372

Michael Kjörling · Setting up encrypted remote storage on Linux using rclone

New Privacy Guides article 🔐✊
by me:

Encryption Is Not a Crime

The war against encryption isn't new, but the quantity of data about us that needs protection is.

Despite the senseless attacks,
it is vital that we fight back to protect the right to using end-to-end encryption.

Encryption protects us all: privacyguides.org/articles/202

www.privacyguides.org · Encryption Is Not a Crime
More from Em :official_verified:
Replied in thread

@LukaszOlejnik
Part of the proposed changes relates to how orgs are classified and governed under the existing surveillance law.
In the proposed revision, smaller Digital Service Providers such as Threema and Proton would be subjected to similar surveillance rules (and deadlines) as the bigger ISPs today.

They are against it, fearing (rightly) that it would impose significant costs on them, to handle authorities' requests and develop/deploy/maintain a surveillance infrastructure comparable to that already in place at bigger companies and ISPs such as Swisscom, Salt, etc.

The other change of the proposition, is the access of (near) real time metadata.

On the positive side, e2ee and message contents are explicitly excluded from the surveillance.

I'm curious to see what the final proposition will look like regarding the SMEs.

Sigh. We are, as a security community, making good progress on some old as well as some new topics. #Rust, #Go, and other memory safe systems languages are going well and having a real impact in reducing memory safety issues - which has been the most important security bug class for decades, and we are finally improving! Compartmentalization and isolation of processes and services have now become common knowledge and the minimum bar for new designs. Security and privacy by design are being honored in many new projects, and not just as lip service, but because the involved developers deeply believe in these principles nowadays. #E2EE is finally available to most end-users, both for messaging and backups.

And again and again, we are forced into having discussions (theregister.com/2025/04/03/eu_) about breaking all the progress.

Let me be clear for Nth time:
* We *cannot* build encryption systems that can only be broken by the "good guys". If they are not completely secure, foreign enemy states, organized crime, and intimate partners will break and abuse them as well. There is no halfway in this technology. Either it is secure or it isn't - for and against everybody.
* We *cannot* build safe, government-controlled censorship filters into our global messaging apps that are not totally broken under the assumption of (current or future) bad government policies and/or insider attacks at the technology providers (mayrhofer.eu.org/talk/insider-). Either one-to-one communication remains secure and private, or it doesn't (ins.jku.at/chatcontrol/).
* We *cannot* allow exploitation of open security vulnerabilities in smartphones or other devices for law enforcement. If they are not closed, they are exploitable by everybody. "Nobody but us" is an illusion, and makes everybody less secure.

My latest recorded public talk on the topic was mayrhofer.eu.org/talk/secure-m, and nothing factual has changed since then. Policymakers keep asking for a different technological reality than the one we live in, and that sort of thing doesn't tend to produce good, sustainable outcomes.

(Edited to only fix a typo. No content changes.)

CC @epicenter_works @edri @suka_hiroaki @heisec @matthew_d_green @ilumium

The Register · EU: These are scary times – let's backdoor encryption!By Iain Thomson