eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

245
active users

#e2eencryption

0 posts0 participants0 posts today

#e2ee #e2eencryption

AMD: Microcode Signature Verification Vulnerability

"... security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside a VM) to load malicious microcode patches."

github.com/google/security-res

This is exactly the attack against which #confidentialcomputing should protect us

And it won't, when the attacker has access to ring0 of the hardware. Everywhere you don't run yourself.

GitHubAMD: Microcode Signature Verification Vulnerability### Summary Google Security Team has identified a security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside...
Replied in thread

@futurebird @ineiti

1/3

When my company's #DEI Director explained the concept & **mentioned** **why** they were sharing their personal pronouns I have had mine out there in my public profile, right now, not here. My pronouns would not put me at risk so it's not brave. I do it more in #allyship than anything else. I also use strong #e2eencryption whenever possible even for nonsensitive information.

It's part allyship, part aircover, part practice of being the person I choose to be.

-more-

"End-to-end encryption means that the information is scrambled in transit and only the sender and recipient can access it. Regular text messages (SMS messages) and voice calls are usually not encrypted, and can be intercepted in transit or stored on a carrier’s server for extended periods of time.

Email services such as Gmail and Outlook generally offer encryption in transit, which means they can be read on the companies’ servers and by the end users. Messages that are encrypted in transit can’t be nabbed from a telecom network in an accessible format, but they could be accessed through an email service provider or a law enforcement request to that company.

End-to-end encryption—the kind offered by services like WhatsApp and Signal—is considered the best bet for privacy, particularly when paired with the option to auto-delete messages after a set period of time, says Mullin."

inc.com/jennifer-conrad/why-yo

Inc · Why You Should Start Using Encrypted Communications—TodayA massive hack prompts a government official to encourage businesses to do a better job of protecting their communications.
Continued thread

Privacy: 2+ hrs into the hearing, protecting , & stopping are finally raised, thanks to S&D's Kaljurand. But Brunner's response pits safety against privacy - a common trope of the outgoing Commissioner.

What's more, despite an outright ask for him to commit to protecting , Brunner skirts the question. A silver lining? He compliments the Parliament's position on the , which rejected the Commission's mass surveillance and encryption-breaking plans

#CyberSecurity #Privacy #Discord #E2EE #E2EEncryption #SocialMedia: "Last year, we announced that we were experimenting with new encryption protocols and technologies for audio and video calls on Discord. After extensive experimenting, designing, developing, and auditing, we’re excited to announce Discord’s audio and video end-to-end encryption (“E2EE A/V” or “E2EE” for short), which we like to refer to as our DAVE protocol.

Discord is committed to protecting the privacy and data of the roughly 200 million people who use our platform every month. As we continue to be a place that helps our users deepen friendships around games and shared interests, we are thrilled to be launching more secure and private voice and video calls.

Today, we’ll start migrating voice and video in DMs, Group DMs, voice channels, and Go Live streams to use E2EE. You will be able to confirm when calls are end-to-end encrypted and perform verification of other members in those calls.

We’d like to explain why we’re bringing E2EE A/V to Discord, share our design and implementation goals, and provide a high-level technical overview of how the new protocol works."

discord.com/blog/meet-dave-e2e

discord.comMeet DAVE: Discord’s New End-to-End Encryption for Audio & VideoWe’re rolling out end-to-end encryption for voice and video calls! We’d like to share why we’re bringing E2EE A/V to Discord, share our design and implementation goals, and provide a high-level technical overview of how it works.

DeepSec 2024 Press Release: State Attacks on Information Security continue unabated. End-to-end Encryption remains an important and threatened Component of Security.

The introduction of strong encryption has repea

blog.deepsec.net/deepsec-2024-

DeepSec In-Depth Security Conference · DeepSec 2024 Press Release: State Attacks on Information Security continue unabated. End-to-end Encryption remains an important and threatened Component of Security.The introduction of strong encryption has repeatedly led to disputes with authorities and the government in the past. Whether it’s mobile networks, email systems, messengers or the World Wide Web, every iteration of the technical protocols requires backdoors that jeopardise the entire communications infrastructure. The DeepSec conference warns against opening the door to espionage. Secure or insecure, that is the Question Encryption inevitably has to do with mathematics, and the algorithms used in encryption technologies almost always originate from mathematical research. There are ready-made and well-tested components for IT infrastructures that are freely available. The critical point in securing communication is always to prevent messages from being intercepted. The only way to do this is with end-to-end encryption (EE2E). The keys involved remain exclusively with the sender and recipient. All parties involved in forwardingRead More