eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

217
active users

#cryptographic

0 posts0 participants0 posts today
PrivacyDigest<p><a href="https://mas.to/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> provides no <a href="https://mas.to/tags/cryptographic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptographic</span></a> management for group messages <br><a href="https://mas.to/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://mas.to/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p><p><a href="https://arstechnica.com/security/2025/05/whatsapp-provides-no-cryptographic-management-for-group-messages/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">05/whatsapp-provides-no-cryptographic-management-for-group-messages/</span></a></p>
George Ellenburg (he/him/his)<p>Did you know that <a href="https://bofh.social/tags/GNU" rel="nofollow noopener noreferrer" target="_blank">#GNU</a>/ <a href="https://bofh.social/tags/FSF" rel="nofollow noopener noreferrer" target="_blank">#FSF</a> has its own <a href="https://bofh.social/tags/darknet" rel="nofollow noopener noreferrer" target="_blank">#darknet</a> application and protocol stack?</p><blockquote>What is <a href="https://bofh.social/tags/GNUnet" rel="nofollow noopener noreferrer" target="_blank">#GNUnet</a><span>?<br><br>GNUnet is an </span><a href="https://bofh.social/tags/alternative" rel="nofollow noopener noreferrer" target="_blank">#alternative</a> <a href="https://bofh.social/tags/network" rel="nofollow noopener noreferrer" target="_blank">#network</a> stack for building <a href="https://bofh.social/tags/secure" rel="nofollow noopener noreferrer" target="_blank">#secure</a>, <a href="https://bofh.social/tags/decentralized" rel="nofollow noopener noreferrer" target="_blank">#decentralized</a> and <a href="https://bofh.social/tags/privacy-preserving" rel="nofollow noopener noreferrer" target="_blank">#privacy-preserving</a> <a href="https://bofh.social/tags/distributed" rel="nofollow noopener noreferrer" target="_blank">#distributed</a> applications. Our goal is to replace the old insecure Internet protocol stack. Starting from an application for secure <a href="https://bofh.social/tags/publication" rel="nofollow noopener noreferrer" target="_blank">#publication</a> of <a href="https://bofh.social/tags/files" rel="nofollow noopener noreferrer" target="_blank">#files</a><span>, it has grown to include all kinds of basic protocol components and applications towards the creation of a GNU internet.<br><br>Today, the actual use and thus the social requirements for a global network differs widely from those goals of 1970. While the Internet remains suitable for military use, where the network equipment is operated by a command hierarchy and when necessary isolated from the rest of the world, the situation is less tenable for civil society.<br><br>Due to fundamental Internet design choices, Internet traffic can be misdirected, intercepted, censored and manipulated by hostile routers on the network. And indeed, the modern Internet has evolved exactly to the point where, as Matthew Green put it, "the network is hostile".<br><br>We believe liberal societies need a </span><a href="https://bofh.social/tags/network" rel="nofollow noopener noreferrer" target="_blank">#network</a> <a href="https://bofh.social/tags/architecture" rel="nofollow noopener noreferrer" target="_blank">#architecture</a> that uses the <a href="https://bofh.social/tags/anti-authoritarian" rel="nofollow noopener noreferrer" target="_blank">#anti-authoritarian</a> <a href="https://bofh.social/tags/decentralized" rel="nofollow noopener noreferrer" target="_blank">#decentralized</a> <a href="https://bofh.social/tags/peer-to-peer" rel="nofollow noopener noreferrer" target="_blank">#peer-to-peer</a> paradigm and <a href="https://bofh.social/tags/privacy-preserving" rel="nofollow noopener noreferrer" target="_blank">#privacy-preserving</a> <a href="https://bofh.social/tags/cryptographic" rel="nofollow noopener noreferrer" target="_blank">#cryptographic</a> <a href="https://bofh.social/tags/protocols" rel="nofollow noopener noreferrer" target="_blank">#protocols</a>. The goal of the GNUnet project is to provide a Free Software realization of this ideal. </blockquote><a href="https://www.gnunet.org/en/index.html" rel="nofollow noopener noreferrer" target="_blank">https://www.gnunet.org/en/index.html</a><p></p>
Dyne.org foundation<p>𝗗𝘆𝗻𝗲 💜 𝗦𝗽𝗵𝗶𝗻𝘅</p><p>SPHINX is a simple, elegant, &amp; unconditionally secure zero-trust password manager. It stores a random numbers, not your password, ensuring the server knows nothing. Free, offline-bruteforce resistant, self-hostable, and extensible.</p><p>Built on a well-studied <a href="https://toot.community/tags/cryptographic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptographic</span></a> algorithm by respected experts, SPHINX brings password management into the 21st century. </p><p>𝗜𝗻 𝗳𝗮𝗰𝘁 𝘄𝗲 𝗹𝗼𝘃𝗲 𝗶𝘁 𝘀𝗼 𝗺𝘂𝗰𝗵 𝘁𝗵𝗮𝘁 𝘄𝗲 𝗮𝗿𝗲 𝗵𝗼𝘀𝘁𝗶𝗻𝗴 𝗮 𝗽𝘂𝗯𝗹𝗶𝗰 𝘀𝗲𝗿𝘃𝗲𝗿!</p><p>🔗 <a href="https://sphinx.pm/servers.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sphinx.pm/servers.html</span><span class="invisible"></span></a></p><p><a href="https://toot.community/tags/PasswordSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswordSecurity</span></a></p>
Dyne.org foundation<p>But cryptography is hard. Until recently, institutions and individuals who need to run <a href="https://toot.community/tags/cryptographic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptographic</span></a> operations had to rely on specialists to review the code that their applications is running. Cryptography can protect our privacy and authenticate sources of important information. For <a href="https://toot.community/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> to work for the people, the people need to understand it.</p>
Delta Chat<p>The <a href="https://chaos.social/tags/chatmail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chatmail</span></a> <a href="https://chaos.social/tags/fosdem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fosdem</span></a> talk from <span class="h-card" translate="no"><a href="https://chaos.social/@compl4xx" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>compl4xx</span></a></span> is public. It goes into topics such as </p><p>- why chatmail servers?<br>- how to setup a server with your child<br>- (avoiding) spam filtering<br>- metadata and guaranteed end to end encryption in <a href="https://chaos.social/tags/deltachat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deltachat</span></a><br>- <a href="https://chaos.social/tags/cryptographic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptographic</span></a> <a href="https://chaos.social/tags/interoperability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>interoperability</span></a> for email message routing</p><p>Thanks to attendees for the great energy even if was the last talk on the day and also for questions and conversations afterwards!</p><p><a href="https://ftp.fau.de/fosdem/2025/k4601/fosdem-2025-5217-chatmail-server-networks-for-anonymous-end-to-end-encrypted-messaging.mp4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ftp.fau.de/fosdem/2025/k4601/f</span><span class="invisible">osdem-2025-5217-chatmail-server-networks-for-anonymous-end-to-end-encrypted-messaging.mp4</span></a></p>
h o ʍ l e t t<p>→ Chinese researchers break <a href="https://mamot.fr/tags/RSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RSA</span></a> encryption with a <a href="https://mamot.fr/tags/quantum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantum</span></a> computer<br><a href="https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/3562701/</span><span class="invisible">chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html</span></a></p><p>“In a potentially alarming development for global <a href="https://mamot.fr/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a>, Chinese researchers have unveiled a method […] to <a href="https://mamot.fr/tags/crack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crack</span></a> classic <a href="https://mamot.fr/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a>, potentially accelerating the timeline for when quantum computers could pose a real <a href="https://mamot.fr/tags/threat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threat</span></a> to widely used <a href="https://mamot.fr/tags/cryptographic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptographic</span></a> systems”</p><p>“data being encrypted today could be at risk if adversaries are stealing it with the intention of decrypting it in the future”</p>
Dag<p>The <a href="https://snabelen.no/tags/cryptographic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptographic</span></a> flaw, known as a side channel, resides in a small microcontroller used in a large number of other authentication devices, including smartcards used in banking, electronic passports, and the accessing of secure areas.<br><a href="https://snabelen.no/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <br><a href="https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2024/</span><span class="invisible">09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/YubiKeys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YubiKeys</span></a> Are a <a href="https://mas.to/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> Gold Standard—but They Can Be Cloned</p><p>Security researchers have discovered a <a href="https://mas.to/tags/cryptographic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptographic</span></a> flaw that leaves the <a href="https://mas.to/tags/YubiKey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YubiKey</span></a> 5 vulnerable to attack.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> </p><p><a href="https://www.wired.com/story/yubikey-vulnerability-cloning/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/yubikey-vulner</span><span class="invisible">ability-cloning/</span></a></p>