Quantum computing poses a future threat to current cryptographic systems, particularly public-key cryptography. Experts estimate that large-scale quantum computers capable of breaking current encryption could emerge within 10-30 years. Organizations are already developing quantum-resistant cryptographic algorithms to prepare for this transition.
#encryption
17 items
Zoom's privacy is theoretical because its centralized server architecture lets the company access user data. True privacy requires end-to-end encryption where only participants control the keys.
Companies should prepare for quantum computers that could break current encryption by adopting quantum-resistant algorithms and updating security protocols. Experts recommend starting migration planning now, as quantum threats may emerge within 5-10 years.
AES-128 encryption remains secure in a post-quantum computing world, contrary to common concerns. Research shows that quantum computers would not significantly weaken AES-128's security due to the algorithm's design and key size.
PhantomChat is a post-quantum messenger that uses Monero-style stealth addresses for enhanced privacy. The project implements quantum-resistant cryptography alongside anonymous communication features.
A VPN protects your internet traffic by encrypting data and hiding your IP address, preventing ISPs, hackers, and websites from tracking your online activities. It secures your connection on public Wi-Fi networks and helps bypass geo-restrictions by masking your location.
Eris is a lightweight desktop PGP workstation with a simple GUI for signing, verifying, encoding, and decoding text messages. It features encrypted storage and basic process protection for Windows and Linux, serving as an alternative to Kleopatra.
Locki v2 is a zero-knowledge text encryption tool that works inside any web application. It allows users to encrypt sensitive text before pasting it into web forms while maintaining end-to-end encryption.
The article explains how to create a bootable backup USB drive with full disk encryption on PopOS Linux. It covers using the Disks utility to format the drive with LUKS encryption, creating an ext4 filesystem, and using the PopOS recovery partition to make a bootable backup that can restore the system.
Twitter's encrypted direct messages have multiple security weaknesses, including reliance on Twitter's servers for key distribution and lack of forward secrecy. The feature was developed by only two engineers who are no longer at the company, and none of its limitations have been addressed since launch nearly two years ago.
Twitter's new encrypted DMs still have significant security flaws. The system uses a 4-digit PIN that can be brute-forced, allowing Twitter to potentially access private keys. Additionally, Twitter can intercept messages by providing false public keys and has full access to metadata.
Elon Musk's X Chat claims full encryption but lacks remote attestation, allowing potential key interception. The service uses Juicebox protocol with HSM-backed key storage, but API calls could be manipulated to return different keys. Without proper verification mechanisms, messages could be decrypted by someone with system access.
Cindy Cohn's memoir "Privacy's Defender" chronicles her decades-long career at the Electronic Frontier Foundation, including her pivotal role in the Bernstein case that established code as protected speech. The book details her legal battles for digital rights, privacy protections, and human rights work from encryption fights to post-9/11 surveillance challenges.
The article explains how to manage secrets on NixOS using sops-nix, which encrypts secrets at rest for secure sharing in Git repositories. It details setup steps including deriving age identities from SSH keys, configuring sops, and integrating with NixOS to make decrypted secrets available at runtime.
The article describes a method for remotely unlocking an encrypted hard disk using systemd services in the initramfs. It explains how this approach enables secure remote access to encrypted systems without physical presence.
This guide provides detailed instructions for installing Void Linux on a ZFS filesystem with hibernation support. It covers disk partitioning, ZFS pool creation with encryption, setting up a separate encrypted swap partition for hibernation, and configuring ZFSBootMenu for boot management. The process includes both command-line setup and optional desktop environment installation.
Arjun Khemani discusses Zcash architecture with Sean Bowe and Dev, covering topics including AI surveillance, encrypted money scaling, compliant privacy contradictions, and quantum recoverability. The conversation explores technical solutions like PIR for scaling Zcash and outlines the cryptocurrency's roadmap.