5 links
tagged with encryption
Click any tag below to further narrow down your results
Links
The article introduces Fibre, a service that allows users to securely upload documents directly to their cloud storage through platforms like Intercom, Crisp, or Zendesk. This solution eliminates the hassle of managing files via email and offers features such as end-to-end encryption and the ability to handle large file sizes up to 100 GB.
The article features a discussion between Filippo Valsorda and Neil Madden regarding the design of the age encryption tool, focusing on the differences in their views on authenticated encryption and security guarantees. Valsorda emphasizes age's purpose as a confidentiality tool without sender authentication, while Madden provides a detailed response addressing various points raised about the design and implementation of age.
Meredith Whittaker discusses the surprising reaction of people learning that Signal operates partly on AWS, emphasizing the importance of encryption that ensures user communications remain private and inaccessible to anyone, including AWS and Signal itself. She expresses concern over the public's lack of understanding regarding this aspect of Signal's infrastructure.
The article discusses a comprehensive study revealing that a significant amount of sensitive data is being transmitted unencrypted via geostationary satellites. This includes internal corporate communications, military data, and personal information, all of which can be intercepted using consumer-grade hardware. The study emphasizes the need for encryption in satellite communications to protect against vulnerabilities.
The article discusses a recent experience of using free WiFi for messaging on British Airways flights, revealing how the airline's system allows access to certain messaging apps while blocking others. It explores the technical aspects of how the WiFi system detects and limits usage based on the domains accessed during the TLS handshake, particularly focusing on the implications of SNI (Server Name Indication) in revealing connected domains. The author experiments with various configurations to understand the underlying mechanisms of the WiFi restrictions.