Click any tag below to further narrow down your results
Links
Okara offers a private AI chat service that uses over 20 open-source models while ensuring user data remains secure and encrypted. It allows seamless switching between models without losing context, making it ideal for professionals who prioritize privacy in their work.
Mojo-V adds privacy-oriented programming capabilities to the RISC-V architecture. It enables secure computation by using secret registers and encryption, significantly improving performance compared to fully homomorphic encryption. The extension integrates smoothly with existing RISC-V systems and offers tools for developers to start implementing secret computation.
The article discusses Howler, a voice messaging app that uses end-to-end encryption and AI for transcript cleanup. The author shares insights on maintaining user privacy while utilizing AI services by ensuring that no user identity is attached to the content processed. They highlight the importance of design choices that prioritize privacy without compromising functionality.
Microsoft provided the FBI with recovery keys to unlock laptops in a fraud case involving the Pandemic Unemployment Assistance program in Guam. This incident highlights the privacy risks of BitLocker, as recovery keys are stored in Microsoft's cloud and can be accessed by law enforcement. Experts warn about potential security issues if hackers compromise Microsoft's infrastructure.
The article discusses how to encrypt your Windows PC using BitLocker while avoiding storing recovery keys with Microsoft. It explains the upgrade requirements for Windows 11 Pro and provides step-by-step instructions for encrypting your disk and managing recovery keys securely.
Tor has replaced its old encryption algorithm with a new one called Counter Galois Onion (CGO) to enhance security and protect user anonymity. This upgrade addresses vulnerabilities in the previous system, including tagging attacks and weak forward secrecy, by implementing modern cryptographic techniques.
The article discusses Apple's withdrawal of Advanced Data Protection in the UK due to government regulations, which will limit users' data security. It urges users to move their data out of iCloud and suggests alternatives for secure storage. The author emphasizes the importance of end-to-end encryption and the implications of recent legal changes.
The Electronic Frontier Foundation is urging major tech companies to implement end-to-end encryption (E2EE) by default to enhance user privacy amid rising AI use. They argue that users should not have to opt in for security features that protect their data from third parties. The campaign highlights the urgency of these measures as AI complicates privacy concerns.
A class action lawsuit claims WhatsApp misrepresents its end-to-end encryption, alleging that user messages are accessible to Meta. The article discusses the implications of these allegations and the technical aspects of WhatsApp's encryption system.
Moxie Marlinspike, creator of Signal Messenger, is launching Confer, an open-source AI assistant designed to ensure user data remains private and unreadable by anyone except the account holders. Utilizing strong encryption and trusted execution environments, Confer aims to set a new standard for AI chatbots while maintaining user confidentiality and security.
LinkedIn's Revenue Attribution Report (RAR) has enhanced privacy and reduced network congestion by over 99% through the implementation of additive symmetric homomorphic encryption (ASHE). This new system enables secure queries on encrypted data without the need for row-level decryption, improving performance and maintaining robust privacy guardrails. As a result, advertisers can better measure the impact of their marketing campaigns while ensuring member data protection.
A Florida bill that aimed to require social media platforms to implement encryption backdoors for user accounts has been defeated. The proposal sparked significant debate over privacy concerns and the implications for user security. Lawmakers expressed differing views on the necessity and potential risks of such a mandate.
The UK government has decided to drop its demands for tech companies, including Apple, to provide encryption backdoors that would allow law enforcement access to encrypted communications. This move reflects a shift in the government's approach to balancing privacy and security in the digital age. The decision comes amid ongoing debates about the implications of encryption for public safety and privacy rights.
Proton offers a suite of secure online tools designed to protect user privacy, including encrypted email, cloud storage, and a password manager. Their services aim to provide users with control over their data and enhance online security. Explore features like Proton Mail, Proton Drive, and Proton VPN for a safer digital experience.
Germany has announced its opposition to the EU's controversial "Chat Control" regulations, which would require communication service providers to monitor user messages for child sexual abuse material, including encrypted communications. This decision significantly undermines the likelihood of the legislation passing, as Germany's large population is crucial for creating a blocking minority against the proposal. Activists and privacy advocates argue that the regulations would threaten online privacy and security.
GpgFrontend is a user-friendly, cross-platform open-source GUI for OpenPGP encryption that caters to both beginners and experts. It features one-click encryption, easy installation across various platforms, secure key transfer, and supports multiple algorithms, making it a versatile tool for maintaining privacy and security. Contributions to the project are encouraged, and users can dive into module development and translation efforts to enhance the application further.
The article discusses Twitter's new encrypted messaging feature, highlighting its potential impact on user privacy and communication security. It examines the challenges and implications of implementing encryption on a platform with a vast user base, as well as the broader context of encryption in social media.
Florida's proposed law mandates encryption backdoors for social media accounts, raising concerns among experts who label it as both dangerous and misguided. Critics argue that such measures undermine user security and privacy, potentially exposing sensitive information to malicious actors. The law has sparked a broader debate about the implications of government interventions in digital privacy.
A new federated learning scheme called FedEDS is proposed to enhance model training on data-heterogeneous edge devices while ensuring privacy through encrypted data sharing. This approach addresses issues related to network topology and data variability, accelerating convergence and improving model performance on decentralized systems. Experimental results demonstrate the effectiveness of FedEDS in optimizing training processes.
WhatsApp has introduced 'Private Processing,' a new opt-in feature that allows users to leverage advanced AI functionalities through privacy-focused cloud servers, ensuring user anonymity during data processing. The system employs robust encryption and third-party relays to protect user identities and data. As concerns over privacy persist, users can choose to disable the feature if they are uncomfortable with cloud processing.
1Password emphasizes the importance of security in AI integration, outlining key principles to ensure that AI tools are trustworthy and do not compromise user privacy. The principles include maintaining encryption, deterministic authorization, and auditability while ensuring that security is user-friendly and effective. The company is committed to creating secure AI experiences that prioritize privacy and transparency.
The article reviews the cryptographic techniques employed by the Signal messaging app, highlighting its commitment to user privacy and security. It delves into the specific algorithms and protocols that underpin Signal's encryption, emphasizing the importance of robust cryptography in protecting user communications. Additionally, it discusses potential vulnerabilities and the app's response to security challenges.