veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

295
active users

#E2EEncryption

0 posts0 participants0 posts today
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/QXmpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QXmpp</span></a> 1.10.3 has been released (<a href="https://mastodon.social/tags/XMPP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XMPP</span></a> / <a href="https://mastodon.social/tags/Jabber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jabber</span></a> / <a href="https://mastodon.social/tags/CPP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPP</span></a> / <a href="https://mastodon.social/tags/CPlusPlus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPlusPlus</span></a> / <a href="https://mastodon.social/tags/E2E" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2E</span></a> / <a href="https://mastodon.social/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a> / <a href="https://mastodon.social/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EndToEndEncryption</span></a> / <a href="https://mastodon.social/tags/E2EEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EEncryption</span></a> / <a href="https://mastodon.social/tags/XEP0384" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XEP0384</span></a> / <a href="https://mastodon.social/tags/OMEMO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OMEMO</span></a> / <a href="https://mastodon.social/tags/SCRAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SCRAM</span></a> / <a href="https://mastodon.social/tags/SCRAMSASL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SCRAMSASL</span></a>) <a href="https://github.com/qxmpp-project/qxmpp" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/qxmpp-project/qxmpp</span><span class="invisible"></span></a></p>
Thomas Fricke (he/him)<p><a href="https://23.social/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://23.social/tags/e2eencryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2eencryption</span></a> </p><p>AMD: Microcode Signature Verification Vulnerability</p><p>"... security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside a VM) to load malicious microcode patches."</p><p><a href="https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/google/security-res</span><span class="invisible">earch/security/advisories/GHSA-4xq7-4mgh-gp6w</span></a></p><p>This is exactly the attack against which <a href="https://23.social/tags/confidentialcomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>confidentialcomputing</span></a> should protect us</p><p>And it won't, when the attacker has access to ring0 of the hardware. Everywhere you don't run yourself.</p><p><a href="https://23.social/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a></p>
EDRi<p>Privacy: 2+ hrs into the hearing, protecting <a href="https://eupolicy.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a>, <a href="https://eupolicy.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> &amp; stopping <a href="https://eupolicy.social/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a> are finally raised, thanks to S&amp;D's Kaljurand. But Brunner's response pits safety against privacy - a common trope of the outgoing Commissioner.</p><p>What's more, despite an outright ask for him to commit to protecting <a href="https://eupolicy.social/tags/E2EEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EEncryption</span></a>, Brunner skirts the question. A silver lining? He compliments the Parliament's position on the <a href="https://eupolicy.social/tags/CSAReg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSAReg</span></a>, which rejected the Commission's mass surveillance and encryption-breaking plans</p>
Eskalator :fckafd: :tux:<p><span class="h-card"><a href="https://troet.cafe/@3fachverglast" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>3fachverglast</span></a></span> <br>Das wäre technisch gesehen ziemlich sicher eine Katastrophe.</p><p>Es nützt ja nichts, wenn sichere <a href="https://troet.cafe/tags/messenger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>messenger</span></a> wie <a href="https://troet.cafe/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> oder <a href="https://troet.cafe/tags/Threema" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Threema</span></a> ihre bisher vertrauenswürdige <a href="https://troet.cafe/tags/Vetschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vetschlüsselung</span></a> auf brechen müssen damit <a href="https://troet.cafe/tags/whatsapp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whatsapp</span></a> den Klartext bekommt und neu verschlüsselt.</p><p>Dann hat WhatsApp wieder jede Nachricht im Klartext (wäre ja noch schlechter als direkt von WA zu WA zu schreiben).</p><p>Das ist dann eben keine <a href="https://troet.cafe/tags/e2eencryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2eencryption</span></a> mehr, sondern Homöopathie...</p>
Threema<p>You can hide everything from us. <a href="https://mastodon.social/tags/Anonymity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anonymity</span></a> <a href="https://mastodon.social/tags/E2EEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EEncryption</span></a></p><p>We don’t hide anything from you. <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/TransparencyReport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TransparencyReport</span></a></p><p>That’s a healthy service–user relationship.</p>
narF 😵✌️<p>This system should be an open standard, so that all existing contact book apps could implement it. Kinda like an updated version of CardDAV (<a href="https://en.wikipedia.org/wiki/CardDAV" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">en.wikipedia.org/wiki/CardDAV</span><span class="invisible"></span></a>).</p><p>And ideally, all of that would be end-to-end encrypted, so that only your friends get to see your personal data. The host where you store your profile and your friends hosts should not be able to read your contact info!</p><p><a href="https://mstdn.ca/tags/CardDAV" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CardDAV</span></a> <a href="https://mstdn.ca/tags/openStandard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openStandard</span></a> <a href="https://mstdn.ca/tags/FederatedIdentity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FederatedIdentity</span></a> <a href="https://mstdn.ca/tags/FederatedContactApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FederatedContactApp</span></a> <a href="https://mstdn.ca/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a> <a href="https://mstdn.ca/tags/E2EEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EEncryption</span></a> <a href="https://mstdn.ca/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://mstdn.ca/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>