Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#ENCRYPTION
Gennie Gebhart
jenuhhveev
I have been pleasantly surprised with Zoom's quick and decisive responses to security criticism recently, but after a feedback call they hosted this morning about their end-to-end encryption plan I
Read more
Portland OR Alerts
pdxalerts
On Encryption 1/12: In a time when citizens are demanding accountability & transparency from their local law enforcement, @portlandpolice have made the decision to shut the door on the media
Read more
the autist formerly known as tris
digital_commie
Okay folks. So I see a lot of misinformation about cybersecurity in activist communities, and today my organization had a major security leak. So, here are some basic recommendations that
Read more
Wilson Leung 梁允信 🇭🇰
WilsonLeungWS
With the growing int'l distrust towards China, and just as #Zoom was starting to become popular, this is probably the worst time for Zoom to be exposed as "mistakenly" routing
Read more
Pete Myers
pd_myers
[crypto]Update: I misinterpreted the EHR Data company update.A friend kindly pointed me to the video currently on the front of their website. At 18:00 the CTO explains they will store
Read more
Aaron Dinnage
AaronDinnage
The ACSC has just published a security guide for Web Conferencing in which they pose six important questions Australian organisations should consider. This thread is a Microsoft Teams perspective for
Read more
Robᵉʳᵗ Graham😷, provocateur
ErrataRob
This Zoom thing is a good time to discuss "threat models". Is Zoom "secure"? Well, that depends upon your threat model. In other words, secure against what, precisely? Two threat
Read more
echo_pbreyer@chaos.social
echo_pbreyer
Today 8.45 a.m. live debate in @Europarl_EN on EU plan to search all of our private messages +++ EU Commissioner @ylvajohansson will defend, @PiratKolaja (#Pirates) will attack +++ Watch the
Read more
Noah Williams
noahsbwilliams
The article’s assertion that end to end encryption is impossible for a group call is incorrect.All one has to do to facilitate this is to establish a symmetrical session key
Read more
vitalik.eth
VitalikButerin
Prediction:The megatrend in cryptography of the 2010s was elliptic curves, pairings and general purpose ZKPs/SNARKs.The megatrend of the 2020s will be (in addition to broad adoption of the above) lattices,
Read more
Jon Nichols
WvuAlphaSoldier
So, I went into quarantine with...the incorrect set of equipment. I got a Windows XP laptop running.It's been a fun machine to work with.It can't even get to the download
Read more
Cory Doctorow
doctorow
EARN IT is a bill that takes away online service providers' "safe harbor" (a rule that says that the company that provides your messenger app isn't liable if you use
Read more
Rory Solomon
rorys
For folks thinking about Land Acknowledgements & Zoom classes: we might talk with our classes about where we're all dispersed & that Zoom relies on servers at Equinix data centers
Read more
Thomas Rid
RidT
COVID-19 has created—and continues to create—awe-inspiring intelligence collection opportunities. Zoom would be a big part of that intelligence bonanza. Ex-NSA director Hayden revealed in 2016 how the US Air
Read more
Dan Okopnyi 🇺🇦
d1rtydan
1/Do you value your internet privacy?The government is trying to pass the "Earn IT act" which would essentially provide a backdoor to all encrypted data & make hosting platforms responsible
Read more
منير
thearabcynic
Vassar's latest email on Zoom should not be seen a response to an incident but a cover-up to mask Vassar's negligence when it comes to handling the data of students
Read more
‹
1
2
3
4
5
6
7
8
...
13
14
›