|
You are here |
blog.xot.nl | ||
| | | | |
www.benthamsgaze.org
|
|
| | | | | The MIKEY-SAKKE protocol is being promoted by the UK government as a better way to secure phone calls. The reality is that MIKEY-SAKKE is designed to offer minimal security while allowing undetectable mass surveillance, through the introduction a backdoor based around mandatory key-escrow. This weak | |
| | | | |
gjia.georgetown.edu
|
|
| | | | | Over the past decade, to strengthen its political alliances with countries such as Saudi Arabia and the UAE, Israel has turned to the NSO Group. | |
| | | | |
www.eff.org
|
|
| | | | | Apples new program for scanning images sent on iMessage steps back from the companys prior support for the privacy and security of encrypted messages. The program, initially limited to the United States, narrows the understanding of end-to-end encryption to allow for client-side scanning. While... | |
| | | | |
www.climatecodered.org
|
|
| | | The climate emergency requires actions at emergency speed for a rapid transition to a post-carbon, safe-climate future. | ||