A vital guide to the Canadian encryption debate

A significant information to the Canadian encryption debate

Canada’s two main digital rights teams, CIPPIC (previously) and Citizen Lab (previously) have issued a joint report known as Shining a Light on the Encryption Debate: A Canadian Field Guide , and each Candadian ought to learn it. The decades-old struggle over entry to working cryptography has reached a brand new world peak, […]

It's 2018, and Google just proposed an instant messaging tool with no encryption

It's 2018, and Google simply proposed an instantaneous messaging instrument with no encryption

It’s 2018, 5 years after Edward Snowden’s paperwork revealed the scope of US and allied mass surveillance; after a string of revelations about creepy private-sector cyber-arms-dealers who promote spying instruments to stalkers, criminals, and autocratic governments, Google has proposed “Chat,” a brand new Android customary for fast messaging with no encryption and therefore zero […]

You can unscramble the hashes of humanity's 5 billion email addresses in ten milliseconds for $0.0069

You can unscramble the hashes of humanity's 5 billion e-mail addresses in ten milliseconds for $zero.0069

Marketing corporations often “anonymize” their dossiers on web customers utilizing hashes of their e-mail addresses — fairly than the e-mail addresses themselves — as identifiers in databases which are saved indefinitely, traded, bought, and leaked. Cryptographically safe hashing converts any file to a brief string (its “hash”), and it is theoretically inconceivable to […]

Even if governments backdoor crypto, they still won't be able to spy on terrorists

Even if governments backdoor crypto, they nonetheless gained't be capable of spy on terrorists

In a paper printed by the International Association for Cryptologic Research, a bunch of Harvard and MIT cryptographers display that even when the federal government had been to backdoor encryption and lock up anybody who used non-backdoored techniques, individuals may nonetheless conceal undetectable, safe, non-public messages throughout the messages despatched over the compromised techniques. […]