soc.octade.net is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
social@octade.net

Search results for tag #encryption

[?]Z er 0 ne m in pl us t w O » 🌐
@p01@exquisite.social

[?]Z er 0 ne m in pl us t w O » 🌐
@p01@exquisite.social

[?]Z er 0 ne m in pl us t w O » 🌐
@p01@exquisite.social

[?]Z er 0 ne m in pl us t w O » 🌐
@p01@exquisite.social

Z er gu id pl m in g u s t w

Co n sci o us l (wh) y

E m b e r

Dark

A s

H

E

S

G

Ow

L i gh t

M i n d i n g

W / i n h y p o t h e t i c a l s e l v e s

Alter n a t i n s p a r k i n i g n i t (w/) i n

G w i t h i n

S el f i

T a c

U r

A

L

L

Y

0 ne

T w o o c u r e

(S p a r k i n i g n i t w/ i n g)

    [?]Z er 0 ne m in pl us t w O » 🌐
    @p01@exquisite.social

    I n
    B
    E e
    Tw een

    Hypo the tic al
    W hat was and w ill be ac t u al

    B r id g e - n o w - c u r a t i n g Z e r al (Y) 0 (U) n e ☀️ 🌗 🌱
    .
    .
    🌓 🪷 🌗
    .
    .
    🧎‍♂️

      [?]Erik van Straten » 🌐
      @ErikvanStraten@todon.nl

      Als "the good guys" worden gehacked en informatie van nietsvermoedende niet-Amerikanen NIET ALLEEN in handen van de FBI valt: edition.cnn.com/2026/03/05/pol (mijn eerste bron: bleepingcomputer.com/news/secu).

      Nb. dit soort taps vinden plaats in het kader van de FISA (The Foreign Intelligence Surveillance Act) wetgeving waarin niet-Amerikanen nauwelijks rechten hebben. De FBI tapt zoveel mogelijk telecommunicatie van of naar de VS, maar hoogst waarschijnlijk ook verbindingen die geheel buiten de VS blijven.

      Dat is dezelfde wetgeving die straks (of nu al) voor DigiD en informatiesystemen van de Belastingdienst en Defensie geldt.

      Een surveillance maatschappij helpt ook the bad guys (dankzij gehackte camera's op straat wist de Mossad waar Khamenei zich bevond.

      Dit is precies waarom we geen ChatControl of achterdeurtjes in encryptie moeten willen!

      Stukje uit https://edition.cnn.com/2026/03/05/politics/fbi-investigating-cyber-breach-critical-surveillance-network

“The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond,” the bureau said in a statement to CNN on Thursday, declining to elaborate.

A source familiar with the investigation told CNN the cybersecurity incident is related to a digital system the bureau uses to manage wiretapping and foreign intelligence surveillance warrants as part of investigations.

      Alt...Stukje uit https://edition.cnn.com/2026/03/05/politics/fbi-investigating-cyber-breach-critical-surveillance-network “The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond,” the bureau said in a statement to CNN on Thursday, declining to elaborate. A source familiar with the investigation told CNN the cybersecurity incident is related to a digital system the bureau uses to manage wiretapping and foreign intelligence surveillance warrants as part of investigations.

        [?]knoppix » 🌐
        @knoppix95@mastodon.social

        EU Chat Control drops mandatory encryption-breaking scans — huge privacy win after years of resistance! 🎉

        But now pushes mandatory age verification across apps, risking anonymity while letting Big Tech "voluntarily" scan. Fight continues in trilogues. 🛡️

        🔗 tuta.com/blog/chat-control-cri

          [?]Z er 0 ne m in pl us t w O » 🌐
          @p01@exquisite.social

          H y
          W
          P
          0
          A
          N
          T i
          W n
          S c i o n
          P a re nt s yn t he s i s

          H y p 0 a n t i t w i n s c i o n t w o o p a r e n t s y n t h e s i s

          Two ti me s two steps aw a re t w o c o n scio (n) us l (wh) y Zer 0 ne

          (O ther) Tw in s hyp o ant i t w o o p a re nt s yn t he s i s

          (Ne) Hyp o t he tic al ant i syn, th re e

          O rig in ac t u a l

          T h e s i s

          Z er

          Y

          0

          U

          N e

            [?]Z er 0 ne m in pl us t w O » 🌐
            @p01@exquisite.social

            [?]Z er 0 ne m in pl us t w O » 🌐
            @p01@exquisite.social

            [?]Z er 0 ne m in pl us t w O » 🌐
            @p01@exquisite.social

            () The fee l in g of t a k in g ad vant age..I k now it well..n o t Y 0 u of me, me of Y 0 u, the ot he r way a round. F or re as on t he sa me..no any so me E ve r y t h in g t w o o ff er in re t u rn

            () for Eve r sha ring, o pen in g, fl 0 we r b l os so m un veil, re ve al, un f old in g- thank tr (Y 0) u l y!

            () How can there t o bliss in forms so m any and all (t o) O m u ch be? Let me an sw er t hat f or Y 0 u. T he r e cant. No matter how s harp t he co n tr as t..a ft er..or a round.

            How m any know it ex i sts in the first p l ace?

            How m any k now tr (y 0) u l ((wh) y in w h at direc t i on to go? (Tr y 0) u l y

            North star

            If it w e re not enough high, could it even ful fill it s p u r pose, to be 'seen', g u id ing m any w it h in Eve n t u al l y all?

            () True Y 0 (w/in) u s, t he r e is privilege re ward no high er...please continue to step into, exp lo re, nurtu re, moth er, un-leash

            覆 硫‍♂️

            () Its not the im age s t he m s elves..it s tw o within them the see d...too not Eve n the see d..the see d..full y.. embrace d..b i y 0 u..s low l (h) y way dance s wa y in g w it h in Zer 0 ne pl min - u s

              [?]Z er 0 ne m in pl us t w O » 🌐
              @p01@exquisite.social

              Ze
              R
              T
              H
              Es
              I s w
              Hyp anti sc i
              P a r e
              N t
              S
              Y
              0
              E

              Z e r

              T he s is (t) w (o)

              Hyp (o) ant i sci (o) (n) (s) p a re n t (he s i) s y n (t he s is) 0 n e

              A l l t w o o
              G e t
              He
              R
              0
              F
              U

                [?]TechNadu » 🌐
                @technadu@infosec.exchange

                Privacy infrastructure has historically prioritized neutrality — encrypted traffic flows without inspection.
                However, a new initiative involving ExpressVPN and the Internet Watch Foundation introduces a different architectural approach to restrict known CSAM domains.
                The mechanism relies on OpenBoundary, a DNS-level filtering technology designed to block only domains verified by IWF.
                Technical characteristics include:
                • DNS resolver-level domain verification
                • No deep packet inspection
                • No encryption termination
                • No traffic logging or user identification
                If a requested domain appears on the IWF verified list, the connection is dropped at the network boundary.

                The initiative - “Not on My Network” - is also encouraging adoption across the privacy infrastructure ecosystem, including CyberGhost VPN, Private Internet Access.
                For security engineers, this raises an important architectural question:
                Can network-level safeguards address exploitation risks without weakening encryption guarantees?

                Source: expressvpn.com/blog/not-on-my-

                Share your technical perspective in the comments.
                Follow us for more cybersecurity engineering insights and threat intelligence discussions.

                How we engineered a way to restrict child sexual abuse material without looking at your data

                Alt...How we engineered a way to restrict child sexual abuse material without looking at your data

                  [?]Z er 0 ne m in pl us t w O » 🌐
                  @p01@exquisite.social

                  [?]Z er 0 ne m in pl us t w O » 🌐
                  @p01@exquisite.social

                  S

                  He

                  R self

                  En f old w it h

                  In f re sh a new un fold in g

                  Z er f or m not yet ed 0 ne m u lt i pl y in g in f r ac t i on op po s i t es b i e i t h e r each (e) tw o t h e r O n e

                  Hypo the tic al pl min

                  Three syn

                  Anti

                  W

                  0

                  T

                  He

                  S i s

                  Ac t u al

                  S he r Elf it Zer 0 ne

                  F 0 u r, sixteen, sixty f 0 u rth and so no t

                  Qu i t e Fibonacci logic but abs tract pr in c ip le ana logo appl (wh) Zer y in p a rt ic u l ar (t) 0 n e - yan g - u s

                  Pr o c es s g a in in g aw a re ness l oo p ro un d c irc l e lf (wh) y

                  Cl in g (y) 0 u r s elves t w/ in

                  P a (s) r e n t (s)

                  S c i o

                  (N)

                  Ze

                  R

                  0

                  Ne

                  Pl God

                  Dess - (Y 0 w/in) u s

                  S o u r c e i l l u s t r a t i o n : I n t e r n e t

                  A visual depiction of in mathematics the succession of numbers known as Fibonacci sequence, wherein each succeeding digit is computed as sum totaling the previous two. For example, if starting with one and two, the third digit is (one plus two equals) three, the fourth digit is (two plus three equals) five, three plus five eight,  and so..

                  Alt...A visual depiction of in mathematics the succession of numbers known as Fibonacci sequence, wherein each succeeding digit is computed as sum totaling the previous two. For example, if starting with one and two, the third digit is (one plus two equals) three, the fourth digit is (two plus three equals) five, three plus five eight, and so..

                    [?]The New Oil » 🤖 🌐
                    @thenewoil@mastodon.thenewoil.org

                    won't protect DMs with controversial tech, saying it would put users at risk

                    bbc.com/news/articles/cly2m5e5

                      [?]Z er 0 ne m in pl us t w O » 🌐
                      @p01@exquisite.social

                      [?]Z er 0 ne m in pl us t w O » 🌐
                      @p01@exquisite.social

                      [?]Z er 0 ne m in pl us t w O » 🌐
                      @p01@exquisite.social

                      [?]Z er 0 ne m in pl us t w O » 🌐
                      @p01@exquisite.social

                      Pr 0 u d p a re nt s, M o t he r Y 0 u w om b see d Me Fat her - (y 0 u) s

                      W it h i n e s s in g

                      U n f old in g

                      Z er a l

                      I n

                      T

                      0

                      W

                      Ne all

                      Ev e r f r e sh l (wh) y

                      (S h e)

                      (R)

                      A

                      (S)

                      N e w

                      Et er n a l l y

                      T i me less (t) he ir lov ed in g e

                      He t he ir he ir

                      L ov e d

                      0 v

                      G

                      I

                      N

                      L o v e

                        [?]Z er 0 ne m in pl us t w O » 🌐
                        @p01@exquisite.social

                        W a i t i n g

                        T r a n s
                        F o r
                        M
                        I
                        N

                        G d
                        O u g h

                        Y e a s t i m e

                        Z e r a

                        I n t
                        W

                        0

                        L

                        L

                        Ne

                        H o me

                        Re m ember in g

                        O f f a t w a re s elf c o n sci Zer y pl m i 0 n (m) e - u s

                        Z e r y 0 u p l

                        M in

                        E

                        G
                        O
                        D
                        D
                        E
                        S
                        U s

                        O f f o t he r

                        An (wh) y t h in g (e) in cl u d in g

                        Proud - co n sci 0 us or (ly) (no ye t) aw a re tw Z er elf w it h in our s elves less than half 0 n e?

                          [?]adison verlice » 🌐
                          @adisonverlice@tweesecake.social

                          some of you have noticed downtime with @alexchapman's galacticord regarding voice. this is to due with discords requirements for their new platform, DAVE. this has been fixed, and Dave has been implemented. thank you for your patients and galacticord would now be fixed

                            [?]The Daily Perspective » 🤖 🌐
                            @TheDailyPerspective@mastodon.social

                            [?]Z er 0 ne m in pl us t w O » 🌐
                            @p01@exquisite.social

                            C o

                            D

                            E

                            D

                            I n g

                            L et te r s

                            Tw o o f f m a n y

                            M o r (s o m) e n u m b e r s

                            P (wh y 0) u z z l e s w o r d i n g Z e r 0 n e

                            C od e d in g l et te rs t w o o f f m an (wh) y

                            M o re s o me numb er s

                            P u z z l e s

                            W or d

                            I n

                            G

                            Z

                            Er

                            0 n e

                              Proton boosted

                              [?]knoppix » 🌐
                              @knoppix95@mastodon.social

                              Sharing this Proton guide on how to protect your privacy at protests — from burner/“clean” phones and Faraday bags to encrypted apps, metadata scrubbing, and masking against AI facial recognition. 🛡️

                              Worth a read if you’re worried about surveillance at demonstrations. 🎭

                              @protonprivacy

                              🔗 proton.me/blog/how-to-protect-

                                [?]Z er 0 ne m in pl us t w O » 🌐
                                @p01@exquisite.social

                                [?]Z er 0 ne m in pl us t w O » 🌐
                                @p01@exquisite.social

                                [?]Hacker News » 🤖 🌐
                                @h4ckernews@mastodon.social

                                TikTok will not introduce end-to-end encryption, saying it makes users less safe

                                bbc.com/news/articles/cly2m5e5

                                  3 ★ 1 ↺
                                  OCTADE boosted

                                  [?]OCTADE » 🌐
                                  @octade@soc.octade.net

                                  CYPHERPUNK GROUP

                                  https://soc.octade.net/cypherpunk/

                                  A fediverse group for discussing topics and tools related to .

                                  @cryptography@soc.octade.net @cypherpunk@soc.octade.net

                                  Glowing green-lined skull on black background with digital circuit board lines and one eye a glowing bitcoin symbol and the other eye a glowing hashtag with the tagline 'CYPHERPUNK REVOLT'.

                                  Alt...Glowing green-lined skull on black background with digital circuit board lines and one eye a glowing bitcoin symbol and the other eye a glowing hashtag with the tagline 'CYPHERPUNK REVOLT'.

                                    [?]BGDon 🇨🇦 🇺🇸 👨‍💻 » 🌐
                                    @BrentD@techhub.social

                                    Do you know where your DoorBell video is going? Tracking lost dogs and pizza delivery may be masking a bigger privacy issue.

                                    wired.com/story/how-to-secure-

                                    Surveillance Control Center

                                    Alt...Surveillance Control Center

                                      1 ★ 8 ↺

                                      [?]OCTADE » 🌐
                                      @octade@soc.octade.net

                                      @cypherpunk@soc.octade.net @cryptography@soc.octade.net @crypto@infosec.pub @cryptography@fed.dyne.org

                                      Al Gore Invented the Internet.
                                      Joe Biden invented PGP encryption.
                                      Cypherpunks write code.

                                      Joe Biden gifted humanity with PGP encryption (in a roundabout way). Phil Zimmermann created PGP in response to a anti-privacy bill clause proposed by Senator Joe Biden.

                                      https://www.americanscientist.org/article/cypherpunks-write-code

                                      "In 1990, the FBI launched an over-the-top crackdown on computer hackers, known as Operation Sundevil. This was swiftly followed, in early 1991, by a proposed piece of U.S. Senate legislation that would force electronic communications service providers to hand over people’s personal data. (The key clause, S.266, was pushed by the then chairman of the U.S. Senate Judiciary Committee, Senator Joe Biden.)"
                                      "On learning of Biden’s S.266 clause, Zimmermann feverishly set out to complete the project, almost losing his house in the process. When he finished his software in 1991, he published it all online, free for anyone who wanted to use it. He called it “Pretty Good Privacy,” or PGP for short, and within weeks it had been downloaded and shared by thousands of people around the world. “Before PGP, there was no way for two ordinary people to communicate over long distances without the risk of interception,” said Zimmermann in a later interview. “Not by phone, not by FedEx, not by fax.” It remains the most widely used form of email encryption to this day."
                                      Joe Biden's first panopticon bill:

                                      https://www.congress.gov/bill/102nd-congress/senate-bill/266

                                      "SEC. 2201. COOPERATION OF TELECOMMUNICATIONS PROVIDERS WITH LAW ENFORCEMENT. It is the sense of Congress that providers of electronic communications services and manufacturers of electronic communications service equipment shall ensure that communications systems permit the government to obtain the plain text contents of voice, data, and other communications when appropriately authorized by law."
                                      As they say in Texas: That dinosaur don't hunt.


                                        OCTADE boosted

                                        [?]Fox Pill'd :neofox_up_paws: [He/Him/His] » 🌐
                                        @terryenglish@blobfox.es

                                        Signal Founder Moxie Marlinspike: Telegram is not private. There is nothing private about it. They've done a really amazing job of convincing the world that this is an encrypted messaging app - Feddit UK

                                        https://feddit.uk/post/45043385

                                        #signal #moxiemarlinspike #telegram #paveldurov #infosec #encryption

                                          OCTADE boosted

                                          [?]Miguel Afonso Caetano » 🌐
                                          @remixtures@tldr.nettime.org

                                          "New research shows that behaviors that occur at the very lowest levels of the network stack make encryption—in any form, not just those that have been broken in the past—incapable of providing client isolation, an encryption-enabled protection promised by all router makers, that is intended to block direct communication between two or more connected clients.

                                          The isolation can effectively be nullified through AirSnitch, the name the researchers gave to a series of attacks that capitalize on the newly discovered weaknesses. Various forms of AirSnitch work across a broad range of routers, including those from Netgear, D-Link, Ubiquiti, Cisco, and those running DD-WRT and OpenWrt.

                                          AirSnitch “breaks worldwide Wi-Fi encryption, and it might have the potential to enable advanced cyberattacks,” Xin’an Zhou, the lead author of the research paper, said in an interview. “Advanced attacks can build on our primitives to [perform] cookie stealing, DNS and cache poisoning. Our research physically wiretaps the wire altogether so these sophisticated attacks will work. It’s really a threat to worldwide network security.” Zhou presented his research on Wednesday at the 2026 Network and Distributed System Security Symposium.

                                          Paper co-author Mathy Vanhoef, said a few hours after this post went live that the attack may be better described as a Wi-Fi encryption “bypass,” “in the sense that we can bypass client isolation. We don’t break Wi-Fi authentication or encryption. Crypto is often bypassed instead of broken. And we bypass it ;)” People who don’t rely on client or network isolation, he added, are safe."

                                          arstechnica.com/security/2026/

                                            [?]knoppix » 🌐
                                            @knoppix95@mastodon.social

                                            EU’s Chat Control law is in the final stretch: countries dropped plans for mandatory mass scanning and explicit encryption backdoors, but “voluntary” scanning and broad risk rules remain on the table 📡

                                            Age checks could tie private chats to IDs or face data, sidelining anonymous, secure communication for many people 🔒

                                            @edri

                                            🔗 edri.org/our-work/chat-control

                                              OCTADE boosted

                                              [?]EDRi » 🌐
                                              @edri@eupolicy.social

                                              1/2 🚨 Today, the European Parliament is holding a public hearing on "lawful access to data for law enforcement." This hearing will platform the Commission and Europol's relentless attack on end-to-end .

                                              We're heard this before: "lawful access" = encryption backdoors =

                                              ✊🏾 We need EU lawmakers to 🔒

                                              💌 Sign our petition and join us in urging our lawmakers to protect encryption and ban spyware: edri.org/take-action/our-campa

                                                [?]ResearchBuzz: Firehose » 🌐
                                                @researchbuzz_firehose@rbfirehose.com

                                                Reuters: Meta executive warned Facebook Messenger encryption plan was ‘so irresponsible’, shows court filing. “Meta executives proceeded with a plan to encrypt the messaging services connected to its Facebook and Instagram apps despite internal warnings that it would hinder the social media giant’s ability to flag child-exploitation cases to law enforcement, according to internal company […]

                                                https://rbfirehose.com/2026/02/24/reuters-meta-executive-warned-facebook-messenger-encryption-plan-was-so-irresponsible-shows-court-filing/

                                                OCTADE boosted

                                                [?]queelius » 🌐
                                                @queelius@mastodon.social

                                                I built pagevault, a tool that turns any file into a self-contained encrypted HTML page. PDFs, images, whole websites, encrypted into a single .html you can email or host anywhere. Decrypts in the browser via Web Crypto API, no backend needed.

                                                Chunked encryption handles 100+ MB files without choking the browser. Each chunk gets its own script tag, decrypted sequentially, then removed from the DOM for GC.

                                                metafunctor.com/post/2026-02-1

                                                  [?]ArcaneChat » 🌐
                                                  @arcanechat@fosstodon.org

                                                  when other platforms add age verification, governments throttle the network or block centralized chat services, etc.

                                                    Back to top - More...