soc.octade.net is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
social@octade.net

Search results for tag #encryption

[?]The New Oil » 🤖 🌐
@thenewoil@mastodon.thenewoil.org

[?]Harry Sintonen » 🌐
@harrysintonen@infosec.exchange

Reading up on the aes-js and pyaes IV issues discovered by @trailofbits I remembered something I ran into many moons ago (maybe about 15 years ago):

I discovered some prod C# encryption code that used a fixed salt in key&iv derivation code. It used a salt of 0x49, 0x76, 0x61, 0x6e, 0x20, 0x4d, 0x65, 0x64, 0x76, 0x65, 0x64, 0x65, 0x76.

This code was obviously copypasted from a 2003 codeprojects.com post and the example code used verbatim, without understanding the implications.

Anyway, this kind of is somewhat similar, but just unmeasurably worse: blog.trailofbits.com/2026/02/1

    OCTADE boosted

    [?]WIRED - The Latest in Technology, Science, Culture and Business [Unofficial] » 🌐
    @wired.com@web.brid.gy

    How to Organize Safely in the Age of Surveillance

    From threat modeling to encrypted collaboration apps, we’ve collected experts’ tips and tools for safely and effectively building a group—even while being targeted and tracked by the powerful.

    How to Organize Safely in the Age of Surveillance

    Alt...How to Organize Safely in the Age of Surveillance

    [?]TechNadu » 🌐
    @technadu@infosec.exchange

    PureVPN on 2026 privacy strategy:
    “Our core learning can be summarized in one line: privacy assurances must be provable, not aspirational.”

    Modular infrastructure. No-logs-first. Evolving obfuscation.

    Full interview:
    technadu.com/purevpn-on-proven

    PureVPN in 2026 Talks About Proven Privacy, Resilient Infrastructure, and Staying Ahead of Network Restrictions

    Alt...PureVPN in 2026 Talks About Proven Privacy, Resilient Infrastructure, and Staying Ahead of Network Restrictions

      [?]xoron :verified: » 🌐
      @xoron@infosec.exchange

      Local-Only File Encryption with JavaScript.

      I've been exploring the and I'm impressed!

      When combined with the , it offers a seemingly secure way to and files directly on your device. Think , but with !

      I know can have vulnerabilities since the code is served over the web, so I've my demo! You can check it out, and it should even work if on .

      Live Demo: dim.positive-intentions.com/?p

      Demo Code: github.com/positive-intentions

      About the Dim framework:
      positive-intentions.com/docs/c

      IMPORTANT NOTES (PLEASE READ!):
      * This is NOT a product. It's for and purposes only.
      * It has NOT been reviewed or audited. Do NOT use for sensitive data.
      * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
      * This is NOT meant to replace robust solutions like . It's just a to show what's possible with .

        [?]The New Oil » 🤖 🌐
        @thenewoil@mastodon.thenewoil.org

        [?]The New Oil » 🤖 🌐
        @thenewoil@mastodon.thenewoil.org

        xoron :verified: boosted

        [?]xoron :verified: » 🌐
        @xoron@infosec.exchange

        WhatsApp Clone... But Decentralized and P2P Encrypted Without Install or Signup.

        Features include:
        * P2P
        * End to end encryption
        * forward secrecy
        * Multimedia
        * Open source
        * No registration
        * No installation
        * Encrypted storage
        * TURN server

        The project is far from finished and presented for testing, feedback and demo purposes (USE RESPONSIBLY!).

        positive-intentions.com

        positive intentions

        Alt...positive intentions

          [?]TechNadu » 🌐
          @technadu@infosec.exchange

          Bitwarden introduces “Cupid Vault” — a 2-user shared Organization vault available on the free plan.

          Security considerations:
          • End-to-end encryption
          • Vault isolation from personal storage
          • Fingerprint phrase verification (anti-ATMIT enrollment control)
          • Bidirectional sharing
          • Revocable access

          Limitations: 2 users, 2 collections. No RBAC granularity (reserved for paid tiers).

          Question for practitioners:
          Is secure shared vault architecture preferable to federated identity or delegated access models for small trust groups?

          Source: bleepingcomputer.com/news/secu

          Join the discussion below.
          Follow @technadu for actionable security insights.

          Bitwarden introduces ‘Cupid Vault’ for secure password sharing

          Alt...Bitwarden introduces ‘Cupid Vault’ for secure password sharing

            [?]knoppix » 🌐
            @knoppix95@mastodon.social

            Session’s co‑founder Kee Jefferys says users don’t need to quit WhatsApp entirely — privacy tools should offer choice, not replacement. 🧭
            He stresses that private messaging must be accessible, optional, and free from data harvesting. 🔐

            @session

            🔗 itsfoss.com/news/session-co-fo

              [?]knoppix » 🌐
              @knoppix95@mastodon.social

              Israeli exec at Paragon accidentally exposed Graphite spyware dashboard on LinkedIn—real-time access to Czech user's WhatsApp, Signal, geolocation, camera/mic via zero-click exploits 🔍

              Post deleted, shows US agency sales after Trump lifted rights bans, fueling surveillance concerns ⚠️

              🔗 news-pravda.com/world/2026/02/

                [?]Steele Fortress » 🌐
                @steelefortress@infosec.exchange

                Recent research on social housing stock management has revealed alarming breaches in data protection. A recent study found that over 75% of participating landlords' systems were vulnerable to SQL injection attacks, potentially exposing sensitive tenant...

                Read more: steelefortress.com/qf5ov9

                  [?]Miguel Afonso Caetano » 🌐
                  @remixtures@tldr.nettime.org

                  "To date, the security measures implemented for LLM-based tools have not kept pace with the growing risks. In its response to The New York Times’ request for chat histories, Open AI indicated that it is working on “client-side encryption for your messages with ChatGPT” — yet even here the company hints at deploying “fully automated systems to detect safety issues in our products,” which sounds very much like client-side scanning (CSS). CSS, which involves scanning the content on an individual’s device for some class of objectionable material, before it is sent onwards via an encrypted messaging platform, is a lose-lose proposition that undermines encryption, increases the risk of attack, and opens the door to mission creep.

                  By contrast, the open source community has made positive strides in prioritizing confidentiality. OpenSecret’s MapleAI supports a multidevice end-to-end encrypted AI chatbot, while Moxie Marlinspike, co-author of Signal’s E2EE protocol, has launched ‘Confer,’ an open source AI assistant that protects all user prompts, responses, and related data. But for now at least, such rights-respecting solutions remain the exception rather than the norm.

                  Unbridled AI adoption combined with depressingly lax security practices demands urgent action. The security issues associated with advanced AI tools are the consequences of deliberately prioritizing profit and competitiveness over the security and safety of at-risk communities, and they will not resolve on their own. While we would love to see companies self-correct, governments should not shy away from demanding that these companies prioritize security and human rights, especially when public money is being spent to procure and build ‘public interest’ AI tools. In the meantime, we can all also choose to support open, accountable rights-respecting alternatives to the big name models and tools where possible."
                  accessnow.org/artificial-insec

                    OCTADE boosted

                    [?]Toni Aittoniemi » 🌐
                    @gimulnautti@mastodon.green

                    European lawmakers keep asking for the impossible: Break in a way that’s ”safe”

                    They can’t tell the difference between technical and legal

                    Unfortunately there is a trove of ”experts” with devious intent, that keep telling them this is possible!

                    It’s not. Breaking encryption is fundamentally unsafe. It would open our entire society to Russian and American operations

                    And that includes the companies we’re expecting to build Data

                    youtube.com/watch?v=pfVng5csqyk

                      Virebent boosted

                      [?]Virebent » 🌐
                      @virebent@mastodon.social

                      Virebent.art provides surveillance-free alternatives to Big Tech: encrypted collaboration (CryptPad), secure video calls (Jitsi), Usenet access, and
                      more.

                      No data harvesting. No tracking. Just privacy.

                      We need your support to:
                      ✅ Upgrade servers
                      ✅ Build mobile apps
                      ✅ Create privacy guides
                      ✅ Expand secure email & cloud storage

                      Every contribution matters. Support via Liberapay (no fees!):
                      👉 liberapay.com/Virebent-Art/

                        [?]knoppix » 🌐
                        @knoppix95@mastodon.social

                        FBI agents reportedly failed to access a Washington Post reporter’s iPhone after a raid — the device was in Apple’s Lockdown Mode. 🔒
                        Court records suggest the feature effectively blocked access, highlighting limits of digital forensics vs. user privacy. ⚖️

                        🔗 404media.co/fbi-couldnt-get-in

                          OCTADE boosted

                          [?]Mad Argon :qurio: [they/any] » 🌐
                          @madargon@is-a.cat

                          My message for ... for every entity interested in :
                          I will resist and it's my human right.
                          Encryption is not for bad actors only, it protects innocent people every day.
                          We are not criminals.

                          My modified photo. Woman in grey hoodie and black trousers, with right hand up and close to camera, is blurred. Top and bottom parts of the image are covered with added dark blue shadow. Whole picture is covered with semi-transparent Base64 PGP message. There is pale yellow text near bottom part: "I am not a criminal. I am not a terrorist. I USE ENCRYPTION."

                          Alt...My modified photo. Woman in grey hoodie and black trousers, with right hand up and close to camera, is blurred. Top and bottom parts of the image are covered with added dark blue shadow. Whole picture is covered with semi-transparent Base64 PGP message. There is pale yellow text near bottom part: "I am not a criminal. I am not a terrorist. I USE ENCRYPTION."

                            [?]Tom's IT Cafe » 🌐
                            @TomsITCafe@mastodon.social

                            Spread the word: Your VPN isn't for watching geo-blocked streams. It's the way of your privacy.
                            tomsitcafe.com/2026/01/30/wire

                              [?]gtbarry » 🌐
                              @gtbarry@mastodon.social

                              Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects’ laptops

                              Microsoft provided the FBI with the recovery keys to unlock encrypted data on the hard drives of three laptops as part of a federal investigation.

                              BitLocker recovery keys are uploaded to Microsoft’s cloud, allowing the tech giant — and by extension law enforcement — to access them.

                              techcrunch.com/2026/01/23/micr

                                Back to top - More...