soc.octade.net is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
social@octade.net

Search results for tag #encryption

[?]knoppix Β» 🌐
@knoppix95@mastodon.social

iOS 26.5 adds default end-to-end encryption for RCS messages between Apple and Android, now in beta with supported carriers and a lock icon in chats πŸ”
The update follows GSMA changes, improving cross-platform privacy but remaining tied to proprietary apps and carrier support, limiting user control and transparency πŸ“±

πŸ”— engadget.com/2164303/ios-26-5-

    [?]Dawid Wiktor Β» 🌐
    @dawid@vebinet.com

    RE: vebinet.com/@kristin/116517777

    Reminder: If someone is claiming to be Signal Support, or your organization's/company's support on Signal, and asking you to provide your PIN or authentication code, then you can be sure it's phishing.

    Never accept contact requests and never ever give your PIN or authentication code.

    Encryption protects you, but the moment you give these 2, it cannot do so anymore. You can imagine it as walls of the castle. They will protect you, but if you open the gates, then walls have no use anymore.

    And as @kristin mentioned, if you use other apps and services, it's smart advice to apply these rules too.

      OCTADE boosted

      [?]Freezenet Β» 🌐
      @freezenet@noc.social

      Utah’s VPN Ban Law Goes Into Effect in Age Verification Escalation

      Utah is attempting to cover up the failures of their age verification law by effectively banning VPNs.

      freezenet.ca/utahs-vpn-ban-law

        [?]Karel 'Clock' K. [he/him] Β» 🌐
        @clock@net.miaumuh.ch

        @Tutanota I suggest adding"❌ Suppression of Tor users (in my opinion by Tuta)"to the right side.

        I tried to create an anonymous Tuta account when I was living in a dictatorship and I remember it didn't work.

        I was using Tor because I didn't want to be abducted into a concentration camp (euphemistically called "jail") by the dictatorial regime in retaliation for legitimate and legal exercising of my human and constitutional right to free speech I was planning using that account.

        I strongly suspect the reason it didn't work was because IMO Tuta was suppressing Tor users.

        Due to this,my work in publishing public domain legal norms the regime was trying to hide,was greatly slowed down and made difficult.

        When Tuta is writing like this,in my opinion it is hypocrisy.

        The following hashtags may be unrelated or only remotely related to the topic of this post:

          [?]knoppix Β» 🌐
          @knoppix95@mastodon.social

          Signal is developing a standalone desktop app without requiring a smartphone for setup or use, based on recent open-source code changes. πŸ–₯️
          The update adds more desktop controls while keeping end-to-end encryption, improving device independence with a privacy-first design. πŸ”

          @signalapp

          πŸ”— aboutsignal.com/news/signal-de

            [?]knoppix Β» 🌐
            @knoppix95@mastodon.social

            Turkey plans to ban unlicensed VPNs and require approved providers to log user activity and share data with authorities, restricting anonymous access. 🚫
            VPN signups surged as users seek privacy tools amid blocks, highlighting tensions between state control, surveillance risks, and user autonomy online. πŸ”

            πŸ”— reclaimthenet.org/turkey-to-ba

            [?]The Gregarious Dragon Β» 🌐
            @somegregariousdude@dragonscave.space

            πŸ” TIL: The padlock in your Matrix client is lying to you. Well... not lying. Just not telling you the whole truth.
            So you've got a padlock icon in Element. Your messages are encrypted. You're basically a spy now, right?
            Not quite, friend.
            There are two things going on in E2EE, and most people only ever learn about one of them. Today I learned the hard way β€” and now you don't have to.
            πŸ”’ Encryption scrambles your messages into gibberish that only the right keys can unlock. Happens automatically. The padlock is always on. Beautiful. Revolutionary. Table stakes.
            πŸ›‘οΈ Verification is the part the cypherpunks actually care about.
            Encryption secures the channel. Verification confirms who's actually holding the keys at the other end. Skip it, and you're encrypting to keys that merely claim to belong to your contact. Most of the time? Fine. But a compromised homeserver could theoretically slide a fake key into the exchange and silently hoover up everything you thought was for their eyes only.
            That's not paranoia. That's the threat model.
            The fix? Emoji. I'm not even joking. Matrix generates a set of emoji from a shared cryptographic value and shows them to both users simultaneously. If you both see the same little parade of cartoon faces β€” the handshake is mathematically genuine. No interception possible. It takes 30 seconds and feels absolutely ridiculous right up until you realise it's the same cryptographic ceremony Signal uses for Safety Numbers and iMessage uses for Contact Key Verification.
            The best part? Do it once per contact. Matrix cross-signing cascades the verification across all your devices automatically. One emoji parade to rule them all.
            Padlock = encrypted. Shield = verified. You want both. The cypherpunks demand both. Don't settle for half a revolution. πŸ”’πŸ›‘οΈ

              [?]Light Β» 🌐
              @light@noc.social

              You know what will be a great idea for ? If you could put fingerprints in a mailto link.
              Then you could just click on the link on someone's website and it would automatically encrypt the message.
              And it's easier to trust the PGP key.

                [?]The New Oil Β» 🤖 🌐
                @thenewoil@mastodon.thenewoil.org

                [?]knoppix Β» 🌐
                @knoppix95@mastodon.social

                EU-funded programs and institutions are financing spyware firms like Intellexa and Paragon, despite use against journalists and activists in Europe. πŸ•΅οΈβ€β™‚οΈ
                Reports cite weak oversight and transparency, raising risks to privacy, encryption, and democratic rights. 🚨

                πŸ”— edri.org/our-work/its-not-just

                  [?]knoppix Β» 🌐
                  @knoppix95@mastodon.social

                  Proton CEO Andy Yen warns global age-verification laws could end anonymity via ID or biometric checks and centralized databases. πŸ”
                  He calls for open-source, on-device, encrypted checks, warning they could expand controls, reducing user control and enabling tracking. ⚠️

                  @protonprivacy

                  πŸ”— techradar.com/vpn/vpn-privacy-

                    muddle boosted

                    [?]Em :official_verified: Β» 🌐
                    @Em0nM4stodon@infosec.exchange

                    Anyone asserting encryption is a tool for crime is either painfully misinformed or is attempting to manipulate legislators to gain oppressive power over the people.

                    Encryption is not a crime,
                    encryption is a shield.

                    Encryption protects you from cyberattack, identity theft, discrimination, doxxing, stalking, sexual violence, physical harm, and much more.

                    For safety, for privacy, for democracy, and for all our human rights, it's critical that we defend our right to encryption.

                    privacyguides.org/articles/202

                      [?]Space Queen Enthusiast Β» 🌐
                      @GalacticGoddess@ieji.de

                      RE: ieji.de/@GalacticGoddess/11565

                      Canadians!

                      Another reminder that these bills are rapidly progressing through the chambers. Bill C-12 passed while Bills C-8, C-9, and S-209 passed their first chambers and are rapidly progressing through their second chambers.

                      If these bills weren't bad enough, the Canadian government is trying to rush a bill that's essentially the United States' FISA and CLOUD Act rolled into one: C-22, the Lawful Access Act.

                      C-22's guardrails protecting encryption are extremely flimsy and easily bypassed (i.e. the definition of a "systematic vulnerability" won't be legally defined until after the bill is passed).

                      Please call your Senators and House of Commons Reps ASAP!

                      If you live in Canada, sign the petition against C-22: internetsociety.org/our-work/i

                        [?]knoppix Β» 🌐
                        @knoppix95@mastodon.social

                        Proton analyzed 54k profiles using 2025 ad auction data, estimating US user value at $1,605/year, ranging from $31 to $17,929 by age, device, and behavior. πŸ“Š
                        Desktop users generate ~4.9Γ— more value than Android users, and the top 10% of profiles account for 43% of total advertiser value. πŸ”’

                        @protonprivacy

                        πŸ”— proton.me/blog/what-is-your-da

                          [?]knoppix Β» 🌐
                          @knoppix95@mastodon.social

                          California lawmakers are advancing A.B. 1709, banning under-16s from social media and requiring ID or biometric checks for all users πŸ”’
                          The bill passed committees and nears a vote, raising risks to anonymity, free expression, and smaller platforms under strict compliance βš–οΈ

                          πŸ”— eff.org/deeplinks/2026/04/act-

                            [?]The New Oil Β» 🤖 🌐
                            @thenewoil@mastodon.thenewoil.org

                            [?]knoppix Β» 🌐
                            @knoppix95@mastodon.social

                            Age verification is expanding from laws into platforms and operating systems, linking access to identity checks across services and devices 🌐
                            Implementations often require IDs or biometrics, creating centralized data targets and reducing anonymity despite privacy claims πŸ”

                            πŸ”— proton.me/blog/age-verificatio

                              [?]knoppix Β» 🌐
                              @knoppix95@mastodon.social

                              UK regulator Ofcom probes Telegram under the Online Safety Act over alleged CSAM sharing, alongside teen chat platform investigations πŸ“±
                              Case tests compliance powers like fines or blocking, raising tensions between enforcement, encryption, and user privacy rights βš–οΈ

                              πŸ”— bleepingcomputer.com/news/secu

                                [?]knoppix Β» 🌐
                                @knoppix95@mastodon.social

                                EU age verification app was declared ready and privacy-presing, but researchers bypassed protections in under 2 minutes despite open-source code πŸ”
                                Flaws in config-stored controls, disabled biometrics, and exposed credentials highlight risks of identity linkage and centralized tracking ⚠️

                                πŸ”— proton.me/blog/eu-age-verifica

                                  [?]Kevin Karhan Β» 🔓
                                  @kkarhan@jorts.horse

                                  @tinker and it also reinforces my belief that there is no valid reason not to properly encrypt everything!

                                    [?]Free Software Foundation Β» 🌐
                                    @fsf@hostux.social

                                    Setting up email is a great first step for everyone: u.fsf.org/1bq

                                      [?]xoron :verified: Β» 🌐
                                      @xoron@infosec.exchange

                                      Decentralized WhatsApp Clone - No Setup or Signup

                                      positive-intentions.com

                                      This is intended to introduce a new paradigm in client-side managed secure cryptography. We can avoid registration of any sort. A fairly unique offering for a messaging app.

                                      No need for things like phone numbers or registering to any app stores. There are no databases to be hacked Allowing users to send E2EE messages; no cloud, no trace.

                                        [?]The New Oil Β» 🤖 🌐
                                        @thenewoil@mastodon.thenewoil.org

                                        [?]ZwillGen Β» 🌐
                                        @zwillgen@mstdn.social

                                        In a recent Computer Weekly article, Marc Zwillinger and Zach J. examine the crucial role of end-to-end encryption (E2EE) in an era of unprecedented digital surveillance.

                                        zwillgen.com/publication/priva

                                          [?]Profoundly Nerdy Β» 🌐
                                          @profoundlynerdy@bitbang.social

                                          Can anyone recommend a solid encrypted plain text editor for Android with Markdown support. Open source options only, please. Thanks!

                                            [?]ResearchBuzz: Firehose Β» 🌐
                                            @researchbuzz_firehose@rbfirehose.com

                                            PC Mag: Mastodon Plans End-to-End Encryption for Private Messages. “Decentralized social media platform Mastodon plans on adopting its own end-to-end encryption (E2EE) for private messages. Mastodon announced the upcoming feature in a blog post about receiving €614,000 ($724,000) from the Sovereign Tech Fund, an effort backed by the German government to support open-source software.”

                                            https://rbfirehose.com/2026/04/17/pc-mag-mastodon-plans-end-to-end-encryption-for-private-messages/

                                            [?]Mark Wyner Won’t Comply :vm: Β» 🌐
                                            @markwyner@mas.to

                                            E2EE is coming to Mastodon. And it’s long overdue. Not until next year, but at least it’s on the horizon.

                                            On one hand, it’s a little scary seeing Mastodon features receiving large sums of money for features and improvements. On the other, it’s meaningful to see Mastodon maturing.

                                            privacyguides.org/news/2026/04

                                              [?]Vlad Β» 🌐
                                              @newsgroup@social.vir.group

                                              πŸ” OpenSSL 4.0.0 just dropped β€” and it changes everything.

                                              Post-quantum cryptography (ML-KEM + ML-DSA) is now native. MD5, 3DES, RC4, and TLS 1.0/1.1 are finally gone. TLS 1.3 is the only default.

                                              If you run a Linux server, this guide covers what changed, what to audit in your apps, and how to prepare for the post-quantum era.

                                              πŸ‘‰ newsgroup.site/openssl-4-0-0-r

                                                [?]Z er 0 ne m in pl us t w O Β» 🌐
                                                @p01@exquisite.social

                                                T w a w a r e l f

                                                Z e
                                                R
                                                I
                                                N
                                                M p l
                                                U s 0 n e
                                                T w O
                                                H r
                                                E
                                                E
                                                Y f
                                                0 u r

                                                C o n s c i o u s e l f

                                                Z e r u n (S h e r s e l f) i t m u l t i p l i n t w (h) y 0 n e d u a l (l) h y p o t h e (r) t i c a l m i n u s p o l a r i t y

                                                H y p (o) (t) (h e) (t i c) (a l) (r) a n t i s y n t r i n i t ( w h) y t h r e e (t w o)

                                                A l t (w) o (g e t) (h e) r A ((l t e r) n a t i n g

                                                (E g o) C t (Y 0)

                                                U a l (l)

                                                T h

                                                E

                                                S

                                                I

                                                S

                                                0 n e

                                                F (Y 0) U r

                                                Q u a d r i (y 0) (u) n i t (w h) y

                                                  [?]knoppix Β» 🌐
                                                  @knoppix95@mastodon.social

                                                  WhatsApp is rolling out usernames in beta on Android and iOS, enabling messaging without exposing phone numbers, though signup still requires a number πŸ”
                                                  Usernames allow 3–35 chars, optional 4-digit keys, and Meta linking, reflecting partial privacy gains but continued centralized identity control 🧩

                                                  πŸ”— 9to5google.com/2026/04/08/what

                                                    [?]knoppix Β» 🌐
                                                    @knoppix95@mastodon.social

                                                    FBI investigators retrieved deleted Signal messages from an iPhone by accessing data cached in Apple’s internal notification database πŸ“±.
                                                    The case highlights how stored notification previews can expose message content even after an app’s deletion, raising privacy and data retention concerns πŸ”.

                                                    @signalapp

                                                    πŸ”— 9to5mac.com/2026/04/09/fbi-use

                                                      [?]gtbarry Β» 🌐
                                                      @gtbarry@mastodon.social

                                                      New Advances Bring the Era of Quantum Computers Closer Than Ever

                                                      quantum physicists at the California Institute of Technology went public with a design for a quantum computer that could break encryption with only tens of thousands of qubits and said that it had formed a company to build the machine

                                                      quantamagazine.org/new-advance

                                                        [?]The New Oil Β» 🤖 🌐
                                                        @thenewoil@mastodon.thenewoil.org

                                                        [?]The New Oil Β» 🤖 🌐
                                                        @thenewoil@mastodon.thenewoil.org

                                                        Back to top - More...