techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.9K
active users

#keyescrow

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://meow.social/@Catwoman69y2k" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Catwoman69y2k</span></a></span> <span class="h-card" translate="no"><a href="https://dragonchat.org/@dragonfriend" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dragonfriend</span></a></span> most importantly:</p><p>Only with <a href="https://infosec.space/tags/SelfCustody" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfCustody</span></a> of all the keys, <a href="https://infosec.space/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosting</span></a> of the entire infrastructure <em>and</em> everything being <a href="https://infosec.space/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a>, one can assure (and [let it be] audit[ed] independently) that the <a href="https://infosec.space/tags/advertised" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advertised</span></a> <a href="https://infosec.space/tags/promises" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>promises</span></a> are in fact true.</p><ul><li>All <a href="https://infosec.space/tags/centralized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>centralized</span></a>, <a href="https://infosec.space/tags/SingleVendor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SingleVendor</span></a> and/or <a href="https://infosec.space/tags/SingleProvider" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SingleProvider</span></a> solutions - and yes that includes <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>signalapp</span></a></span> as well (!!!) - are inherently insecure because they can be <em>forced into "cooperation"</em> - may it be with <a href="https://infosec.space/tags/Cyberfacism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberfacism</span></a> like <a href="https://infosec.space/tags/CloudAct" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudAct</span></a> or <em><a href="https://web.archive.org/web/20210908180219/https://twitter.com/thegrugq/status/1085614812581715968" rel="nofollow noopener noreferrer" target="_blank">listeally a gun to their head</a></em>...</li></ul><p>Cuz not expecting <span class="h-card" translate="no"><a href="https://mastodon.world/@Mer__edith" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Mer__edith</span></a></span> to break is the same level of <em>"<a href="https://infosec.space/tags/TrustMeBro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrustMeBro</span></a>!"</em> assurances as <a href="https://infosec.space/tags/AN%C3%98M" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ANØM</span></a>, <a href="https://infosec.space/tags/EncroChat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EncroChat</span></a>, <a href="https://infosec.space/tags/SkyECC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SkyECC</span></a>, <a href="https://infosec.space/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> etc. do <a href="https://www.youtube.com/watch?v=8PW3O2mqTn8" rel="nofollow noopener noreferrer" target="_blank">in their</a> <a href="https://infosec.space/tags/advetising" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advetising</span></a> <a href="https://infosec.space/tags/lies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lies</span></a>! </p><ul><li>Remember: Corporations/Foundations/non-profits/... <em>don't have a right to be silent</em> , only individuals, and even then there are certain juristictions that have <a href="https://infosec.space/tags/KeyEscrow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyEscrow</span></a> laws (i.e. <a href="https://infosec.space/tags/France" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>France</span></a>, <a href="https://infosec.space/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a>, <a href="https://infosec.space/tags/KSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KSA</span></a>, <a href="https://infosec.space/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a>, <a href="https://infosec.space/tags/India" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>India</span></a>, <a href="https://infosec.space/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> , ...) in the books!</li></ul>
Alec Muffett<p>Former UN Rapporteur David Kaye: “for anyone who ever argued for key escrows, i offer you the example of the muskovites rampaging through USG systems” | Ofcom, please take note…<br><a href="https://alecmuffett.com/article/111104" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">alecmuffett.com/article/111104</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/DavidKaye" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DavidKaye</span></a> <a href="https://mastodon.social/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a> <a href="https://mastodon.social/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EndToEndEncryption</span></a> <a href="https://mastodon.social/tags/KeyEscrow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyEscrow</span></a> <a href="https://mastodon.social/tags/backdoors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoors</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
C.<p>Remember that <a href="https://mindly.social/tags/story" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>story</span></a> last week, where the <a href="https://mindly.social/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> <a href="https://mindly.social/tags/FBI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FBI</span></a> came out and actually recommended people switch to using <a href="https://mindly.social/tags/encrypted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encrypted</span></a> <a href="https://mindly.social/tags/communications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>communications</span></a>, because Chinese government hackers had burrowed deeply into the US phone infrastructure ?</p><p>Remember the <a href="https://mindly.social/tags/cognitive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cognitive</span></a> <a href="https://mindly.social/tags/dissonance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dissonance</span></a> that announcement caused, after literally decades of the FBI and other <a href="https://mindly.social/tags/American" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>American</span></a> <a href="https://mindly.social/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> agencies demanding backdoors and key escrow and deliberately weakened <a href="https://mindly.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://mindly.social/tags/algorithms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>algorithms</span></a>?</p><p>Ya, well, apparently part of that announcement was missed. They're still demanding "responsibly managed encryption":</p><p><a href="https://www.forbes.com/sites/zakdoffman/2024/12/11/fbi-warns-iphone-android-users-change-whatsapp-facebook-messenger-signal-apps/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forbes.com/sites/zakdoffman/20</span><span class="invisible">24/12/11/fbi-warns-iphone-android-users-change-whatsapp-facebook-messenger-signal-apps/</span></a></p><p>Remember: "responsible encryption" is neither. It's their demand for a back-door. And every back door can be used by the "bad guys" just as easily as it can be used by the "good guys". Anyone who tells you different is <a href="https://mindly.social/tags/lying" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lying</span></a> to your face; encryption is math, and there is no such thing as math which the "good guys" can do but which the "bad guys" cannot.</p><p>The <a href="https://mindly.social/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> intelligence agencies' demand for backdoors to be built into all parts of the <a href="https://mindly.social/tags/phone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phone</span></a> system years ago are exactly what let the <a href="https://mindly.social/tags/Chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> government <a href="https://mindly.social/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> to penetrate and control the phone system now, and which they aren't going to be able to fix for many years, if at all, because it would require replacing a *lot* of equipment with versions that don't have back doors (and which would then not be eavesdrop-able at will).</p><p><a href="https://mindly.social/tags/CognitiveDissonance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CognitiveDissonance</span></a> <a href="https://mindly.social/tags/BackDoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackDoor</span></a> <a href="https://mindly.social/tags/KeyEscrow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyEscrow</span></a> <a href="https://mindly.social/tags/ClipperChip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClipperChip</span></a> <a href="https://mindly.social/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/NSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSA</span></a> <a href="https://mas.to/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> Key from <a href="https://mas.to/tags/Lotus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lotus</span></a>-Notes (1997)</p><p>Before the US <a href="https://mas.to/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> export regulations were finally disolved the export version of <a href="https://mas.to/tags/Lotus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lotus</span></a> Notes used to include a <a href="https://mas.to/tags/keyescrow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keyescrow</span></a> / backdoor feature called differential <a href="https://mas.to/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a>. The idea was that they got permission to export 64 bit crypto if 24 of those bits were <a href="https://mas.to/tags/encrypted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encrypted</span></a> for the NSA's public key<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://mas.to/tags/publickey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>publickey</span></a> </p><p><a href="http://www.cypherspace.org/adam/hacks/lotus-nsa-key.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">http://www.</span><span class="ellipsis">cypherspace.org/adam/hacks/lot</span><span class="invisible">us-nsa-key.html</span></a></p>
Kevin Karhan :verified:<p><span class="h-card"><a href="https://shitposter.club/users/thatguyoverthere" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thatguyoverthere</span></a></span> based off second sources, they can basically criminalize any services and systems that don't have <a href="https://mstdn.social/tags/Govware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Govware</span></a> <a href="https://mstdn.social/tags/backdoors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoors</span></a> to allow <a href="https://mstdn.social/tags/wiretapping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wiretapping</span></a> and <a href="https://mstdn.social/tags/KeyEscrow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyEscrow</span></a> systems as well as charge people if they don't want to potentially self-inctiminate.</p><p>And even if that wasn't the case, the <a href="https://mstdn.social/tags/PocketCrypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PocketCrypto</span></a> would literally fulfill their definition as in correctly setup encryption isn't attackable outside of brute-forcing passwords!</p>