mastodon.uno è uno dei tanti server Mastodon indipendenti che puoi usare per partecipare al fediverso.
Mastodon.Uno è la principale comunità mastodon italiana. Con 77.000 iscritti è il più grande nodo Mastodon italiano: anima ambientalista a supporto della privacy e del mondo Open Source.

Statistiche del server:

6,2K
utenti attivi

#e2ee

11 post11 partecipanti1 post oggi
Dominik Chrástecký - Blog<p><strong>Creating a Simple Encrypted Matrix Bot in Go</strong></p> Creating a basic Matrix bot is straightforward—generate an access token, send an HTTP request, and you're done. But posting messages to an encrypted room with verified sessions is a bit more involved. This guide will walk you step-by-step through creating your own encrypted Matrix bot using Golang. <p><a href="https://chrastecky.dev/programming/creating-a-simple-encrypted-matrix-bot-in-go" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">chrastecky.dev/programming/cre</span><span class="invisible">ating-a-simple-encrypted-matrix-bot-in-go</span></a></p>
steve mookie kong<p>End-to-End Encryption is only as good as the security stance of the person on the other side. If they're using Windows 11...</p><p><a href="https://cyberplace.social/@GossiTheDog/114360637766024432" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberplace.social/@GossiTheDog</span><span class="invisible">/114360637766024432</span></a></p><p><a href="https://chow.fan/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://chow.fan/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://chow.fan/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://chow.fan/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://chow.fan/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://chow.fan/tags/spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spyware</span></a></p>
zeitkapsl.eu<p>Hello <a href="https://mastodon.social/tags/mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastodon</span></a>!</p><p>We are Oliver, Peter and Simeon from <a href="https://mastodon.social/tags/zeitkapsl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeitkapsl</span></a><br>a European 🇪🇺 alternative for securely storing, sharing, and organizing your precious memories with end-to-end encryption. </p><p>No ads. No tracking. Just your memories, safe and sound.​</p><p><a href="https://mastodon.social/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a> <a href="https://mastodon.social/tags/PrivacyFirst" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyFirst</span></a> <a href="https://mastodon.social/tags/madeInEU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>madeInEU</span></a> <a href="https://mastodon.social/tags/zeitkapsl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeitkapsl</span></a></p>
Michel<p>Für was würdest du dich entscheiden?<br><a href="https://norden.social/tags/mailboxorg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mailboxorg</span></a> oder <a href="https://norden.social/tags/posteode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>posteode</span></a> ?<br><a href="https://norden.social/tags/datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datenschutz</span></a> <a href="https://norden.social/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://norden.social/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unplugtrump</span></a> <a href="https://norden.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
Debacle<p><span class="h-card" translate="no"><a href="https://piaille.fr/@movim" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>movim</span></a></span> <span class="h-card" translate="no"><a href="https://chrastecky.dev/u/dominik" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dominik</span></a></span></p><p>Note, that <a href="https://framapiaf.org/tags/OMEMO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OMEMO</span></a> has been taken directly from Signal, only adapted for <a href="https://framapiaf.org/tags/XMPP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XMPP</span></a>.</p><p>Most modern <a href="https://framapiaf.org/tags/Jabber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jabber</span></a> clients default to OMEMO for one-to-one conversations nowadays. For private groups, I believe, users still have to enable it explicitely.</p><p>I'm not aware of any public Jabber server that would still accept non-TLS connections, so you have both transport <a href="https://framapiaf.org/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> and <a href="https://framapiaf.org/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a>.</p>
Linux G. Fossman<p><span class="h-card" translate="no"><a href="https://mastodon.social/@Internxt" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Internxt</span></a></span> Why would they need to hack <a href="https://social.vivaldi.net/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> when they can more easily take a detour around it?</p><p><a href="https://social.vivaldi.net/@opensourceopenmind/113881794946085014" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">social.vivaldi.net/@opensource</span><span class="invisible">openmind/113881794946085014</span></a></p>
tar<p>Generates random 16 bytes, transforms it to CryptoKey Object, encrypts it for RSA-key issuer</p><p><a href="https://github.com/dabevlohn/wasm-rc-sesskey" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/dabevlohn/wasm-rc-s</span><span class="invisible">esskey</span></a></p><p><a href="https://fairy.id/tags/wasm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wasm</span></a> <a href="https://fairy.id/tags/webassembly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webassembly</span></a> <a href="https://fairy.id/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a> <a href="https://fairy.id/tags/rocketchat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rocketchat</span></a> <a href="https://fairy.id/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://fairy.id/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://fairy.id/tags/key" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>key</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@oceanhaiyang" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>oceanhaiyang</span></a></span> I only can <a href="https://docs.monocles.eu/services/mail.service/#security_of_keys" rel="nofollow noopener noreferrer" target="_blank">link to documentation</a> why you should use <span class="h-card" translate="no"><a href="https://monocles.social/@monocles" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>monocles</span></a></span> over <span class="h-card" translate="no"><a href="https://mastodon.social/@Tutanota" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Tutanota</span></a></span> &amp; <span class="h-card" translate="no"><a href="https://mastodon.social/@protonprivacy" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>protonprivacy</span></a></span> because both refuse to elaborate or support <a href="https://infosec.space/tags/SelfCustody" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfCustody</span></a> of <a href="https://infosec.space/tags/Keys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keys</span></a>! </p><ul><li>It's only <em>real <a href="https://infosec.space/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a></em> if only you hold <em>all the keys</em>!</li></ul><p>Also <a href="https://www.youtube.com/watch?v=QCx_G_R0UmQ" rel="nofollow noopener noreferrer" target="_blank">Proton snitched on their users</a> - <a href="https://web.archive.org/web/20210226175949/https://twitter.com/thegrugq/status/1085614812581715968" rel="nofollow noopener noreferrer" target="_blank">as will <em>every single provider</em></a> cuz <a href="https://infosec.space/tags/corporations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>corporations</span></a> can't invoke the right to remain silent!</p>
mkj<p>If you're using Linux, and you're looking to set up encrypted network-accessible storage, I have a blog post describing how to do that using rclone.</p><p><a href="https://michael.kjorling.se/blog/2024/setting-up-encrypted-remote-storage-on-linux-using-rclone/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">michael.kjorling.se/blog/2024/</span><span class="invisible">setting-up-encrypted-remote-storage-on-linux-using-rclone/</span></a></p><p>You can use this with any storage backend that rclone supports, which is *many*:</p><p><a href="https://rclone.org/#providers" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">rclone.org/#providers</span><span class="invisible"></span></a></p><p>Note that you'll need to have rclone on any system you want to access your files from.</p><p>Not sure if this qualifies as a QT or addendum to <a href="https://social.circl.lu/@quinn/114337209093756652" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">social.circl.lu/@quinn/1143372</span><span class="invisible">09093756652</span></a></p><p><a href="https://social.mkj.earth/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://social.mkj.earth/tags/rclone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rclone</span></a> <a href="https://social.mkj.earth/tags/CloudStorage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudStorage</span></a> <a href="https://social.mkj.earth/tags/EncryptedStorage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EncryptedStorage</span></a> <a href="https://social.mkj.earth/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a></p>
Em :official_verified:<p>New Privacy Guides article 🔐✊<br>by me:</p><p>Encryption Is Not a Crime</p><p>The war against encryption isn't new, but the quantity of data about us that needs protection is. </p><p>Despite the senseless attacks, <br>it is vital that we fight back to protect the right to using end-to-end encryption. </p><p>Encryption protects us all: <a href="https://www.privacyguides.org/articles/2025/04/11/encryption-is-not-a-crime/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">privacyguides.org/articles/202</span><span class="invisible">5/04/11/encryption-is-not-a-crime/</span></a></p><p><a href="https://infosec.exchange/tags/PrivacyGuides" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyGuides</span></a> <a href="https://infosec.exchange/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a> <a href="https://infosec.exchange/tags/RootForE2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RootForE2EE</span></a></p>
w00p<p><span class="h-card" translate="no"><a href="https://mastodon.social/@LukaszOlejnik" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>LukaszOlejnik</span></a></span> <br>Part of the proposed changes relates to how orgs are classified and governed under the existing surveillance law.<br>In the proposed revision, smaller Digital Service Providers such as Threema and Proton would be subjected to similar surveillance rules (and deadlines) as the bigger ISPs today.</p><p>They are against it, fearing (rightly) that it would impose significant costs on them, to handle authorities' requests and develop/deploy/maintain a surveillance infrastructure comparable to that already in place at bigger companies and ISPs such as Swisscom, Salt, etc.</p><p>The other change of the proposition, is the access of (near) real time metadata. </p><p>On the positive side, e2ee and message contents are explicitly excluded from the surveillance.</p><p>I'm curious to see what the final proposition will look like regarding the SMEs.</p><p><a href="https://infosec.exchange/tags/switzerland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>switzerland</span></a> <a href="https://infosec.exchange/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://infosec.exchange/tags/surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveillance</span></a> <a href="https://infosec.exchange/tags/threema" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threema</span></a> <a href="https://infosec.exchange/tags/proton" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proton</span></a> <a href="https://infosec.exchange/tags/law" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>law</span></a></p>
dynamic<p>Tech question: What event scheduling tools / platforms offer the best security against passive surveillance, and why?</p><p>(boosts welcome)</p><p><a href="https://social.coop/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.coop/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.coop/tags/e2e" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2e</span></a> <a href="https://social.coop/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a></p>
PrivacyDigest<p>Florida’s New <a href="https://mas.to/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> Bill Says the Quiet Part Out Loud and Demands an <a href="https://mas.to/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mas.to/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> <br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/florida" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>florida</span></a> <a href="https://mas.to/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://www.eff.org/deeplinks/2025/04/floridas-new-social-media-bill-says-quiet-part-out-loud-and-demands-encryption" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eff.org/deeplinks/2025/04/flor</span><span class="invisible">idas-new-social-media-bill-says-quiet-part-out-loud-and-demands-encryption</span></a></p>
René Mayrhofer :verified: 🇺🇦 🇹🇼<p>Sigh. We are, as a security community, making good progress on some old as well as some new topics. <a href="https://infosec.exchange/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a>, <a href="https://infosec.exchange/tags/Go" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Go</span></a>, and other memory safe systems languages are going well and having a real impact in reducing memory safety issues - which has been the most important security bug class for decades, and we are finally improving! Compartmentalization and isolation of processes and services have now become common knowledge and the minimum bar for new designs. Security and privacy by design are being honored in many new projects, and not just as lip service, but because the involved developers deeply believe in these principles nowadays. <a href="https://infosec.exchange/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a> is finally available to most end-users, both for messaging and backups.</p><p>And again and again, we are forced into having discussions (<a href="https://www.theregister.com/2025/04/03/eu_backdoor_encryption/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/04/03/eu_</span><span class="invisible">backdoor_encryption/</span></a>) about breaking all the progress.</p><p>Let me be clear for Nth time: <br>* We *cannot* build encryption systems that can only be broken by the "good guys". If they are not completely secure, foreign enemy states, organized crime, and intimate partners will break and abuse them as well. There is no halfway in this technology. Either it is secure or it isn't - for and against everybody.<br>* We *cannot* build safe, government-controlled censorship filters into our global messaging apps that are not totally broken under the assumption of (current or future) bad government policies and/or insider attacks at the technology providers (<a href="https://www.mayrhofer.eu.org/talk/insider-attack-resistance-in-the-android-ecosystem/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mayrhofer.eu.org/talk/insider-</span><span class="invisible">attack-resistance-in-the-android-ecosystem/</span></a>). Either one-to-one communication remains secure and private, or it doesn't (<a href="https://www.ins.jku.at/chatcontrol/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">ins.jku.at/chatcontrol/</span><span class="invisible"></span></a>).<br>* We *cannot* allow exploitation of open security vulnerabilities in smartphones or other devices for law enforcement. If they are not closed, they are exploitable by everybody. "Nobody but us" is an illusion, and makes everybody less secure.</p><p>My latest recorded public talk on the topic was <a href="https://www.mayrhofer.eu.org/talk/secure-messaging-and-attacks-against-it/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mayrhofer.eu.org/talk/secure-m</span><span class="invisible">essaging-and-attacks-against-it/</span></a>, and nothing factual has changed since then. Policymakers keep asking for a different technological reality than the one we live in, and that sort of thing doesn't tend to produce good, sustainable outcomes.</p><p>(Edited to only fix a typo. No content changes.)</p><p>CC <span class="h-card" translate="no"><a href="https://chaos.social/@epicenter_works" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>epicenter_works</span></a></span> <span class="h-card" translate="no"><a href="https://eupolicy.social/@edri" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>edri</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@suka_hiroaki" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>suka_hiroaki</span></a></span> <span class="h-card" translate="no"><a href="https://social.heise.de/@heisec" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>heisec</span></a></span> <span class="h-card" translate="no"><a href="https://ioc.exchange/@matthew_d_green" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>matthew_d_green</span></a></span> <span class="h-card" translate="no"><a href="https://eupolicy.social/@ilumium" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ilumium</span></a></span></p>
Scimmia di Mare<p><span class="h-card" translate="no"><a href="https://livellosegreto.it/@kenobit" class="u-url mention">@<span>kenobit</span></a></span> ho letto e condivido tutto.<br />Solo una accortezza: <a href="https://mastodon.uno/tags/XMPP" class="mention hashtag" rel="tag">#<span>XMPP</span></a> non è cifrato <a href="https://mastodon.uno/tags/E2EE" class="mention hashtag" rel="tag">#<span>E2EE</span></a>. Se posso fidarmi di te, non ho idea di chi sia il tuo host o, se lo tieni a casa, il tuo ISP.<br />Ed in ogni caso, a queste condizioni, compromettere un nodo significa esporre molta gente a rischio.</p>
Bhavani Shankar 💭<span class="h-card"><a class="u-url mention" href="https://fosstodon.org/@Mehrad" rel="nofollow noopener noreferrer" target="_blank">@<span>Mehrad</span></a></span> The market telegram has captured is file sharing and crypto groups. If you join a group you can see all history and files. It's difficult to achieve with <a class="hashtag" href="https://fe.disroot.org/tag/e2ee" rel="nofollow noopener noreferrer" target="_blank">#e2ee</a>
Mehrad :kde: :emacs: :rstats:<p>I wonder why <a href="https://fosstodon.org/tags/Telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telegram</span></a>'s normal chat are not encrypted. being E2EE key exchange is not a good excuse because both WhatsApp and Signal do <a href="https://fosstodon.org/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a> and they support multiple client.</p><p><a href="https://fosstodon.org/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> Effort To Keep <a href="https://mas.to/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://mas.to/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> Fight <a href="https://mas.to/tags/Secret" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Secret</span></a> Is Blocked - Slashdot <br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> </p><p><a href="https://apple.slashdot.org/story/25/04/07/1444256/uk-effort-to-keep-apple-encryption-fight-secret-is-blocked?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">apple.slashdot.org/story/25/04</span><span class="invisible">/07/1444256/uk-effort-to-keep-apple-encryption-fight-secret-is-blocked?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a></p>
Open Rights Group<p>ORG has joined 237 civil society groups, companies and cybersecurity experts in an open letter to members of the Swedish Riksdag.</p><p>We call on them to reject legislation that would force companies to undermine the encryption of their services.</p><p>Read more ⬇️</p><p><a href="https://www.globalencryption.org/2025/04/joint-letter-on-swedish-data-storage-and-access-to-electronic-information-legislation/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">globalencryption.org/2025/04/j</span><span class="invisible">oint-letter-on-swedish-data-storage-and-access-to-electronic-information-legislation/</span></a></p><p><a href="https://social.openrightsgroup.org/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://social.openrightsgroup.org/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://social.openrightsgroup.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.openrightsgroup.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
DVD e.V.<p>Die <a href="https://eupolicy.social/tags/DVD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DVD</span></a> hat zusammen mit über 235 NGO, akademischen und Cybersicherheits-Experten sowie Unternehmen einen offenen Brief zum schwedischen Gesetzentwurf zur Datenspeicherung und zum Zugriff auf elektrische Informationen an die Mitglieder des schwedischen Reichstags unterzeichnet, der heute versandt wurde.<br>Wir kämpfen weiter gegen die Versuche der Schwächung der Ende-zu-Ende-Verschlüsselung (<a href="https://eupolicy.social/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a>).<br>Zum offenen Brief:<br><a href="https://www.datenschutzverein.de/2025/04/offener-brief-zum-schwedischen-gesetzentwurf-zur-datenspeicherung-und-zum-zugriff-auf-elektrische-informationen/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">datenschutzverein.de/2025/04/o</span><span class="invisible">ffener-brief-zum-schwedischen-gesetzentwurf-zur-datenspeicherung-und-zum-zugriff-auf-elektrische-informationen/</span></a></p>