Tag: encryption practices
-
Schneier on Security: Short-Lived Certificates Coming to Let’s Encrypt
Source URL: https://www.schneier.com/blog/archives/2024/12/short-lived-certificates-coming-to-lets-encrypt.html Source: Schneier on Security Title: Short-Lived Certificates Coming to Let’s Encrypt Feedly Summary: Starting next year: Our longstanding offering won’t fundamentally change next year, but we are going to introduce a new offering that’s a big shift from anything we’ve done before—short-lived certificates. Specifically, certificates with a lifetime of six days. This…
-
Schneier on Security: Criminals Exploiting FBI Emergency Data Requests
Source URL: https://www.schneier.com/blog/archives/2024/11/criminals-exploiting-fbi-emergency-data-requests.html Source: Schneier on Security Title: Criminals Exploiting FBI Emergency Data Requests Feedly Summary: I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too. Turns out the same…
-
Hacker News: Pavel Durov and the Blackberry Ratchet
Source URL: https://www.oblomovka.com/wp/2024/08/25/pavel-durov-and-the-blackberry-ratchet/ Source: Hacker News Title: Pavel Durov and the Blackberry Ratchet Feedly Summary: Comments AI Summary and Description: Yes Summary: The text examines the challenges faced by messaging services like Telegram and Blackberry due to their encryption practices and how government scrutiny is influenced by the perceived security of these platforms. It argues…