lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

54
active users

#cryptography

5 posts5 participants0 posts today
Continued thread

Do #Apple folks out there at least know whether Messages (a.k.a. iMessage) on #iOS uses one of the above mentioned methods to provide end-to-end encryption of the content of push notifications (which in general contain portions of messages)? I know that the messages themselves are end-to-end encrypted, I'm specifically asking about the content of the notifications.

NEWSCARD: Decentralized, Encrypted Paste Bin via Usenet Newsgroups

NEWSCARD Publish and fetch permanent named records via Network News

Newscard creates a decentralized, encrypted, named record paste bin.

[git repo] https://codeberg.org/OCTADE/newscard (use most recent version only)

With a single command, name the card, snarf the file and encrypt it.

With another command, push the encrypted file to the public network.

With another short command, snarf a file from the network.

Only users knowing the name [key] of the record will be able to decrypt it.

If a strong passphrase is used to name the file, it will be very secure.

This is useful for quickly snarfing, encrypting, and publishing a text file:

$~: card enc [passphrase] [file]
$~: card put [passphrase]

It is useful for retrieving a text file with just a key:

$~: card get [passphrase]
$~: card show [passphrase]

If and when you want the general public to access the record just share the keyword.

Newscard uses nine (9) (NINE) layers of encryption with OpenSSL chacha20 cipher.

Newscard generates 9 each of: cipher keys, salts, key iteration parameters.

It would be nice if something like this were added to the ActivityPub protocol, such that keyword[@]host.url would do the same thing. Then secret text records could be stored securely for later retrieval or revelation.

#NewsCard #Pastebin #Usenet #NNTP #NetworkNews #Encryption #Cryptography #Messaging #Anonymity #Protocols #OpenSource #FreeSoftware #BlackHackJack #Censorship #Retro #InfoSec #Ciphers #Codes #FOSS

@infostorm@a.gup.pe @crypto@a.gup.pe @infosec@a.gup.pe @selfhosting@a.gup.pe

The war on crypto never ends. The war on privacy, civil rights, security and freedom of speech never ends.

This time we are dangerously close to lose. The "Child Sexual Abuse" (CSA) EU regulation proposal, more aptly nicknamed "ChatControl", will be voted AGAIN this October, and many countries who opposed it last year are now undecided. The proposal at its roots aims at allowing authorities to break end-to-end encryption for the usual reason: "because of the children". As a father of two, I am disgusted by this recurring, cheap rhetoric.

What you can do: patrick-breyer.de/en/posts/cha

#eu#CSA#CSAM

Why on earth was the #ActivityPub protocol even let out the door without a well-specified and mandatory graceful, non-destructive key rotation scheme?

Yes I know the privacy issues. Those are not valid reasons to not have such a mechanism; it's a valid reason to not enable or use one.

What we're stuck with now is a ton of instances with absurdly long, legacy-algorithm keys (RSA-4096) with no way to replace them with shorter/better keys without effectively losing everything ever posted on the instance.

The protocol is only 7 years old! EC crypto was well-established at the time, and should have been the default.

And what happens once everyone has to replace the keys, because RSA is broken by quantum computers (I know, probably 100 years to go)? The #Fediverse will be a wasteland, with no instances trusting anything from any other instance, so all #Federation breaks down.

Sorry if I got some details wrong about what the protocol says. If I get flamed to death for being wrong, then I'll consider that a Good Thing(TM). I've been trying to find a way to rotate/replace keys for a while and all my searching turns up is either 1) confirmation that most people don't know or care about cryptography, or 2) https://socialhub.activitypub.rocks/t/key-rotation-notification/562 - which really isn't helpful.

If it is possible to gracefully rotate the key(s) of an instance/user, there really has to exist some documentation that explains clearly how to implement this in a server and how to exercise it as a server operator.

pleroma.anduin.netAnduin.net

is it weird that "I built a toy cryptography system" is treated sooo much worse compared to "I built a hobby kernel", or "I built a toy DB" or "I built an orchestrator for my home lab"? I've seen people be like "just use postgres/sqlite", sure - but that's different from "[clutches pearls], No SQL? How dare you. Perish the thought! It's not ACID! How will we ever... Never use this in production. Microkernels? They'll never be practical!"

Interested in theoretical cryptography and/or formal methods? Boston University is hosting a summer school on Universally Composable Security and the EasyUC framework for formalizing UC models and proofs.

The school is from August 11 - 14, 2025. Registration is free, and we're supporting both in person and Zoom participation.

For more information and to register, visit:

bu.edu/riscs/events/uc-easyuc-

www.bu.eduUC/EasyUC Summer School | Center for Reliable Information Systems & Cyber Security

I proposed a way to incorporate Sender Authentication in age with the following advantages:

  1. No catch-22 between encryption and signing (no rebinding attacks)
  2. You have to be able to decrypt the message to verify the sender
  3. No new cryptographic primitives (e.g., signcryption)
  4. No in-band signaling or downgrade attacks

However, it does have one requirement that people accustomed to PGP use cases (and tolerant of PGP footguns) may find annoying:

You must know, in advance, the public key of the sender in order to be able to decrypt the message.

github.com/FiloSottile/age/dis

GitHubSender Authentication · FiloSottile age · Discussion #640This is a rough draft proposal for implementing Sender Authentication in age without introducing any new cryptographic primitives. This has previously been discussed on Cryptography Dispatches and ...

OSIRIS, the student-run #cybersecurity research lab at NYU, is seeking #challenge writers for our upcoming CSAW #CTF later this year! (For those who don't know CSAW, it's one of the largest student-run #cybersec events in the world: csaw.io ) Web, #ReverseEngineering, #pwn, and #cryptography challenges are prioritized, and all experience levels welcome. Interested? Shoot me a DM or email osiris@osiris.cyber.nyu.edu.

CSAWHome | CSAWCSAW is the most comprehensive student-run cyber security event in the world, featuring 8 cyber competitions, workshops, and industry events. Final events are hosted by 5 global academic centers.

🎙️✨ Why #Community Could Be the Strongest Defense in #Cybersecurity
An ITSPmagazine Brand Story with Rob Clyde from ISACA | #RSAC2025

In the rush to cover #AI, #cryptography, and quantum threats, it’s easy to forget that the cybersecurity profession is—above all else—human. That’s exactly why this conversation with Rob Clyde, Board Director at ISACA, stood out during Sean Martin, CISSP and Marco Ciappelli's post-event reflections from #RSAC Conference 2025.

This Brand Story goes beyond the headlines, diving into the real issues affecting our industry: burnout, mental health, the shrinking sense of community, and the looming threat of quantum risk. Rob shares why ISACA continues to prioritize connection, education, and support at every stage of a professional’s journey.

🙌 A big thank you to ISACA for sponsoring our RSAC 2025 coverage. Your support helped make conversations like this possible.

🎥 Watch the episode: youtu.be/iw6MAwP8VA4
🎧 Listen to the podcast: brand-stories-podcast.simpleca
📝 Read the full article: itspmagazine.com/their-stories

We’re still looking back at #RSAC2025 — and we’re also getting ready for Infosecurity Europe. Stay tuned.