Cryptography (crypto) group
-
Kitchener-Waterloo Cryptography Interest Group (kwcrypto@sn.jonkman.ca)'s status on Saturday, 18-Nov-2017 21:38:31 UTC Kitchener-Waterloo Cryptography Interest Group ♻ @rtsn@gnusocial.de: A PGP keypair consists of multiple keys, the certificate, encrypting keys, signing keys etc. I personally have setup where I have an offline masterkey (for signing keys and creating new subkeys) and then I have signing subkeys on my everyday devices. Should my everyday computer be compromised in any way, I can just go home and revoke the subkey, create a new one and not loose the reputation associated with my master key. ¶ !crypto !GnuPG -
Jens Kubieziel (qbi@quitter.se)'s status on Monday, 30-Oct-2017 21:49:46 UTC Jens Kubieziel TLS fingerprints:
https://tlsfingerprint.io/top/
!security !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Monday, 09-Oct-2017 05:23:32 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca How To Create an Encrypted Drive in a File Container http://bob.jonkman.ca/blogs/2017/10/09/how-to-create-an-encrypted-drive-in-a-file-container/ !crypto -
Jens Kubieziel (qbi@quitter.se)'s status on Wednesday, 04-Oct-2017 20:29:28 UTC Jens Kubieziel Wie man #scrypt richtig anwendet, hat @FiloSottile getestet:
https://blog.filippo.io/the-scrypt-parameters/
!crypto !verschluesselung -
drymer (drymer@social.daemons.it)'s status on Friday, 22-Sep-2017 06:23:27 UTC drymer ISO Rejects NSA Encryption Algorithms - Schneier on Security - https://www.schneier.com/blog/archives/2017/09/iso_rejects_nsa.html !crypto !privacy -
Kitchener-Waterloo Cryptography Interest Group (kwcrypto@sn.jonkman.ca)'s status on Thursday, 21-Sep-2017 14:32:51 UTC Kitchener-Waterloo Cryptography Interest Group Almost a good thing: "NSA has now agreed to drop all but [the techniques] *least* likely to be vulnerable to hacks" http://www.reuters.com/article/us-cyber-standards-insight/distrustful-u-s-allies-force-spy-agency-to-back-down-in-encryption-fight-idUSKCN1BW0GV !Crypto via @HNTooter@mastodon.social -
netmackan (netmackan@quitter.se)'s status on Wednesday, 20-Sep-2017 08:54:32 UTC netmackan Just published our master's thesis student's paper on Post-Quantum Cryptography for digital signatures in PKI !crypto http://qttr.at/1y73 -
ziggys (ziggys@bobinas.p4g.club)'s status on Sunday, 10-Sep-2017 15:42:25 UTC ziggys Porque en p4g decimos malas palabras y otras guarangadas, hemos tenido que crear una sala #xmpp con cifrado #openpgp ¡Ahora estamos más tranquilos! Creo. !xmppes !privacidad !crypto !p4g -
Jens Kubieziel (qbi@quitter.se)'s status on Wednesday, 16-Aug-2017 07:19:09 UTC Jens Kubieziel #OpenSSL nutzt ab einen neuen Zufallszahlengenerator:
https://www.openssl.org/blog/blog/2017/08/12/random/
!crypto !verschluesselung -
Jens Kubieziel (qbi@quitter.se)'s status on Friday, 11-Aug-2017 06:41:55 UTC Jens Kubieziel Is your encrypted USB drive secure? – Forscher greifen vermeintlich sichere sticks an https://quitter.se/url/4282847
!security !crypto -
Jens Kubieziel (qbi@quitter.se)'s status on Saturday, 05-Aug-2017 17:53:49 UTC Jens Kubieziel Loup Vaillant hat es getan. Selbst !crypto code geschrieben. Seine Erfahrungen
http://loup-vaillant.fr/articles/implemented-my-own-crypto -
ziggys (ziggys@bobinas.p4g.club)'s status on Thursday, 03-Aug-2017 23:26:15 UTC ziggys Con los muchachos de la pandilla cuatro gatos nos hemos puesto a probar esta excelente aplicación de mensajería cifrada descentralizada con cifrado e2e https://smokeappope.sourceforge.io/ Es una joyita !privacidad !bobinas !p4g !crypto -
kaveh (kaveh@mblog.kavehmoravej.com)'s status on Thursday, 03-Aug-2017 20:01:04 UTC kaveh A brief history of GnuPG: vital to online security but free and underfunded:
http://theconversation.com/a-brief-history-of-gnupg-vital-to-online-security-but-free-and-underfunded-80800
!crypto -
Jens Kubieziel (qbi@quitter.se)'s status on Friday, 28-Jul-2017 18:58:50 UTC Jens Kubieziel Ich erkläre dem Kind Verschlüsselung und es erfindet mal eben Replay-Angriffe. !crypto -
pettter ✅ (pettter@social.umeahackerspace.se)'s status on Friday, 28-Jul-2017 14:40:54 UTC pettter ✅ "Moxie Marlinspike responded that Signal is "working on an entirely new group mechanism that we should be deploying soon"."
Aaaaaany day now.
https://web-in-security.blogspot.se/2017/07/insecurities-of-whatsapps-signals-and.html
!crypto !security -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Wednesday, 26-Jul-2017 18:30:23 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca At the @UWCrysp seminar with @RossJAnderson, #nerdrockstar of !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Friday, 07-Jul-2017 07:03:52 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca "vulnerability in a GnuPG cryptographic library" does not mean "completely break RSA-1024" http://thehackernews.com/2017/07/gnupg-libgcrypt-rsa-encryption.html !crypto !GnuPG -
Kitchener-Waterloo Cryptography Interest Group (kwcrypto@sn.jonkman.ca)'s status on Friday, 07-Jul-2017 01:33:36 UTC Kitchener-Waterloo Cryptography Interest Group On 26 July @RossJAnderson is coming to @UWCrysp to speak on "Making Security Sustainable" https://crysp.uwaterloo.ca/speakers/20170726-Anderson !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Monday, 26-Jun-2017 16:21:19 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @caparsons A kindly lesson for you non-techies about encryption http://blog.erratasec.com/2017/06/a-kindly-lesson-for-you-non-techies.html ¶ via #Twitter !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Sunday, 11-Jun-2017 01:16:14 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca #Dudle looks really interesting, with its !crypto. But I don't want to impose registration on participants.