med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

419
active users

#encryption

18 posts18 participants1 post today

Encryption is a cornerstone of security on the modern internet. In this video we dive into how it works and explain why it's so important.

This is especially crucial as many governments around the world are pushing to ban encryption and breach our fundamental right to privacy.

privacyguides.org/videos/2025/

Magicwormhole was created by developer Brian Warner as a response to the overly complex ways people transfer files securely. Introduced in the mid-2010s, it aimed to make file transfers between devices as simple and trustworthy as handing a USB stick to someone next to you.

At its core, magicwormhole uses a concept called PAKE, or Password Authenticated Key Exchange, which allows two computers to establish a secure, encrypted channel over the internet using a short one-time code. That code acts as both an identifier and a temporary password, ensuring the connection can’t be intercepted or spoofed.

The project gained popularity in privacy and open source circles for its ease of use and its ability to work across firewalls, NAT, and without user accounts. Unlike most tools, it requires no setup, servers, or third-party cloud services. It simply connects you to the other device, does the job, and vanishes.

It remains one of the cleanest examples of what simple, privacy-respecting software can look like.

🔐 Android just got a quiet but powerful security upgrade: automatic reboots after 3 days of device inactivity.

Google has rolled out a new feature via Google Play Services: if an Android device remains locked for 3 consecutive days, it will now automatically reboot.

Why this matters:
Rebooting puts the phone back into the "Before First Unlock" state — where data remains fully encrypted and inaccessible without the passcode. This makes it significantly harder for anyone trying to extract sensitive data using forensic tools like Cellebrite or Magnet.

Apple introduced a similar feature last year, signaling a broader trend: both ecosystems are reinforcing protections against post-unlock data extraction, often used by law enforcement or threat actors.

This feature:

- Reduces exposure time after a phone is seized or stolen
- Restores full disk encryption status automatically
- Adds a layer of passive defense even if users don’t act

📱 At @Efani, we advocate for security that works even when you’re not paying attention. Automatic reboots after periods of inactivity are a subtle but smart move — one that helps prevent surveillance, data harvesting, and unauthorized access.

It’s not just about convenience anymore. It’s about digital self-defense by default.

Replied in thread

@movim @dominik

Note, that #OMEMO has been taken directly from Signal, only adapted for #XMPP.

Most modern #Jabber clients default to OMEMO for one-to-one conversations nowadays. For private groups, I believe, users still have to enable it explicitely.

I'm not aware of any public Jabber server that would still accept non-TLS connections, so you have both transport #encryption and #e2ee.

Register for Cyberside Chats: Live! Quantum Shift: How Cybersecurity Must Evolve Now!

Quantum computing is on the horizon, and it has the potential to revolutionize the way we think about cybersecurity. Join our April 23rd live session where cybersecurity experts @sherridavidoff and @MDurrin will dive into the implications of quantum technology on encryption and data security. Learn what steps security leaders should take today to prepare for this disruptive shift.

Don’t miss out on this opportunity to ask questions and stay ahead of emerging threats. Register now!

lmgsecurity.com/event/cybersid

cyberside live hot topics expert cybersecurity insights apr 25
LMG SecurityCyberside Chats: Live! Quantum Shift: How Cybersecurity Must Evolve Now | LMG SecurityIn this quick, high-impact session, we’ll dive into the top three cybersecurity priorities every leader should focus on. From integrating AI into your defenses to tackling deepfake threats and tightening third-party risk management, this discussion will arm you with the insights you need to stay secure in the year ahead.

The #encryption topic in #InstantMesaging is popular again recently. As usual there's a lot of misunderstanding and little discussion of a #ThreatModel when giving recommendations.
If the private key is backed up with Apple or Google from your phone, then your messages may as well not be encrypted 🙈 I've again seen this indirectly with contacts changing phones and their keys are the same as on their old device. Due to automatic backups I guess.
Doesn't matter if it's #WhatsApp, #Signal or #XMPP

If you're worried about where to host your data in Europe, remember that not all EU member states are created equal when it comes to encryption keys disclosure laws.

See the **Key Disclosure Law** page on Wikipedia[1] - the legislation that requires individuals to hand over cryptographic keys to law enforcement.

My top pick:
- Germany
- Iceland
- Belgium (see note on WP)
- Switzerland (yet)

[1]: en.wikipedia.org/wiki/Key_disc

en.wikipedia.orgKey disclosure law - Wikipedia

New Privacy Guides article 🔐✊
by me:

Encryption Is Not a Crime

The war against encryption isn't new, but the quantity of data about us that needs protection is.

Despite the senseless attacks,
it is vital that we fight back to protect the right to using end-to-end encryption.

Encryption protects us all: privacyguides.org/articles/202

www.privacyguides.org · Encryption Is Not a Crime
More from Em :official_verified: