Hacker News with Generative AI: Encryption

Let's Encrypt is 10 years old now (letsencrypt.org)
Vital personal and business information flows over the Internet more frequently than ever, and we don’t always know when it’s happening. It’s clear at this point that encrypting is something all of us should be doing. Then why don’t we use TLS (the successor to SSL) everywhere? Every browser in every device supports it. Every server in every data center supports it. Why don’t we just flip the switch?
Australia increasingly hostile toward secure messaging apps (theguardian.com)
The founder of an encrypted messaging app who left Australia for Switzerland after police unexpectedly visited an employee’s home says he had left because of Australia’s “hostile” stance against developers building privacy-focused apps.
Show HN: Fireproof – local-first database with Git-like encrypted sync (fireproof.storage)
Quickly add live data to any app or page.
Hyrumtoken: A Go package to encrypt pagination tokens (github.com/ssoready)
hyrumtoken is a Go package to encrypt pagination tokens, so that your API clients can't depend on their contents, ordering, or any other characteristics.
Encrypted messaging app dev leaves Australia after police visit employee's home (theguardian.com)
The founder of an encrypted messaging app who left Australia for Switzerland after police unexpectedly visited an employee’s home says he had left because of Australia’s “hostile” stance against developers building privacy-focused apps.
The sins of the 90s: Questioning a puzzling claim about mass surveillance (cr.yp.to)
Meredith Whittaker, president of the Signal Foundation, gave an interesting talk at NDSS 2024 titled "AI, Encryption, and the Sins of the 90s".
Show HN: I created a web app to encrypt/decrypt messages using Web Crypto API (vercel.app)
It's a Web Crypto API experiment to encrypt/decrypt messages using public and private keys.
Harvest Now, Decrypt Later (wikipedia.org)
Harvest now, decrypt later, also known as store now, decrypt later or retrospective decryption, is a surveillance strategy that relies on the acquisition and long-term storage of currently unreadable encrypted data awaiting possible breakthroughs in decryption technology that would render it readable in the future - a hypothetical date referred to as Y2Q (a reference to Y2K) or Q-Day.
Chinese researchers break RSA encryption with a quantum computer (csoonline.com)
In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems.
Secure Web Sockets (ycombinator.com)
Hello, I am trying to implement encrypted messaging into my Python/Flask app. I want to use public key encryption. What is a good library I can use to implement it?
SpiderOak announces open-source initiative for zero-trust cybersecurity (spacenews.com)
WASHINGTON — The cybersecurity firm SpiderOak announced Oct. 17 that it will make its encryption-based software open source.
Chinese researchers break RSA encryption with a quantum computer (csoonline.com)
In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems.
Should We Chat, Too? Security Analysis of WeChat's Mmtls Encryption Protocol (citizenlab.ca)
WeChat, with over 1.2 billion monthly active users, stands as the most popular messaging and social media platform in China and third globally.
Chinese researchers break RSA encryption with a quantum computer (csoonline.com)
In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems.
Chinese researchers break RSA encryption with a quantum computer (csoonline.com)
In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems.
Chinese Scientists: We Used Quantum Computer To Hack Military-Grade Encryption (thequantuminsider.com)
Chinese scientists have successfully mounted what they claim is the world’s first effective attack using a quantum computer on widely used encryption methods, according to a report from the South China Morning Post (SCMP). The researchers did acknowledge that limitations would hamper — at least for now — a full-on quantum hack.
End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem (brokencloudstorage.info)
Cloud storage is ubiquitous: Google Drive, Dropbox, and OneDrive are household names. However, these services do not provide end-to-end encryption (E2EE), meaning that the provider has access to the data stored on their servers. The promise of end-to-end encrypted cloud storage is that users can have the best of both worlds, keeping control of their data using cryptographic techniques, while still benefiting from low-cost storage solutions.
Catastrophic hack of AT&T and Verizon proof Apple is right about encryption (bgr.com)
For years, Apple has implemented strong encryption in the iPhone and most of its other products, resisting requests from Western governments to build backdoors into its encrypted software.
Neo-Nazis head to encrypted SimpleX Chat app, bail on Telegram (wired.com)
Dozens of neo-Nazis are fleeing Telegram and moving to a relatively unknown secret chat app that has received funding from Twitter founder Jack Dorsey.
Neo-Nazis head to encrypted SimpleX Chat app, bail on Telegram (wired.com)
Dozens of neo-Nazis are fleeing Telegram and moving to a relatively unknown secret chat app that has received funding from Twitter founder Jack Dorsey.
ZFS native encryption is currently broken for encrypted backups (ycombinator.com)
There are various issues on ZFS native encryption. ZFS native encryption has been especially buggy when raw encrypted zfs snapshots are being sent or received.
Show HN: 64.surf – share files using only the URL (64.surf)
Upload, encrypt, and share, all from the URL.
Ask HN: Windows Backup Solution? (ycombinator.com)
I am struggling to find a working windows backup solution. I'd like to backup my entire Win11 install to a big USB drive, have the drive be encrypted (or the backup encrypted) and have it be a simple tool.
A new path for Kyber on the web for Chrome (googleblog.com)
Chrome will switch from supporting Kyber to ML-KEM
Defend against vampires with 10 gbps network encryption (synacktiv.com)
Discover how attackers can sniff your data on network cables and how you can defend against it, by encrypting on-the-fly all your ethernet traffic with very good performance.
Show HN: Subtle.sh – Zero-setup E2E encrypted messaging using OpenPGP and Soketi (subtle.sh)
<h1>Send encrypted messages without leaving a trace.</h1>
ASIO warning big tech companies they may be forced to unlock encrypted chats (abc.net.au)
ASIO head, Mike Burgess, says he may soon use powers to compel tech companies to cooperate with warrants and unlock encrypted chats to aid in national security investigations.
Danish Justice Minister Under Fire for Pushing Encryption Ban While Using It (reclaimthenet.org)
Authenticated Boot and Disk Encryption on Linux (2021) (0pointer.net)
Encryption in France (at-ica.com)