Hacker News with Generative AI: Encryption

Encryption backdoor debate done and dusted, former White House tech advisor says (theregister.com)
In the wake of the Salt Typhoon hacks, which lawmakers and privacy advocates alike have called the worst telecoms breach in America's history, the US government agencies have reversed course on encryption.
Dumping Memory to Bypass BitLocker on Windows 11 (noinitrd.github.io)
In this article I will demonstrate how to bypass BitLocker encryption on Windows 11 (version 24H2). This was accomplished by extracting full volume encryption keys (FVEK) from memory using my tool Memory-Dump-UEFI.
Breaking NATO Radio Encryption [video] (media.ccc.de)
We present fatal security flaws in the HALFLOOP-24 encryption algorithm, which is used by the US military and NATO. HALFLOOP-24 was meant to safeguard the automatic link establishment protocol in high frequency radio, but our research demonstrates that merely two hours of intercepted radio traffic are sufficient to recover the secret key.
SQLCipher – SQLite library that adds 256 bit AES encryption of database files (github.com/sqlcipher)
AI, Encryption, and the Sins of the 90s (ndss-symposium.org)
Looking back to the “Crypto Wars” of the 90s, Meredith Whittaker gave a clear and informed perspective on the political, technical, and commercial pressures that have shaped our current encryption policy landscape.
Was the US Telecom Breach Inevitable, Proving Backdoors Can't Be Secure? (theintercept.com)
Hackers have gained sweeping access to U.S. text messages and phone calls — and in response, the FBI is falling back on the same warmed-over, bad advice about encryption that it has trotted out for years.
FBI Official Reluctantly Touts Encryption Due to Chinese Hack of US Telecoms (techdirt.com)
Thanks to government-mandated backdoors in US telecom/broadband services, the FBI — at least in the form of an official who refused to identify themself — has had to recommend (albeit extremely half-heartedly) that encrypted communications are perhaps the only thing keeping phone owners from being actively surveilled by Chinese hackers.
'Shame on Google for Their Description of Google Messages's Encryption Support' (daringfireball.net)
While writing the previous item regarding the FBI encouraging the use of E2EE text and call protocols, I wound up at the Play Store page for Google Messages. It’s shamefully misleading regarding Google Messages’s support for end-to-end encryption.
FBI Warns iPhone and Android Users–Stop Sending Texts (forbes.com)
US citizens urged to use encryption, given attacks
US Senators implore Department of Defense to expand the use of Matrix (element.io)
This week the FBI, the US Cybersecurity and Infrastructure Security Agency (CISA) and partner agencies in New Zealand, Australia and Canada began advocating for the use of end-to-end encrypted (E2EE) communications.
Git-crypt – transparent file encryption in Git (agwa.name)
git-crypt enables transparent encryption and decryption of files in a git repository. Files which you choose to protect are encrypted when committed, and decrypted when checked out. git-crypt lets you freely share a repository containing a mix of public and private content. git-crypt gracefully degrades, so developers without the secret key can still clone and commit to a repository with encrypted files.
Key transparency and the right to be forgotten (soatok.blog)
This post is the first in a new series covering some of the reasoning behind decisions made in my project to build end-to-end encryption for direct messages on the Fediverse.
Let's Encrypt is 10 years old now (letsencrypt.org)
Vital personal and business information flows over the Internet more frequently than ever, and we don’t always know when it’s happening. It’s clear at this point that encrypting is something all of us should be doing. Then why don’t we use TLS (the successor to SSL) everywhere? Every browser in every device supports it. Every server in every data center supports it. Why don’t we just flip the switch?
Australia increasingly hostile toward secure messaging apps (theguardian.com)
The founder of an encrypted messaging app who left Australia for Switzerland after police unexpectedly visited an employee’s home says he had left because of Australia’s “hostile” stance against developers building privacy-focused apps.
Show HN: Fireproof – local-first database with Git-like encrypted sync (fireproof.storage)
Quickly add live data to any app or page.
Hyrumtoken: A Go package to encrypt pagination tokens (github.com/ssoready)
hyrumtoken is a Go package to encrypt pagination tokens, so that your API clients can't depend on their contents, ordering, or any other characteristics.
Encrypted messaging app dev leaves Australia after police visit employee's home (theguardian.com)
The founder of an encrypted messaging app who left Australia for Switzerland after police unexpectedly visited an employee’s home says he had left because of Australia’s “hostile” stance against developers building privacy-focused apps.
The sins of the 90s: Questioning a puzzling claim about mass surveillance (cr.yp.to)
Meredith Whittaker, president of the Signal Foundation, gave an interesting talk at NDSS 2024 titled "AI, Encryption, and the Sins of the 90s".
Show HN: I created a web app to encrypt/decrypt messages using Web Crypto API (vercel.app)
It's a Web Crypto API experiment to encrypt/decrypt messages using public and private keys.
Harvest Now, Decrypt Later (wikipedia.org)
Harvest now, decrypt later, also known as store now, decrypt later or retrospective decryption, is a surveillance strategy that relies on the acquisition and long-term storage of currently unreadable encrypted data awaiting possible breakthroughs in decryption technology that would render it readable in the future - a hypothetical date referred to as Y2Q (a reference to Y2K) or Q-Day.
Chinese researchers break RSA encryption with a quantum computer (csoonline.com)
In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems.
Secure Web Sockets (ycombinator.com)
Hello, I am trying to implement encrypted messaging into my Python/Flask app. I want to use public key encryption. What is a good library I can use to implement it?
SpiderOak announces open-source initiative for zero-trust cybersecurity (spacenews.com)
WASHINGTON — The cybersecurity firm SpiderOak announced Oct. 17 that it will make its encryption-based software open source.
Chinese researchers break RSA encryption with a quantum computer (csoonline.com)
In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems.
Should We Chat, Too? Security Analysis of WeChat's Mmtls Encryption Protocol (citizenlab.ca)
WeChat, with over 1.2 billion monthly active users, stands as the most popular messaging and social media platform in China and third globally.
Chinese researchers break RSA encryption with a quantum computer (csoonline.com)
In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems.
Chinese researchers break RSA encryption with a quantum computer (csoonline.com)
In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems.
Chinese Scientists: We Used Quantum Computer To Hack Military-Grade Encryption (thequantuminsider.com)
Chinese scientists have successfully mounted what they claim is the world’s first effective attack using a quantum computer on widely used encryption methods, according to a report from the South China Morning Post (SCMP). The researchers did acknowledge that limitations would hamper — at least for now — a full-on quantum hack.
End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem (brokencloudstorage.info)
Cloud storage is ubiquitous: Google Drive, Dropbox, and OneDrive are household names. However, these services do not provide end-to-end encryption (E2EE), meaning that the provider has access to the data stored on their servers. The promise of end-to-end encrypted cloud storage is that users can have the best of both worlds, keeping control of their data using cryptographic techniques, while still benefiting from low-cost storage solutions.
Catastrophic hack of AT&T and Verizon proof Apple is right about encryption (bgr.com)
For years, Apple has implemented strong encryption in the iPhone and most of its other products, resisting requests from Western governments to build backdoors into its encrypted software.