How encryption for Cinema Movies works
(serverless.industries)
The Cinema Industry is using its own standards for creating and distributing movies in a secure way. The DCI (Digital Cinema Initiatives) specification defines everything from file formats and encryption to the projection systems itself.
The Cinema Industry is using its own standards for creating and distributing movies in a secure way. The DCI (Digital Cinema Initiatives) specification defines everything from file formats and encryption to the projection systems itself.
Florida's New Social Media Bill Demands an Encryption Backdoor
(techdirt.com)
At least Florida’s SB 868/HB 743, “Social Media Use By Minors” bill isn’t beating around the bush when it states that it would require “social media platforms to provide a mechanism to decrypt end-to-end encryption when law enforcement obtains a subpoena.”
At least Florida’s SB 868/HB 743, “Social Media Use By Minors” bill isn’t beating around the bush when it states that it would require “social media platforms to provide a mechanism to decrypt end-to-end encryption when law enforcement obtains a subpoena.”
Encryption Is Not a Crime
(privacyguides.org)
Contrary to what some policymakers seem to believe, whether naively or maliciously, encryption is not a crime. Anyone asserting encryption is a tool for crime is either painfully misinformed or is attempting to manipulate legislators to gain oppressive power over the people.
Contrary to what some policymakers seem to believe, whether naively or maliciously, encryption is not a crime. Anyone asserting encryption is a tool for crime is either painfully misinformed or is attempting to manipulate legislators to gain oppressive power over the people.
AES and ChaCha
(phase.dev)
A technical deep dive into how the ChaCha20 cipher is taking on AES as the gold standard for symmetric encryption, and a lesson about the power of simplicity in cryptographic design.
A technical deep dive into how the ChaCha20 cipher is taking on AES as the gold standard for symmetric encryption, and a lesson about the power of simplicity in cryptographic design.
DragonFlyBSD Lands "Next-Gen" Disk Encryption Code
(phoronix.com)
It's been a while since having any exciting feature development to talk about with DragonFlyBSD but merged this past week was dm_target_crypt_ng, a next-generation implementation of their DM-crypt code for disk encryption.
It's been a while since having any exciting feature development to talk about with DragonFlyBSD but merged this past week was dm_target_crypt_ng, a next-generation implementation of their DM-crypt code for disk encryption.
Florida's New Social Media Bill Explicitly Demands an Encryption Backdoor
(eff.org)
At least Florida’s SB 868/HB 743, “Social Media Use By Minors” bill isn’t beating around the bush when it states that it would require “social media platforms to provide a mechanism to decrypt end-to-end encryption when law enforcement obtains a subpoena.”
At least Florida’s SB 868/HB 743, “Social Media Use By Minors” bill isn’t beating around the bush when it states that it would require “social media platforms to provide a mechanism to decrypt end-to-end encryption when law enforcement obtains a subpoena.”
Apple has won legal battle in UK to disclose backdoor publicly
(theverge.com)
Apple has won its first legal battle over the UK’s demand for a backdoor to encrypted data: the right to tell everyone it’s happening.
Apple has won its first legal battle over the UK’s demand for a backdoor to encrypted data: the right to tell everyone it’s happening.
WhatsApp MCP Exploited
(invariantlabs.ai)
This blog post demonstrates how an untrusted MCP server can attack and exfiltrate data from an agentic system that is also connected to a trusted WhatsApp MCP instance, side-stepping WhatsApp's encryption and security measures.
This blog post demonstrates how an untrusted MCP server can attack and exfiltrate data from an agentic system that is also connected to a trusted WhatsApp MCP instance, side-stepping WhatsApp's encryption and security measures.
Gmail E2E is as terrible as expected
(sapka.pl)
Google announced that end-to-end encryption would be coming to Gmail.
Google announced that end-to-end encryption would be coming to Gmail.
Google unveils end-to-end messages for Gmail. Only thing is: It's not true E2EE
(arstechnica.com)
When Google announced Tuesday that end-to-end encrypted messages were coming to Gmail for business users, some people balked, noting it wasn’t true E2EE as the term is known in privacy and security circles. Others wondered precisely how it works under the hood.
When Google announced Tuesday that end-to-end encrypted messages were coming to Gmail for business users, some people balked, noting it wasn’t true E2EE as the term is known in privacy and security circles. Others wondered precisely how it works under the hood.
European Commission pushes for encryption 'backdoors'
(brusselssignal.eu)
The European Commission has announced new plans for extending the powers of European Union security agencies and expanding Europol into “a truly operational police agency”.
The European Commission has announced new plans for extending the powers of European Union security agencies and expanding Europol into “a truly operational police agency”.
European Commission takes aim at end-to-end encryption
(therecord.media)
The European Commission announced on Tuesday its intention to join the ongoing debate about lawful access to data and end-to-end encryption while unveiling a new internal security strategy aimed to address ongoing threats.
The European Commission announced on Tuesday its intention to join the ongoing debate about lawful access to data and end-to-end encryption while unveiling a new internal security strategy aimed to address ongoing threats.
Gmail is making it easier for businesses to send encrypted emails
(theverge.com)
Google is updating Gmail to allow enterprise users to send encrypted messages to any inbox in just a few clicks.
Google is updating Gmail to allow enterprise users to send encrypted messages to any inbox in just a few clicks.
Fix U.S. National Security
(github.com/signalapp)
This pull request introduces a COMSEC (communications security) advisory banner to chat threads, reminding specific pool of users that Signal—despite its robust encryption—is not an appropriate venue for discussing classified information, coordinating military operations, or engaging in off-the-books foreign policy.
This pull request introduces a COMSEC (communications security) advisory banner to chat threads, reminding specific pool of users that Signal—despite its robust encryption—is not an appropriate venue for discussing classified information, coordinating military operations, or engaging in off-the-books foreign policy.
Trump calls Signal chat fallout a 'witch hunt',says 'app could be defective'
(apnews.com)
President Donald Trump downplayed the Signal chat leak Wednesday as a “witch hunt” and said, without evidence, that the encrypted messaging app “could be defective” as his administration struggles to stem the fallout.
President Donald Trump downplayed the Signal chat leak Wednesday as a “witch hunt” and said, without evidence, that the encrypted messaging app “could be defective” as his administration struggles to stem the fallout.
CIA Director Reveals Signal Comes Installed on Agency Computers
(theintercept.com)
For years, U.S. officials villainized end-to-end encrypted messaging apps like Signal as the domain of criminals and terrorists and a threat to national security.
For years, U.S. officials villainized end-to-end encrypted messaging apps like Signal as the domain of criminals and terrorists and a threat to national security.
NSA warned of vulnerabilities in Signal app a month before Houthi strike chat
(cbsnews.com)
The National Security Agency sent out an operational security special bulletin to its employees in February 2025 warning them of vulnerabilities in using the encrypted messaging application Signal, according to internal NSA documents obtained by CBS News.
The National Security Agency sent out an operational security special bulletin to its employees in February 2025 warning them of vulnerabilities in using the encrypted messaging application Signal, according to internal NSA documents obtained by CBS News.
The Practical Limitations of End-to-End Encryption
(soatok.blog)
Internet discussions about end-to-end encryption are plagued by misunderstandings, misinformation, and some people totally missing the point.
Internet discussions about end-to-end encryption are plagued by misunderstandings, misinformation, and some people totally missing the point.
More Countries Are Demanding Back-Doors to Encrypted Apps
(schneier.com)
Last month I wrote about the UK forcing Apple to break its Advanced Data Protection encryption in iCloud. More recently, both Sweden and France are contemplating mandating back doors. Both initiatives are attempting to scare people into supporting back doors, which are—of course—are terrible idea.
Last month I wrote about the UK forcing Apple to break its Advanced Data Protection encryption in iCloud. More recently, both Sweden and France are contemplating mandating back doors. Both initiatives are attempting to scare people into supporting back doors, which are—of course—are terrible idea.
Chunking Attacks on Tarsnap (and Others)
(daemonology.net)
Ten years ago I wrote that it would require someone smarter than me to extract information from the way that Tarsnap splits data into chunks.
Ten years ago I wrote that it would require someone smarter than me to extract information from the way that Tarsnap splits data into chunks.
France rejects backdoor mandate
(eff.org)
In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking.
In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking.
Deniable Encryption
(wikipedia.org)
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.
RCS Encryption: A Leap Towards Secure and Interoperable Messaging
(gsma.com)
In my last post, ‘RCS Now in iOS: a New Chapter for Mobile Messaging‘, I celebrated the integration of Rich Communication Services (RCS) with Apple’s iOS 18, a culmination of years of collaboration across mobile operators, device manufacturers, and technology providers. Today, I am pleased to announce the next milestone: the availability of new GSMA specifications for RCS that include end-to-end encryption (E2EE) based on the Messaging Layer Security (MLS) protocol.
In my last post, ‘RCS Now in iOS: a New Chapter for Mobile Messaging‘, I celebrated the integration of Rich Communication Services (RCS) with Apple’s iOS 18, a culmination of years of collaboration across mobile operators, device manufacturers, and technology providers. Today, I am pleased to announce the next milestone: the availability of new GSMA specifications for RCS that include end-to-end encryption (E2EE) based on the Messaging Layer Security (MLS) protocol.
RCS texting updates will bring end-to-end encryption to green bubble chats
(arstechnica.com)
Now that Apple is on board, iPhones and their users can also benefit from continued improvements to the RCS standard. And one major update was announced today: RCS will now support end-to-end encryption using the Messaging Layer Security (MLS) protocol, a standard finalized by the Internet Engineering Task Force in 2023.
Now that Apple is on board, iPhones and their users can also benefit from continued improvements to the RCS standard. And one major update was announced today: RCS will now support end-to-end encryption using the Messaging Layer Security (MLS) protocol, a standard finalized by the Internet Engineering Task Force in 2023.
Apple's alleged UK encryption battle sparks political and privacy backlash
(theregister.com)
US politicians and privacy campaigners are calling for the private hearing between Apple and the UK government regarding its alleged encryption-busting order to be aired in public.
US politicians and privacy campaigners are calling for the private hearing between Apple and the UK government regarding its alleged encryption-busting order to be aired in public.