Dropsafe

by Alec Muffett

  • Resources
    • A Primer for End-to-End Encryption
    • A “Duck Test” for End-to-End Secure Messaging
    • Why Privacy will always be more impactful than Safety
    • Muffett on Passwords
    • Pre-Flight Travel Checklist
  • About
    • About
    • Login
    • FAQs
  • Search
  • RSS
    • RSS (All)
    • RSS (Comments)
  • @naomicfisher on screen time

    2022/08/06 18:49:29 BST

    Unrolled When parents talk to me about gaming and screens, it’s always about fear. ‘Will they get addicted?’ they ask me. ‘I can’t control my own use, how can a child do it?’. There’s so much fear that we have no time to talk about the benefits. So here are some of the things I

    (more…)

    children screentime
  • All Watched Over By Filters Of Loving Grace: GCHQ’s Holistic, Sociotechnical , “Thoughts on Child Safety on Commodity Platforms” end-to-end #encryption #ghost #NCSC #ghostProtocol

    2022/07/21 00:00:00 BST

    nb: links will be updated in this blog to point at the paper and supporting material, as/when such become apparent Well, it finally landed, and I can’t say that I am terribly surprised: Ian Levy and Crispin Robinson have produced a 70 page document which blends describing the processes of identifying and investigating online child

    (more…)

    backdoors encryption end to end encryption exceptional access gchq ghost protocol ncsc
  • Watch this space: GCHQ / NCSC soon to publish Version 2 of “Ghost Protocol” appeal for backdoors in end-to-end secure, encrypted messenger software

    Watch this space: GCHQ / NCSC soon to publish Version 2 of “Ghost Protocol” appeal for backdoors in end-to-end secure, encrypted messenger software

    2022/07/19 22:27:59 BST

    The worst-kept secret in British encryption circles should be launched later this week: GCHQ are due to publish Version 2 of their much-vilified “Ghost Protocol” messenger-software backdoor. Rumours I’ve heard suggest that it’s going to be a stinker. There’s a fat white paper which takes the old “Principles for a More Informed Exceptional Access Debate”

    (more…)

    encryption end to end encryption gchq ghost protocol surveillance
  • Don’t buy Rhino Pro Milk Pitchers from Rhinoware / Rhinowares / Rhino Coffee Gear — this bad experience does not bode well for their products

    2022/07/06 20:44:45 BST

    May 2020 and I decided mid-lockdown to cheer myself up with a new milk pitcher, from UK distributor CoffeeHit, for £12 (i.e. £10 + VAT) It was a nice pitcher, felt like quality material, a bit heavy, nice and shiny, and I used it sporadically over the next 2 years… until a few weeks ago

    (more…)

    coffee espresso rhinoware
  • A Civil Society Glossary and Primer for End-to-End Encryption Policy in 2022 — #privacy #surveillance #messenger #interoperability #encryption #endtoendencryption @WhatsApp @SignalApp

    A Civil Society Glossary and Primer for End-to-End Encryption Policy in 2022 — #privacy #surveillance #messenger #interoperability #encryption #endtoendencryption @WhatsApp @SignalApp

    2022/06/30 14:03:16 BST

    A few weeks ago it was with great delight that I accepted a request from Privacy International to write a report for them, to share my perspectives on the technical aspects of end-to-end encryption with a specific focus upon helping civil society organisations better understand these aspects when considering policy. We came to an agreeable

    (more…)

    civil society encryption end to end encryption interoperability politics and law regulation surveillance
  • It’s weird AF & a complete mashup of homages to British kids’ TV, but only once you’re into it do you realise how “In The Night Garden” is practically engineered to calm toddlers down & help them sleep. And Derek Jacobi clearly had a blast narrating it.

    2022/06/21 04:08:50 BST

    (more…)

  • Converting Millimeters to Feet & Decimal Inches in Google Sheets

    2022/06/04 15:03:14 BST

    This works for me:

    (more…)

    google sheets imperial metric spreadsheets
  • The dangerous subtext within the concerned-dot-tech “Letter in Support of Responsible Fintech Policy”

    The dangerous subtext within the concerned-dot-tech “Letter in Support of Responsible Fintech Policy”

    2022/06/02 20:17:22 BST

    Back in 1991 I published an open-source password cracking tool which defined the state of the art for the next 5+ years, so much so that echoes of it can be found in all major password crackers of today. Some folk criticised me for doing this, choosing words like these to do so: I know

    (more…)

    fintech opensource regulation
  • Things which are legal offline, should be legal online — e.g. having a conversation without state surveillance; by @alecmuffett licensed CC-BY-SA

    2022/05/13 23:01:07 BST

    I  — Alec Muffett — created this image and coined this (admittedly fairly obvious and likely to be unoriginal) phrase, and I am licensing this image under CC-BY-SA terms.

    (more…)

    legal offline legal online
  • Messenger Interoperability: pushing for conformity, destroying functional diversity, enabling abuse and dangerous monocultures

    Messenger Interoperability: pushing for conformity, destroying functional diversity, enabling abuse and dangerous monocultures

    2022/04/14 07:59:56 BST

    There’s a genre of jokes about a city-slicker visiting the countryside, asking for directions and being told “…if you want to get there, I wouldn’t start from here.” This is where we are today with messenger interoperability.  Not only is there no way to fix it, but also any attempt to mandate delivery of full

    (more…)

    end to end encryption interoperability messenger
  • Breaking Up “Ma Zuck” — how a generational divide amongst #DigitalRights #CivilSociety regarding #Messenger #Interoperability imperils the deployment of end-to-end encryption as a platform solution … for everyone

    2022/04/04 12:06:49 BST

    Personal Introductions This is the kind of essay which — hopefully — will draw people who ask “who is this author, and what are his interests?” — so I thought I’ll spend a moment up front to explain. I’m Alec, and since approximately 1990 I have worked to highlight, combat or change laws which seek to

    (more…)

    end to end encryption interoperability regulation
    Fediverse reactions
  • Two threads on Twitter regarding online surveillance: it happens because our governments demand it

    2022/04/02 18:51:10 BST

    Thread 1 Nokia appears to have been instrumental to the operation of Russia’s surveillance infrastructure. Everyone in that article asking why Nokia was allowed to sell these services. And of course the company’s answer is “Western countries demand the same capabilities.” This is an underappreciated component of the surveillance debate. When folks in the US/Europe

    (more…)

    surveillance
←Previous Page
1 … 156 157 158 159 160 … 665
Next Page→

Dropsafe

Proudly powered by WordPress