UK government demanding access to encrypted iCloud
-
And SMTP/IMAP do not support end-to-end encryption, so a malicious server can still spy on you even if it uses TLS.
-
It's a privacy activist stance, privacy and security are always at a constant battle. There was a post about it a few weeks back, every attempt at security compromises privacy, because private info is the easiest way to lock security down, so it's always the route that companies take.
Personally I don't think a corporation should have to risk their company over it, but I don't think a company that isn't privacy oriented should pretend to be. It's misleading.
I give them credit that they might be good for privacy but, the entire operation gets undermined when in order to sign up, it tries to force you into giving information that could identify you. The less information needed the better, and the less you can tell overreachers. If you don't have the information you don't have the information. That's signals motto, it's also Mullvads motto, and its the direction that proton runs in if you can find your way through it's hoops. -
Disable iCloud backups, and do backup manually with iTunes plus the backup password set.
-
If the op has their information in emails and doesn’t want to move it somewhere else then pgp is a good way to at least secure those emails a little.
I don’t think it’s a panacea, but as methods of encrypting email go it’s widely supported enough that a person whose private information is stored in email will be able to figure something out.
-
Whitespace steganography in markdown
-
Also innocent cat photos, a piece of music or in a voice message, in all of these you can encrypt hidden messages.
-
It’s not just the government. Most of us are morons.
-
"Jones, take a look at these cat photos."
"Oh, they're lovely, sir!"
"No, Jones, look at them. What do they mean?"
"Well, sir, this one is hungry, so it's asking for food, but in its native American style. This one is looking at the camera funny, probably because it's been startled by something off camera. This one is looking smug, and the angry people there have been added by the artist, they're not from the same photo. This one--"
"Sit down, Jones. Look at their meaning. The terrorist attack will be at 2pm on the 23rd at South Kensington station, used as a distraction for the simultaneous heist in the Natural History Museum!"
-
LLO, but this isn't the way how steganography works. In a photo any pixel has a hex value, a minimal change to another value of one or some bits can't be seen by an human and so the change of several pixels to an predefined value can hide an message, beeing invisible by sight, but readable by an corresponding app.
-
I know, but I liked the idea of sending messages by interpreting meaning in a series of cat memes
By the way, do you know if steganography in an image is truly undetectable? Or if an attacker could, by statistical analysis or pattern analysis, determine that steganography has been used?
-
It's not so easy to detect a steganographic message in a photo, soundfile or video, it's only detectable with specific apps. But the main reason is that goverments and security services first need a suspicion that these cute catphoto or an selfi of this guy in a beach is an secret message to make this analyse, much more likely to be suspicious of an encrypted message not feddable. This is surely more interesting to perform an in -depth analysis, instead of wasting time with thousands of vacations, selfies and kitten photos or analyzing the sound archive of your son playing Happy Birthday on his flute.
-
-
aaaaaare you sure!?