NEW CARDING CHAT IN TELEGRAM

encryption

  1. Man

    The Nightingale's Song of Post-Quantum Encryption

    Almost a year ago I wrote an article about post-quantum cryptography and in this article I decided to continue this topic, since every year the moment approaches when cryptography as we know it today will go under. With the advent of quantum computing, interest in asymmetric encryption...
  2. Man

    Breaking Military Encryption: Reality or Cheap Speculation?

    Progress is unstoppable, but there are still unanswered questions. Recent media reports that Chinese scientists have broken "military encryption" using quantum computers have sparked widespread speculation about the future of cybersecurity. However, a detailed analysis showed that such claims...
  3. Friend

    Cookie hunt: infostealers have learned to bypass encryption in Chrome 127

    Digital thieves are celebrating their victory over a new security feature. Developers of popular infostealers have told customers that they have learned how to bypass Chrome's App-Bound Encryption feature and collect authentication cookies that were previously returned encrypted. A new...
  4. Friend

    Denmark against encryption: WhatsApp, Telegram and Signal under threat of ban in the country

    The EU authorities expressed their intentions to disclose correspondence in messengers. Danish Justice Minister Peter Hummelgaard proposed to restrict access to WhatsApp, Telegram and Signal messengers, as they are used by criminals to coordinate their activities. Hummelgaard said that existing...
  5. Friend

    Encryption vs Quantum: Who Will Win

    New algorithms bring us closer to the moment of truth in the digital world. Modern encryption methods, such as RSA, are based on the fact that even the most powerful classical computers are not able to quickly decompose a large number into prime factors. However, quantum computers promise to...
  6. Friend

    FIPS 203, 204 and 205 – 3 Keys to Future Encryption

    NIST releases the world's first post-quantum encryption standards. The US National Institute of Standards and Technology (NIST) has approved three new encryption standards designed to protect information from threats related to the development of quantum computers. The standards were developed...
  7. Carding Forum

    Apple announces homomorphic encryption package for Swift

    Cloud services will revolutionize privacy. Apple introduced a new package for homomorphic encryption in the Swift programming language. This package, which is publicly available, allows you to perform calculations on encrypted data without having to decrypt it. This solution provides a high...
  8. Carding Forum

    Encryption, VPN and erased logs: how the Russian Coms platform worked

    British police have shut down a network of phone scammers. UK law enforcement agencies have announced the closure of the Russian Coms platform, which was used by hundreds of scammers to deceive victims around the world. The platform, which was launched in 2021, resulted in tens of millions of...
  9. Teacher

    Mining, encryption, remote access: a bug in TeamCity has become fatal for dozens of organizations

    CVE-2024-27198 opened a compromise portal for hackers. When will the administrators close it? Attackers continue to actively exploit vulnerabilities in the JetBrains TeamCity software, deploying ransomware, cryptocurrency miners, Cobalt Strike beacons, and Spark RAT remote access Trojans. The...
  10. Teacher

    TutaCrypt Encryption: When Emails Play Hide-and-seek with Quanta

    You can't intercept it now, you can't decrypt it later: Tuta has introduced a new super-secure protocol. German company Tuta, developer of the secure email service Tuta Mail with more than 10 million users, has introduced a new quantum-resistant encryption protocol — TutaCrypt. The development...
  11. Teacher

    Nevada vs. Meta: Authorities Want to Disable End-to-End Encryption for Children

    Are the authorities fighting for the safety of children or are they afraid of losing access to user data? Nevada authorities are taking drastic steps against Meta, demanding that minors restrict access to encrypted messages in the Messenger app. The initiative of the State of Nevada is aimed at...
  12. Teacher

    Europe for Encryption: ECHR opposes "Chat Control" initiative

    The Strasbourg Court has defended the right of ordinary citizens to privacy of correspondence. A recent decision by the European Court of Human Rights (ECHR) called into question laws requiring weaker encryption and longer data retention times, such as those promoted by the European Chat...
  13. Brother

    New FHE encryption technology makes data invulnerable to hacking

    Fully homomorphic encryption allows you to process data without revealing its contents. In the world of computer security, a breakthrough is being planned thanks to fully homomorphic encryption (FHE) technology, which allows programs to work with encrypted data without decrypting it. The...
  14. Tomcat

    Apple and Facebook may mandate breaking end-to-end encryption

    US Senator Lindsey Graham has introduced the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act, which allows law enforcement and tech companies to work together to protect children. The bill applies to any company offering "interactive computing services", including...
  15. Teacher

    End-to-end encryption: what is it and why do you need it

    End-to-end encryption What is end-to-end encryption and what other options are there End-to-end encryption is when messages are encrypted on your device and decrypted only on the device of your interlocutor (in English, this is called end-to-end, which can be translated into Russian as "from...
  16. Teacher

    I2P Tunnels: Garlic encryption and unidirectional data transfer

    Anonymity of I2P network participants is achieved by using tunnels. An important feature of I2P is that only the person who created it knows the length of the tunnel, its beginning and end. Each node of the network has its own incoming and outgoing tunnels, and by default it also acts as a...
  17. Father

    Fundamentals of Cryptography (Encryption)

    When people talk about crypt in general, there are some fundamental principles. One of them is the Kerkhoffs principle, which says that open source is very important in cryptography. More specifically, it provides general knowledge about the protocol design. The point is very simple: the...
  18. Hacker

    File Encryption

    Encryption is the most common and, in fact, the simplest way to protect any information. However, many might argue, then what is the efficiency and complexity of encryption? Symmetric ciphers With them, everything is quite simple. Asymmetric ciphers This is a new generation of ciphers that has...
  19. Lord777

    PGP / GPG encryption

    Protecting your data from prying eyes - in some cases it can be a matter of life and death, and relying on others for this matter means trusting them with your data. GPG encryption will help protect your correspondence from prying noses on your own . I can also advise you on the article...
  20. Lord777

    Linux Encryption: Using GnuPG

    On Linux, the universal encryption tool is Werner Koch's Gnu Privacy Guard (GnuPG) package. Its main application command (gpg) brings back the memory of Pretty Good Privacy (PGP), an encryption tool released in 1991 by Phil Zimmermann. You can learn more about GPG in the article "GPG...
Top