https://we.riseup.net/debian/encrypted-swap crypt debian devuan swap
@felixp7@twtxt.net “Yo, crypto-heads. Encrypted communication doesn’t protect your privacy. Laws …” I guess crypto-heads are often happy with acknowledging this, but also arguing that e.g. deniable crypto is a useful way out here (and, of course, just doing illegal stuff if it gets really rough).
Kaidan: Kaidan will receive a grant for end-to-end encryption ⌘ Read more…
-----BEGIN CRYPTUTIL ENCRYPTED MESSAGE-----
l0GwFAQpx3ed+bZlcQ+pexbynFzZOm8EI/FivGbWQ16whyTkToVv8S2GSAjrsJoT
37MdaBDpoitli/f/aP130b6O6SnK/LdHHJ1DTvWgxB14sq9b4mRtk7HvYzA=
-----END CRYPTUTIL ENCRYPTED MESSAGE-----
@prologic@twtxt.net Ok.. so using NaCL boxes. yeah its just a combo of using secretbox with a generated key/nonce. and then using the pubkey box to encrypt the key/nonce for each device.
@prologic@twtxt.net sender generates an AES key encrypts message. gets the device list for user and encrypts key for each device. sends the encryptedkeys+cypertext.
@prologic@twtxt.net for encryption. we can have browser/app generate ec25519 keypair. store the private on device and add pub to list of devices for the user on pod.
Snikket: Sponsoring Group Chat Encryption in Siskin ⌘ https://snikket.org/blog/sponsoring-group-omemo-in-siskin/
Opportunistic Encryption on the IP Layer ⌘ https://hack.org/mc/blog/ipsec-dns.html
Cryptee | Private, Secure, Encrypted Photos and Encrypted Documents ⌘ https://crypt.ee/
@lucidiot@tilde.town @kas@enotty.dk There’s also Keybase as good GPG tool. They offer a lot of encrypted services as well :)
Even though noone send me GPG encrypted messages, I renewed my expiration date to one more year :)
@freemor@freemor.homelinux.net I also always try to have a few ssh servers with several ports available for me to use. My favorite port is 443. Once had a firewall that wouldn’t allow SSH on 22 but 443 was acceptable because it expected encryption on it.
Alex Schroeder: 2018-01-10 Encrypted Gopher https://alexschroeder.ch/wiki/2018-01-10_Encrypted_Gopher
How to keep your ISPâs nose out of your browser history with encrypted DNS | Ars Technica https://arstechnica.com/information-technology/2018/04/how-to-keep-your-isps-nose-out-of-your-browser-history-with-encrypted-dns/
@freemor@freemor.homelinux.net I think we already discussed encrypted tweets some time ago, but no encryption seemed short enough. GPG ist just too big. Any ideas?
You Can Encrypt Your Face – The New Inquiry https://thenewinquiry.com/you-can-encrypt-your-face/
@kas@enotty.dk Is #starttls-everywhere just to ease configuration or is there any reason why #lets-encrypt certs won’t work on mail servers?
@kas@enotty.dk That’s what i’m using. But shouldn’t i be able to generate keys to communicate with other users? How could i encrypt a message for you?
Wow, a third of all ssl certificates on twtxt are from Let’s Encrypt. Incredible.