202
Tor says it’s "still safe" amid reports of police deanonymizing users
(www.bleepingcomputer.com)
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
If I understand correctly, stream isolation will route different connections through different circuits. If you're doing two different things of a sensitive nature, open different browsers and applications, use random user-induced delays in your actions/responses and PGP-encrypt everything. And listen to what the TOR project says about the mitigations. I have some reading to do myself I guess
whonix docs is very good to learn about this stuff
Heh, whonix docs for privacy have become the arch wiki for Linux
PGP? That's for email and isn't great
That's for encrypting text, regardless of the medium. Explain "not very good"?
Well it's not very good, it's just pretty good.
Possiblylinux127 seemed like he had founds faults in PGP's encryption which got me interested
Oh, I was just interested in making a pun based on the name. 😂
To be perfectly honest I was under the impression that we had collectively bailed on PGP in favor of GPG, but based on the Wikipedia article it seems like PGP is still getting updates so maybe that's not the case?
PGP is the protocol, GPG is the implementation. People tend to use GPG because it is FOSS.
Thank you for distilling that down, cleared up all of the confusion I had. Cheers.
It uses the same public key unless you manually change it. You don't get the rolling keys provided by other systems
I don't think I understand what you're implying. Are you arguing that PGP implements less secure operations because it doesn't have perfect forward secrecy? As far as I know there's not much out there in terms of encryption schemes for data at rest which includes PFS. Even AGE didn't have it last time I checked. If you know about something that does provide PFS for data at rest, let me know
https://en.m.wikipedia.org/wiki/Signal_Protocol
https://en.m.wikipedia.org/wiki/Double_Ratchet_Algorithm
https://en.m.wikipedia.org/wiki/Elliptic-curve_Diffie%E2%80%93Hellman
The signal protocol works on double ratchet that works on Diffie Hellman
This is a good read. I think it's a good solution if it can be implemented properly. Are there applications you know of that allow you to personally (manually) encrypt text and communicate with another person like GPG does?
https://simplex.chat/
https://signal.org/
You should not be doing manual communications as that opens the door for human error and is time consuming. Also these cryptography protocols are far to complex to easily be used for text.
And using these apps is not always an option. I like simplex, but sometimes email is one of the only options. PGP can be used agnostic of the technology used for transmission, and that's exactly what we need to keep more people private instead of forcing them into a few select applications. If Diffie-Helman can't be used in a transport-agnostic fashion then I do not see much progress in this direction.
Just keep in mind PGP is weaker in the sense that it is easier to break due to its shared key.
Email itself is not exactly a secure protocol
Shared key???? PGP works on a public-private key-pair, and unless you're giving out your private key, it's not shared with anyone. This is blatant misinformation
The public key is public and there is a single vulnerable private key. Someone can identify you with the use of your public key and if someone gets access to your private key (maybe a solen device) they can decrypt logged messages that used that key. This means they can still get access even if you deleted the messages off your device.
That is indeed a disadvantage of PGP. Unfortunately, it is the most portable method of encryption text at rest at the moment. The moment somebody manages to figure out a way to use the Diffie-Hellman algorithm in a portable manner, I'm sure a lot of people will consider that a viable alternative. Till then, learn about disk encryption to keep your keys safe