mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

14K
active users

#cryptography

23 posts22 participants2 posts today
The New Oil<p>How Many <a href="https://mastodon.thenewoil.org/tags/Qubits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Qubits</span></a> Will It Take to Break Secure Public Key <a href="https://mastodon.thenewoil.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> Algorithms?</p><p><a href="https://it.slashdot.org/story/25/05/24/0530234/how-many-qubits-will-it-take-to-break-secure-public-key-cryptography-algorithms" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it.slashdot.org/story/25/05/24</span><span class="invisible">/0530234/how-many-qubits-will-it-take-to-break-secure-public-key-cryptography-algorithms</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Conan the Sysadmin<p>A <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> warrior always has more to learn. Especially about the wizardry of <a href="https://mstdn.social/tags/cryptography" class="mention hashtag" rel="tag">#<span>cryptography</span></a>. <a href="https://cromwell-intl.com/cybersecurity/crypto/reading.html?s=mc" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/crypto/reading.html?s=mc</span></a></p>
Rick Carback<p>Interesting news for quantum doom clock, Craig Kidney, the 2019 author of "How to factor 2048 bit rsa integers in 8 hours using 20 million noisy qubits" just published an update of "with less than a million noisy qubits", on arxiv - That is close to my estimate from January!</p><p>Kidney's treatment is, of course, substantially more thorough than the estimates on <a href="https://quantumdoomclock.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">quantumdoomclock.com</span><span class="invisible"></span></a> </p><p><a href="https://freeradical.zone/tags/quantum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantum</span></a> <a href="https://freeradical.zone/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://freeradical.zone/tags/rsa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rsa</span></a></p>
Laurent Cheylus<p>Google Security Researchers published a preprint Paper demonstrating that 2048-bit RSA Encryption "could theoretically be broken by a Quantum Computer with 1 million noisy Qubits running for one Week" <a href="https://bsd.network/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://bsd.network/tags/PQC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PQC</span></a> <a href="https://bsd.network/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumComputing</span></a> <a href="https://security.googleblog.com/2025/05/tracking-cost-of-quantum-factori.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.googleblog.com/2025/0</span><span class="invisible">5/tracking-cost-of-quantum-factori.html</span></a></p>
Rik - M0RKM<p><span class="h-card" translate="no"><a href="https://mastodon.radio/@M0MSA" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>M0MSA</span></a></span> have asked me to give my talk on the Z30 Engima, so I'm adding an example encipherment slide which means creating a message using my 1923 copy of Slater's Telegraphic Code*</p><p>Only most radio / electronics specific words are not in the book e.g. Antenna although I can use Aerial.</p><p>Looking for replacements I found words like Necromancer (15007) and Libidinous (13255) are there. </p><p>What kind of telegrams were these people sending? </p><p>*Other codebooks are available</p><p><a href="https://mastodon.radio/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.radio/tags/z30enigma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>z30enigma</span></a></p>
PrivacyDigest<p>How Many <a href="https://mas.to/tags/Qubits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Qubits</span></a> Will It Take to Break Secure <a href="https://mas.to/tags/PublicKey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PublicKey</span></a> <a href="https://mas.to/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://mas.to/tags/Algorithms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Algorithms</span></a> ? - Slashdot <br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://it.slashdot.org/story/25/05/24/0530234/how-many-qubits-will-it-take-to-break-secure-public-key-cryptography-algorithms?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it.slashdot.org/story/25/05/24</span><span class="invisible">/0530234/how-many-qubits-will-it-take-to-break-secure-public-key-cryptography-algorithms?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a></p>
Simple Nomad<p>Wow. Just learned that John Young passed away in March. A public disclosure pioneer and absolute free thinker.</p><p><a href="https://rigor-mortis.nmrc.org/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://rigor-mortis.nmrc.org/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://rigor-mortis.nmrc.org/tags/cryptome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptome</span></a></p><p><a href="https://www.theregister.com/2025/05/24/john_young_obituary/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/05/24/joh</span><span class="invisible">n_young_obituary/</span></a></p>
Lobsters<p>There is no Diffie-Hellman but Elliptic Curve Diffie-Hellman via <span class="h-card" translate="no"><a href="https://mendeddrum.org/@fanf" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>fanf</span></a></span> <a href="https://lobste.rs/s/2adp0p" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/2adp0p</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/math" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>math</span></a><br><a href="https://keymaterial.net/2025/05/23/there-is-no-diffie-hellman-but-elliptic-curve-diffie-hellman/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">keymaterial.net/2025/05/23/the</span><span class="invisible">re-is-no-diffie-hellman-but-elliptic-curve-diffie-hellman/</span></a></p>
Pyrzout :vm:<p>A Presence-sensing drive for Securely Storing Secrets <a href="https://hackaday.com/2025/05/24/a-presence-sensing-drive-for-securely-storing-secrets/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/05/24/a-pres</span><span class="invisible">ence-sensing-drive-for-securely-storing-secrets/</span></a> <a href="https://social.skynetcloud.site/tags/USBmassstorage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USBmassstorage</span></a> <a href="https://social.skynetcloud.site/tags/SecurityHacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityHacks</span></a> <a href="https://social.skynetcloud.site/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://social.skynetcloud.site/tags/unlockable" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unlockable</span></a></p>
IT News<p>A Presence-sensing drive for Securely Storing Secrets - When we hear about flash drives in the context of cybersecurity, we tend to think... - <a href="https://hackaday.com/2025/05/24/a-presence-sensing-drive-for-securely-storing-secrets/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/05/24/a-pres</span><span class="invisible">ence-sensing-drive-for-securely-storing-secrets/</span></a> <a href="https://schleuss.online/tags/usbmassstorage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usbmassstorage</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://schleuss.online/tags/unlockable" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unlockable</span></a></p>
Conan the Sysadmin<p>If a monastery filled with monks calculated forever, would they discover all possible numbers? <a href="https://mstdn.social/tags/cryptography" class="mention hashtag" rel="tag">#<span>cryptography</span></a> <a href="https://cromwell-intl.com/cybersecurity/crypto/hash-search.html?s=mc" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/crypto/hash-search.html?s=mc</span></a></p>
Varbin :arctic_fox: ​:gay_furr:<p>Does somebody know *why* CTAP2.x ("FIDO2") tokens do not authenticate the key exchange to protect the transmitted PIN from the client device to the authenticor? </p><p>Background: When you enter your PIN for a FIDO2 authenticator (e.g. Yubikey), the PIN is encrypted, and only a truncated SHA-256 hash is transmitted. The encryption key is chosen by unauthenticated ephermal ECDH key exchange. As the PINs usually have low entropy, they can be brute forced by an attacker who performs an active MITM attack.</p><p>Some smart cards (e.g. the German eID or other Biometric Passports) use PACE nowadays to protect such a key exchange with a PIN or another low-entropy secret (such as the document number) - other password authenticated key exchanges (PAKEs) would certainly be possible as well.</p><p>Are active MITM attacks considered to be negligible for the common transports (USB, NFC, Bluetooth) of Webauth? Or are there other reasons why a PAKE is not used?</p><p><a href="https://infosec.exchange/tags/ctap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ctap</span></a> <a href="https://infosec.exchange/tags/fido" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fido</span></a> <a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a></p>
Aaron Toponce ⚛️:debian:<p>It appears there is an open issue to the VSCode repository about it:</p><p><a href="https://github.com/microsoft/vscode/issues/247505" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/microsoft/vscode/is</span><span class="invisible">sues/247505</span></a></p><p><a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> <a href="https://fosstodon.org/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a></p>
Aaron Toponce ⚛️:debian:<p><a href="https://fosstodon.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> is still using SHA-1 to sign their DEB packages.</p><p>apt(8) is correctly identifying the problem and issuing a warning that the policy will reject the signature within a year.</p><p>The the output from "apt update --audit" below:</p><p><a href="https://gist.github.com/atoponce/a399cca2eedba41566439271aded679a" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/atoponce/a399c</span><span class="invisible">ca2eedba41566439271aded679a</span></a></p><p><a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> <a href="https://fosstodon.org/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a></p>
Blue Ghost<p>09.05.2025: GnuPG announces release of 2.5.6 for public testing, finalized PQC algorithms are supported.<br>Source: <a href="https://lists.gnupg.org/pipermail/gnupg-announce/2025q2/000492.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lists.gnupg.org/pipermail/gnup</span><span class="invisible">g-announce/2025q2/000492.html</span></a></p><p>PQC: <a href="https://wikipedia.org/wiki/Post-quantum_cryptography" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wikipedia.org/wiki/Post-quantu</span><span class="invisible">m_cryptography</span></a><br>GnuPG: <a href="https://mastodon.online/@blueghost/111974048270035570" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.online/@blueghost/111</span><span class="invisible">974048270035570</span></a><br>Harvest now, decrypt later: <a href="https://mastodon.online/@blueghost/111357939714657018" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.online/@blueghost/111</span><span class="invisible">357939714657018</span></a></p><p><a href="https://mastodon.online/tags/PQC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PQC</span></a> <a href="https://mastodon.online/tags/PostQuantum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PostQuantum</span></a> <a href="https://mastodon.online/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://mastodon.online/tags/GnuPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GnuPG</span></a> <a href="https://mastodon.online/tags/GPG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPG</span></a> <a href="https://mastodon.online/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.online/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a> <a href="https://mastodon.online/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.online/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.online/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.online/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.online/tags/QuantumSafe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumSafe</span></a></p>
Austin Huang ❤️<p>OSIRIS, the student-run <a href="https://mstdn.party/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> research lab at NYU, is seeking <a href="https://mstdn.party/tags/challenge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>challenge</span></a> writers for our upcoming CSAW <a href="https://mstdn.party/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> later this year! (For those who don't know CSAW, it's one of the largest student-run <a href="https://mstdn.party/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> events in the world: <a href="https://csaw.io" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">csaw.io</span><span class="invisible"></span></a> ) Web, <a href="https://mstdn.party/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a>, <a href="https://mstdn.party/tags/pwn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pwn</span></a>, and <a href="https://mstdn.party/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> challenges are prioritized, and all experience levels welcome. Interested? Shoot me a DM or email osiris@osiris.cyber.nyu.edu.</p><p><a href="https://mstdn.party/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mstdn.party/tags/BoostWelcome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BoostWelcome</span></a></p>
Nicolas Mouart<p>Hackropole (ANSSI) website is pretty neat, lot's of fun nerdy puzzles. There are even games for beginners like me!<br><a href="https://hackropole.fr/fr/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">hackropole.fr/fr/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/Forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forensics</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/postquantum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postquantum</span></a></p>
No Starch Press<p>While they party, we are future-proofing the internet. Serious Cryptography, Second Edition is the essential guide for those deep late night dives into complex systems! </p><p><a href="https://nostarch.com/serious-cryptography-2nd-edition" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/serious-cryptogra</span><span class="invisible">phy-2nd-edition</span></a></p><p><a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a></p>
riso<p>eiDAS 2.0 regulation (electronic identification and trust services) that defines the new EU Digital Identity Wallet (EUDIW)<br><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/discussions/211" rel="nofollow noopener noreferrer" target="_blank">https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/discussions/211</a><br><a class="hashtag" href="https://grange.la/collections/tags/privacy" rel="nofollow noopener noreferrer" target="_blank">#privacy</a> <a class="hashtag" href="https://grange.la/collections/tags/identity" rel="nofollow noopener noreferrer" target="_blank">#identity</a> <a class="hashtag" href="https://grange.la/collections/tags/cryptography" rel="nofollow noopener noreferrer" target="_blank">#cryptography</a> <a class="hashtag" href="https://grange.la/collections/tags/eu" rel="nofollow noopener noreferrer" target="_blank">#eu</a></p>
Reverend Elvis<p>The loss of privacy is destroying our society.<br>-------------------------------------<br>The recapture of privacy</p><p>In his <a href="https://social.undeadnetwork.de/tags/social" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>social</span></a> contract, Kant divides reason into private and public reason. Private reason is the kind of reason we can use in our “official capacity,” i.e., a reason that is subject to severe restrictions and whose observance is necessary for smooth functioning. Public reason, on the other hand, is that of the “scholar.” According to <a href="https://social.undeadnetwork.de/tags/Kant" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kant</span></a>, this should be free and allowed to question and express everything.</p><p>In addition to reason in public, there is also an area of absolute privacy. This is the realm of family, friends, or one's own self. In ancient times, this was called the oikos, the household. As long as this area does not touch the public sphere, i.e., does not break any generally applicable laws, everything is permitted there and is negotiated within the oikos itself. It is not without reason that <a href="https://social.undeadnetwork.de/tags/sexuality" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sexuality</span></a> and other things that would cause “public nuisance” are located there.</p><p>But what happens in a digital society where these centuries-old boundaries between these areas have dissolved practically overnight? This dissolution is happening, on the one hand, through permanent self-publication in real time on so-called “social media.” And on the other hand, and much more seriously, through the technically feasible and actually occurring <a href="https://social.undeadnetwork.de/tags/total" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>total</span></a> surveillance and recording of all events taking place in the digital space.</p><p>Since we live in a completely digitalized world, all areas of life are also reflected there. It does not matter whether it is the private sphere of the oikos or the public consideration of a social problem. If everything becomes public and, as everyone knows today, permanently recorded, this means the complete abolition of privacy, of the private sphere, of the oikos.</p><p>This is disastrous. While public and private reason must simply be renegotiated, as it has always been, the loss of privacy is a turning point in <a href="https://social.undeadnetwork.de/tags/human" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>human</span></a> history and was previously considered an instrument of torture in penitentiaries and prisons.<br>However, privacy and <a href="https://social.undeadnetwork.de/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> are inextricably linked to social and individual freedom and a dignified life in general. The reconquest of privacy is therefore the decisive battle at the beginning of an all-encompassing digitalization that leaves no room for analog space.</p><p>But how can this be achieved? In the field of software security, there is the concept of militarized and demilitarized zones. It is assumed that every device and every program connected to the global network is (or can be) attacked, read, compromised, and manipulated at any time. Everything that happens on the internet, in digital space, therefore takes place in the militarized zone and is, by definition, subject to constant attack.<br>The answer to how <a href="https://social.undeadnetwork.de/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> can also be established in digital space logically comes from the military tradition. It is cryptography.</p><p>Since the beginning of military conflicts, <a href="https://social.undeadnetwork.de/tags/humanity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>humanity</span></a> has tried to alter important messages in such a way that the enemy cannot evaluate them.<br>Since everything on the internet can potentially be controlled by the “enemy” (in this case, the enemy of privacy), it is therefore urgently necessary that everything that is private, no matter how uninteresting or insignificant, must be encrypted and cryptographed. The creation of a fully comprehensive <a href="https://social.undeadnetwork.de/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> for the private sphere is thus one of the most important tasks facing humanity in the new era.</p><p>In addition to the challenge of making people aware of this and implementing it, one of the greatest difficulties is that cryptographic tools are needed for encryption and decryption. These cannot be in the hands of individuals or groups, but must be free and available as open source. The cryptographic tool itself must therefore not contain any secrets. The secret to encryption, the <a href="https://social.undeadnetwork.de/tags/key" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>key</span></a>, must be in the hands of the individual, just like a key that locks the door to one's home before one indulges in private pursuits.</p><p>(5) Permanent Record (2019) Edward Snowden ISBN 9781529035650</p><p><a href="https://undeadnetwork.de/bookstack/books/radical-enlightenment-a-world-of-open-sources-translation/page/english-version-please-edit" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">undeadnetwork.de/bookstack/boo</span><span class="invisible">ks/radical-enlightenment-a-world-of-open-sources-translation/page/english-version-please-edit</span></a></p><p><a href="https://social.undeadnetwork.de/tags/philosophy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>philosophy</span></a> <a href="https://social.undeadnetwork.de/tags/enlightment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>enlightment</span></a> <a href="https://social.undeadnetwork.de/tags/digitalresistance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitalresistance</span></a></p>