Benefits of the Double Ratchet protocol over the constant Ephemeral DH key exchange

I’ve been reading lately about the Double Ratchet protocol, how it works conceptually. I understand generally the idea behind the protocol, that it provides Forward Secrecy and Post-Compromise security (the healing period depending on how … Continue reading Benefits of the Double Ratchet protocol over the constant Ephemeral DH key exchange

Confidentiality of data coming from a country with data protection laws stored in a country with different laws [closed]

I send very confidential items by email, such as photos, addresses, social security numbers, bank numbers, driving card numbers, and diplomas.
Everything was supposed to stay in France.
In fact, it’s an Amazon server in the USA, so no conf… Continue reading Confidentiality of data coming from a country with data protection laws stored in a country with different laws [closed]

Backup to a remote Encrypted APFS drive mounted through Samba. Is this a sound plan?

Say I have a remote machine (something like a VPS) that I have no physical access or physical authority over other than a user on it (with root access). However, I’d like to do Time Machine backups on it.
Time Machine is a mac tool for inc… Continue reading Backup to a remote Encrypted APFS drive mounted through Samba. Is this a sound plan?

Is Message Layer Security the state of art protocol for group encryption? [migrated]

I’m trying to read about Diffie Hellman (One to One) kind of protocols for group communication. Is Message Layer Security the state of art protocol for group encryption (not necessarily chat or application layer)? I found Tree Based Group … Continue reading Is Message Layer Security the state of art protocol for group encryption? [migrated]

How do end-to-end encryption (E2EE) IM apps implementing push notifications? [duplicate]

Say WhatsApp and Signal on Android devices, how do they keep the E2EE not be broken?
Some answers claimed that WhatsApp uses VoIP background mode on iOS to make the push notification invoke the app to decrypt the message and send a local n… Continue reading How do end-to-end encryption (E2EE) IM apps implementing push notifications? [duplicate]

Apple claims that it encrypts data with your passcode- is this safe? [closed]

iCloud’s end to end encryption option screen says that I can recover my data using my device passcodes. Let’s say I have a 4 digit phone passcode, or even a 6 digit one- that seems very insecure for encryption. Or, do they mean all device … Continue reading Apple claims that it encrypts data with your passcode- is this safe? [closed]

How to avoid breaking end-to-end encryption while employing cloud-based DDoS protection?

I have a few websites and apps that I need to protect from DDoS attacks. These websites and apps are delivered by various servers that sit in several small data centers around the world.
I’m thinking of getting some kind of cloud-based DDo… Continue reading How to avoid breaking end-to-end encryption while employing cloud-based DDoS protection?