Is an IRC conversation using TLS between two people, one of whom owns the server, end to end encrypted?

If I run an IRC server, and my friend and I connect over TLS and chat, is the conversation essentially end-to-end encrypted because all computers that see the plaintext messages are owned by one of the participants?

Continue reading Is an IRC conversation using TLS between two people, one of whom owns the server, end to end encrypted?

Moving from Google Workspace to ProtonMail: Complexities & Considerations? [closed]

I am a decade-long Google Workspace user who uses the service primarily for secure and reliable email with my own domain. I use many Google services, but even if the scope is narrowed to just email (Gmail), I’m pretty deep into the ecosyst… Continue reading Moving from Google Workspace to ProtonMail: Complexities & Considerations? [closed]

How to deal with targeted attacks from publisher when verifying the integrity of native applications and validating their source code?

I am trying to reason about how native apps can avoid the problems web apps have in dealing with the "Browser Cryptography Chicken and Egg" problem, which has been discussed numerous times on this site, perhaps most notably here:… Continue reading How to deal with targeted attacks from publisher when verifying the integrity of native applications and validating their source code?

Necessity & possibility of client-server VPN for an extra layer of security for mobil applications?

I imagine that to some professionals on here this question may be redundant. This is being asked from the viewpoint of a relative beginner dev.
I would like to add an extra layer of security between client & server. I’m wondering if it… Continue reading Necessity & possibility of client-server VPN for an extra layer of security for mobil applications?

how to fully secure web/mobile/desktop application connected the same backend server [closed]

I have a React/Express application, I want to fully secure it. I’m looking for best practices for these features:

data encryption/decryption
end-to-end communication
access control
role management
authentication
threat detection
file prot… Continue reading how to fully secure web/mobile/desktop application connected the same backend server [closed]