Efani

🔐 Android just got a quiet but powerful security upgrade: automatic reboots after 3 days of device inactivity.

Google has rolled out a new feature via Google Play Services: if an Android device remains locked for 3 consecutive days, it will now automatically reboot.

Why this matters:
Rebooting puts the phone back into the "Before First Unlock" state — where data remains fully encrypted and inaccessible without the passcode. This makes it significantly harder for anyone trying to extract sensitive data using forensic tools like Cellebrite or Magnet.

Apple introduced a similar feature last year, signaling a broader trend: both ecosystems are reinforcing protections against post-unlock data extraction, often used by law enforcement or threat actors.

This feature:

- Reduces exposure time after a phone is seized or stolen
- Restores full disk encryption status automatically
- Adds a layer of passive defense even if users don’t act

📱 At @Efani, we advocate for security that works even when you’re not paying attention. Automatic reboots after periods of inactivity are a subtle but smart move — one that helps prevent surveillance, data harvesting, and unauthorized access.

It’s not just about convenience anymore. It’s about digital self-defense by default.

#MobileSecurity #Android #Encryption #Privacy #EfaniSecure

Debacle

@movim @dominik

Note, that #OMEMO has been taken directly from Signal, only adapted for #XMPP.

Most modern #Jabber clients default to OMEMO for one-to-one conversations nowadays. For private groups, I believe, users still have to enable it explicitely.

I'm not aware of any public Jabber server that would still accept non-TLS connections, so you have both transport #encryption and #e2ee.

Manuel 'HonkHase' Atug

EU, Backdoor

#EU: These are scary times – let's #backdoor #encryption!

" #ProtectEU plan wants to have its cake and eat it too"
theregister.com/2025/04/03/eu_

LMG Security

Register for Cyberside Chats: Live! Quantum Shift: How Cybersecurity Must Evolve Now!

Quantum computing is on the horizon, and it has the potential to revolutionize the way we think about cybersecurity. Join our April 23rd live session where cybersecurity experts @sherridavidoff and @MDurrin will dive into the implications of quantum technology on encryption and data security. Learn what steps security leaders should take today to prepare for this disruptive shift.

Don’t miss out on this opportunity to ask questions and stay ahead of emerging threats. Register now!

lmgsecurity.com/event/cybersid

#QuantumComputing #Cybersecurity #Encryption #CybersideChats #CISO #infosec #CIO #CEO #Cyberaware #ITsecurity #Riskmanagement #CybersecurityInsights #Tech #Cyber

Cyberside Chats: Live! Quantum Shift: How Cybersecurity Must Evolve Now | LMG Security

In this quick, high-impact session, we’ll dive into…

LMG Security
OTX Bot

HelloKitty Ransomware Resurfaced

The HelloKitty ransomware group, active since late 2020, has resurfaced with new variants in 2024 and potentially 2025. Originally forking from DeathRansom, HelloKitty targets Windows and Linux environments, appending .CRYPTED, .CRYPT, or .KITTY extensions to encrypted files. The group has used multiple TOR domains for negotiations and has been linked to high-profile attacks, including CD Projekt Red. Analysis reveals potential connections to China, despite earlier attributions to Ukraine. The ransomware employs sophisticated encryption techniques, including RSA-2048 and AES. Recent samples show evolving tactics, with increased focus on system discovery and process termination. HelloKitty has also been utilized by other threat actors, including Vice Society and Lapsus$. The group's continued activity and adaptations suggest ongoing relevance in the ransomware landscape.

Pulse ID: 67feb4ff5c2dd0fabe7255e9
Pulse Link: otx.alienvault.com/pulse/67feb
Pulse Author: AlienVault
Created: 2025-04-15 19:35:27

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#China #CyberSecurity #Encryption #ICS #InfoSec #Linux #OTX #OpenThreatExchange #RansomWare #UK #Ukr #Ukraine #ViceSociety #Windows #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate,…

LevelBlue Open Threat Exchange
Teddy / Domingo (🇨🇵/🇬🇧)

From @eff on the "Blue Bird"

It's much easier to use apps that support end-to-end #encryption than it used to be, but it's still good to know how it works. ssd.eff.org/module/deep-dive-e

nemo™ 🇺🇦

A global coalition is warning Sweden against encryption backdoor legislation. The proposed law, aimed at combating crime, could compromise digital security and force companies like Signal to leave the Swedish market. 🛡️ #Encryption #Privacy #Sweden #newz

cyberinsider.com/global-coalit

9x0rg

If you're worried about where to host your data in Europe, remember that not all EU member states are created equal when it comes to encryption keys disclosure laws.

See the **Key Disclosure Law** page on Wikipedia[1] - the legislation that requires individuals to hand over cryptographic keys to law enforcement.

My top pick:
- Germany
- Iceland
- Belgium (see note on WP)
- Switzerland (yet)

[1]: en.wikipedia.org/wiki/Key_disc

#Encryption #EE2E #NothingToHide #Hosting #DataPrivacy

Key disclosure law - Wikipedia

en.wikipedia.org
Bob Carver

What is quantum internet? Why it could change the internet forever
A new kind of internet that’s faster, safer, impossible to hack. Here’s what you need to know
foxnews.com/tech/what-quantum- #cybersecurity #quantumcomputing #encryption

Em :official_verified:

New Privacy Guides article 🔐✊
by me:

Encryption Is Not a Crime

The war against encryption isn't new, but the quantity of data about us that needs protection is.

Despite the senseless attacks,
it is vital that we fight back to protect the right to using end-to-end encryption.

Encryption protects us all: privacyguides.org/articles/202

#PrivacyGuides #Encryption #Privacy #E2EE #RootForE2EE

Encryption Is Not a Crime

Encryption is not a crime, encryption protects all…

www.privacyguides.org
Wчɑtt

Rapport au pouet précédent ⬆️

Des retours/avis sur ces alternatives ?

#encryption #secure

Brian Greenberg

🚨 Florida’s new “Social Media Use by Minors” bill (SB 868/HB 743) has a chilling twist: it demands platforms create backdoors to decrypt private messages.

That means:
🔓 End-to-end encryption may be turned off
📵 Disappearing messages could be banned
🧒 Minors lose digital privacy
💣 All users may face weaker security

EFF warns this is a dangerous precedent that risks everyone’s online safety. Legislating away encryption doesn’t protect kids — it jeopardizes all of us.

#Cybersecurity #Privacy #Encryption #TechPolicy
eff.org/deeplinks/2025/04/flor

Florida’s New Social Media Bill Says the Quiet Part Out Loud and Demands an Encryption Backdoor

At least Florida’s SB 868/HB 743, “Social Media Use…

Electronic Frontier Foundation
Miguel Afonso Caetano

"At least Florida’s SB 868/HB 743, “Social Media Use By Minors” bill isn’t beating around the bush when it states that it would require “social media platforms to provide a mechanism to decrypt end-to-end encryption when law enforcement obtains a subpoena.” Usually these sorts of sweeping mandates are hidden behind smoke and mirrors, but this time it’s out in the open: Florida wants a backdoor into any end-to-end encrypted social media platforms that allow accounts for minors. This would likely lead to companies not offering end-to-end encryption to minors at all, making them less safe online.

Encryption is the best tool we have to protect our communication online. It’s just as important for young people as it is for everyone else, and the idea that Florida can “protect” minors by making them less safe is dangerous and dumb.

The bill is not only privacy-invasive, it’s also asking for the impossible."

eff.org/deeplinks/2025/04/flor

#USA #Florida #SocialMedia #Encryption #Backdoors #Privacy

Florida’s New Social Media Bill Says the Quiet Part Out Loud and Demands an Encryption Backdoor

At least Florida’s SB 868/HB 743, “Social Media Use…

Electronic Frontier Foundation
(RTP) Privacy & Tech Tips
Let's configure BusKill (laptop kill cord) to destroy our encrypted storage (preventing access to sensitive accounts / files) ! This set up will shred our LUKS (Linux encryption) header anytime someone attempts to pull us away from our computer - or our computer away from us. This stops thieves from having any access to our set up, automatically - ensuring any and all sensitive files remain undiscovered. WARNING: following this can make you more vulnerable to data loss. If the magnetic connector is disconnected, you will lose everything on your encrypted volume after following all steps of this video - but that's the point! Be careful not to accidentally disconnect it. This tutorial / guide is intended to be easy to follow. To help anyone interested in BusKill on any encrypted Linux setup. udev (linux device management) allows us to detect when our buskill is disconnected, allowing us to program any action we wish to take upon that disconnect. Buskill offers the pre-written, ready to use luks encryption header shredder script. On its own detecting the luks device, and immediately shredding the header! - making any luks volume inoperable. All sensitive files undiscovered. Attach BusKill to belt loop or bracelet. Finally, most people may want to use the more user friendly / graphical application options that come on buskill: opening the app allows us to select whether we want buskill to shutdown the computer, lock the screen - in an easy to use app. Buskill app comes preincluded for security reasons - within the graphical application you can arm buskill to either lock the screen, or shutdown the computer. We use udev to configure buskill to shred the luks header, making our encrypted Linux volume, inaccessible. Buskill is laptop killcord. If ever pulled away from your laptop, or, your laptop is ever pulled away from you, buskill's magnetic connector detects this, automatically taking action to either: wipe the encryption, shutdown the computer, or: locking the screen. As an open source project, the actions are transparent, and you can explore the project / info on the buskill site: https://www.buskill.in Getting buskill: https://www.buskill.in/store *VIDEO LICENSE:* CC BY-SA. @BusKill - Youtube Channel For Buskill #linux #encryption #laptop -------------------------------------------------------------- Thanks for your support here! SUPPORT CHANNEL BY SHARING ON SOCIAL MEDIA: Bringing you 100% independent content, aiming to introduce the most honest, unfiltered security & privacy content available. Eventually the algorithm must recognize it. Share to help this channel grow! *Thanks for sharing this and all videos. It's a HUGE help reposting these videos!* *SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW* *SHARE YOUR THEORY / THOUGHTS IN COMMENTS* Join me today in this. Leave a comment, share a thought. EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org (VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech) *Watch, And Share With Others!* I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics. *If you learn something here, consider supporting below* (sharing a video on social media is another great way to support this, motivating more time to new content) 💎 *THANK YOU FOR CONSIDERING SUPPORTING THIS CHANNEL* 💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options) *DONATIONS WELCOME* (100% Independent Content): MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM 🪙 BITCOIN: bc1q44j0fjm2d4rp49l3wk6n6teshvztftl2qxuk44 CASHAPP - https://cash.app/$HumanRightsTech MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more) SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻 **PUBLIC BLOG:** https://bmc.link/politictech/posts First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work) 📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com 📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)