Articles about Pgp

Phone Booth

ISP GMX attempts the nigh impossible: PGP for the masses

Internet service provide GMX claims to have overcome the notorious usability problems of PGP with the launch of a new email service that offers end-to-end encryption. The new email security works across all devices and platforms: including laptops, tablets, smartphones and web browsers, according to GMX, which says that the …
John Leyden, 6 Oct 2016
shutterstock_287971118--snake-hero

PGP admins: Kill short keys now, or Alice will become Chuck

The issue of short PGP IDs is back on the agenda, with unknown scammers spoofing identities like Linus Torvalds and Tor core developer Isis Agora Lovecruft. Short keys are just what the name describes: instead of someone passing their whole PGP key to someone else to get a message going, people would memorise the last eight …
Nick Weaver

Cops hate encryption but the NSA loves it when you use PGP

Usenix Enigma Although the cops and Feds wont stop banging on and on about encryption – the spies have a different take on the use of crypto. To be brutally blunt, they love it. Why? Because using detectable encryption technology like PGP, Tor, VPNs and so on, lights you up on the intelligence agencies' dashboards. Agents and analysts don't …
Iain Thomson, 27 Jan 2016
Dutch police

BlackBerry baffled by Dutch cops' phone encryption cracked brag

Claims by the Netherlands Forensic Institute (NFI) that it has successfully decrypted emails stored on BlackBerry smartphones have caused bafflement at the Canadian firm. Documents seen by Dutch blog Crime News show the NFI claiming to have decrypted 275 out of 325 emails encrypted with PGP from a handset in their possession. …
Iain Thomson, 13 Jan 2016
Broken CD with wrench

E-mail crypto is as usable as it ever was, say boffins

The main reason the world is able to read and enjoy the contents of Hillary Clinton's emails is that crypto tools aren't any better than back when Phil Zimmerman created PGP, the crypto system even he can't use. That's the conclusion of this study into e-mail crypto usability, a follow-up to a study which reached the same …
padlock

Yahoo! spaffs! out! plugin! to! bring! crypto! to! everyone's! email!

Yahoo! has shown off an OpenPGP-based end-to-end e-mail encryption it says will be offered as a plug-in by the end of the year. Its aim is to make PGP-based encryption more accessible to the everyday layperson. Described in this blog post by Purple Palace chief information security officer Alex Stamos, the mail encryption …

CloudFlare launches nameserver DDoS shield

CloudFlare has launched a DNS proxy service it says will help organisations improve DNS resilience by pushing distributed denial of service attacks to the outer edge of its network. The Virtual DNS service is billed as a means for DNS providers to mitigate a potential "massive single point of failure" in their nameservers …
Darren Pauli, 11 Mar 2015
The "Buffalo" Mine Resistant Ambush Protected (MRAP) vehicle. Credit: US Army

Online armour: Duncan Campbell's tech chief on anonymity 101

Crypto toolbox, Part II In the first article in this two-parter on building your own crypto toolbox I covered older tools that have been around for a relatively long time now: Truecrypt and OpenPGP. Here, I will go in a different direction and look at ways of protecting instant messaging, general web-browsing, and how to trust the operating system …
Matt Fowler, 26 Dec 2014
Man in suit of Viking armour

Armouring up online: Duncan Campbell's chief techie talks crypto with El Reg

Crypto toolbox, Part I I think I was about 15 or 16 when PGP was making headlines for being classified as munitions by the US government and was (supposedly) banned from export. While I wasn’t a subversive type at the time, I got a very strong sense that any software that scared the mighty USA so badly was something I ought to play with and try to …
Matt Fowler, 19 Dec 2014
ISIS Islamists in Iraq

Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks

The Snowden leaks have not changed the way jihadi terorrists communicate, according to a new study. A report by Flashpoint Partners concludes that jihadi/terrorist groups, their recruits and affiliates are making greater use of secure communications tools. Yet the report ascribes this to the development of new encrypted …
John Leyden, 18 Sep 2014

It's time for PGP to die, says ... no, not the NSA – a US crypto prof

A senior cryptographer has sparked debate after calling time on PGP – the gold standard for email and document encryption. Matthew Green is an assistant research professor who lectures in computer science and cryptography at Johns Hopkins University in Maryland, US. This week, on his personal blog, he argued that it's "time …
John Leyden, 14 Aug 2014
NSA parody T-shirt

Crypto Daddy Phil Zimmerman says surveillance society is DOOMED

Defcon 22 A killer combination of rapidly advancing technology and a desire for greater privacy among the public should condemn current surveillance state to an historical anachronism, according to PGP creator Phil Zimmermann. In an extended talk at Defcon 22 in Las Vegas, Zimmermann said it might seem as though the intelligence …
Iain Thomson, 9 Aug 2014
padlock

CERN and MIT chaps' secure webmail stalled by stampede of users

A bunch of CERN alumni has taken time out of the weighty world of particle physics to take another shot at cracking the e-mail encryption nut. Their offering, Proton Mail, has gone into public beta, and proved so popular the group has had to suspend new registrations while it upgrades its servers. As a concept, encrypting e- …
snowden SXSW

Snowden lawyer PGP email 'crack' flap: What REALLY happened?

The leak of a PGP-encrypted email between Ed Snowden's pet journalist Glenn Greenwald and a lawyer has created a bit of a fuss in crypto circles. Jesselyn Radack, a national security and human rights brief, ‪said an encrypted email sent by her to Greenwald was this week leaked by persons unknown to Cryptome, the long-running …
John Leyden, 10 Apr 2014
Angry woman on mobile

Anti-snoop Blackphone hits shelves in June: NOW we'll see how much you value privacy

The launch of the privacy-focused Blackphone attracted plenty of attention at Mobile World Congress last week, but security experts are already warning privacy-conscious potential users not to get too carried away. The technology has limitations and even its developers acknowledge it is not "NSA-proof". Blackphone is scheduled …
John Leyden, 3 Mar 2014

Four ways the Guardian could have protected Snowden – by THE NSA

Analysis The Guardian's editor-in-chief Alan Rusbridger fears journalists – and, by extension, everyone – will be reduced to using pen and paper to avoid prying American and British spooks online. And his reporters must fly around the world to hold face-to-face meetings with sources ("Not good for the environment, but increasingly the …
Chris Williams, 22 Aug 2013
The Register breaking news

Silent Circle adds private email to hush-hush communications

Silent Circle, the private communications venture set up by the founders of PGP and two former US Navy SEALs, has added encrypted emails to its protected text and voice services. Silent Circle email Keeping comms quiet As expected, the new email application uses custom code developed by Phil Zimmermann, Jon Callas, and …
Iain Thomson, 16 Apr 2013
The Register breaking news

Silent Circle aims for email that's as secure as it gets

It's been 22 years since Phil Zimmerman, Jon Callas and the rest of the PGP crew brought encryption to the masses for free, and now the same team – augmented by backing from a couple of former Navy SEALs – has expanded into a new privacy concern that will launch an email service in a couple of weeks. Silent Circle came out of …
Iain Thomson, 6 Apr 2013

Create a news alert about Pgp, or find more stories about Pgp.

Biting the hand that feeds IT © 1998–2017