mirror of
https://github.com/privacyguides/privacyguides.org
synced 2024-12-03 16:33:31 +01:00
87 lines
4.8 KiB
HTML
87 lines
4.8 KiB
HTML
---
|
||
layout: page
|
||
permalink: /software/real-time-communication/
|
||
title: "Real-Time Communication"
|
||
description: "Discover secure and private ways to communicate with others online without letting any third parties read your messages."
|
||
---
|
||
|
||
{% include sections/instant-messenger.html %}
|
||
|
||
<h3 id="exploiting-centralized-networks" class="anchor">
|
||
<a href="#exploiting-centralized-networks">
|
||
<i class="fas fa-link anchor-icon"></i>
|
||
</a>
|
||
Recent news about breaking E2EE on centralized instant messengers
|
||
</h3>
|
||
|
||
<h5>March 2020</h5>
|
||
<ul>
|
||
<li><a href="https://www.eff.org/deeplinks/2020/03/graham-blumenthal-bill-new-path-doj-finally-break-encryption">The Graham-Blumenthal Bill: A New Path for DOJ to Finally Break Encryption (EFF)</a></li>
|
||
</ul>
|
||
|
||
<h5>January 2020</h5>
|
||
<ul>
|
||
<li><a href="https://cyberlaw.stanford.edu/blog/2020/01/earn-it-act-how-ban-end-end-encryption-without-actually-banning-it">The EARN IT Act: How to Ban End-to-End Encryption Without Actually Banning It (Stanford)</a></li>
|
||
</ul>
|
||
|
||
<h5>November 2019</h5>
|
||
<ul>
|
||
<li><a href="https://www.reuters.com/article/us-interpol-encryption-exclusive-idUSKBN1XR0S7">Exclusive: Interpol plans to condemn encryption spread, citing predators, sources say (Reuters)</a></li>
|
||
<li><a href="https://arstechnica.com/tech-policy/2019/11/think-of-the-children-fbi-sought-interpol-statement-against-end-to-end-crypto/">Think of the children: FBI sought Interpol statement against end-to-end crypto (ArsTechnica)</a></li>
|
||
</ul>
|
||
|
||
<h5>October 2019</h5>
|
||
<ul>
|
||
<li><a href="https://www.eff.org/deeplinks/2019/10/open-letter-governments-us-uk-and-australia-facebook-all-out-attack-encryption">The Open Letter from the Governments of US, UK, and Australia to Facebook is An All-Out Attack on Encryption (EFF)</a></li>
|
||
<li><a href="https://arstechnica.com/tech-policy/2019/10/the-broken-record-why-barrs-call-against-end-to-end-encryption-is-nuts/">The broken record: Why Barr’s call against end-to-end encryption is nuts (ArsTechnica)</a></li>
|
||
<li><a href="https://arstechnica.com/information-technology/2019/10/ag-barr-is-pushing-facebook-to-backdoor-whatsapp-and-halt-encryption-plans">US wants Facebook to backdoor WhatsApp and halt encryption plans (ArsTechnica)</a></li>
|
||
</ul>
|
||
|
||
<h5>August 2019</h5>
|
||
<ul>
|
||
<li><a href="https://arstechnica.com/tech-policy/2019/08/post-snowden-tech-became-more-secure-but-is-govt-really-at-risk-of-going-dark">Post Snowden tech became more secure, but is government really at risk of going dark? (ArsTechnica)</a></li>
|
||
</ul>
|
||
|
||
<h5>July 2019</h5>
|
||
<ul>
|
||
<li><a href="https://techcrunch.com/2019/07/23/william-barr-consumers-security-risks-backdoors/">US attorney general William Barr says Americans should accept security risks of encryption backdoors (TechCrunch)</a></li>
|
||
<li><a href="https://www.theregister.co.uk/2019/07/23/us_encryption_backdoor/">Low Barr: Don't give me that crap about security, just put the backdoors in the encryption, roars US Attorney General (The Register)</a></li>
|
||
</ul>
|
||
|
||
<h5>May 2019</h5>
|
||
<ul>
|
||
<li><a href="https://www.theguardian.com/uk-news/2019/may/30/apple-and-whatsapp-condemn-gchq-plans-to-eavesdrop-on-encrypted-chats">Apple and WhatsApp condemn GCHQ plans to eavesdrop on encrypted chats (The Guardian)</a></li>
|
||
</ul>
|
||
|
||
<h5>January 2019</h5>
|
||
<ul>
|
||
<li><a href="https://www.justsecurity.org/62114/give-ghost-backdoor/">Give Up the Ghost: A Backdoor by Another Name (Just Security)</a></li>
|
||
</ul>
|
||
|
||
<h5>December 2018</h5>
|
||
<ul>
|
||
<li><a href="https://www.zdnet.com/article/whats-actually-in-australias-encryption-laws-everything-you-need-to-know/">What's actually in Australia's encryption laws? Everything you need to know (ZDnet)</a></li>
|
||
</ul>
|
||
|
||
<h3>Complete Comparison</h3>
|
||
<ul>
|
||
<li><a href="https://securechatguide.org/effguide.html">securechatguide.org</a> - Guide to Choosing a Messenger.</li>
|
||
<li><a href="https://www.securemessagingapps.com/">securemessagingapps.com</a> - Secure Messaging Apps Comparison.</li>
|
||
</ul>
|
||
|
||
<h3 id="#rtc-independent-security-audits">Independent security audits</h3>
|
||
<ul>
|
||
<li><a href="https://eprint.iacr.org/2016/1013.pdf">A Formal Security Analysis of the Signal Messaging Protocol (2019)</a> by Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt and Douglas Stebila</li>
|
||
<li><a href="https://keybase.io/docs-assets/blog/NCC_Group_Keybase_KB2018_Public_Report_2019-02-27_v1.3.pdf">Keybase's Protocol Security Review (2019)</a> by <a href="https://www.nccgroup.trust/">NCC Group</a></li>
|
||
<li><a href="https://www.nccgroup.trust/us/our-research/matrix-olm-cryptographic-review/">Matrix Olm Cryptographic Review</a></li>
|
||
<li><a href="https://briarproject.org/news/2017-beta-released-security-audit">Briar - Darknet Messenger Releases Beta, Passes Security Audit</a></li>
|
||
</ul>
|
||
|
||
<hr/>
|
||
|
||
{% include sections/voice-video-messenger.html %}
|
||
|
||
<hr/>
|
||
|
||
{% include sections/teamchat.html %}
|