Encryption

Search documents
X @mert | helius.dev
mert | helius.dev· 2025-10-05 18:30
The machinery of freedom over time:i) the swordii) the peniii) the shipiv) democracyv) the printing pressvi) the gunvii) the constitutionviii) the personal computer and the internetix) encryptionx) bitcoinxi) unstoppable private money ...
X @TechCrunch
TechCrunch· 2025-10-01 14:22
The U.K. Home Office is seeking access to Apple users’ encrypted iCloud backups for a second time, after an earlier attempt failed earlier this year. https://t.co/SPlTBcsNCn ...
UK government tries again to access encrypted Apple customer data: report
TechCrunch· 2025-10-01 14:18
The U.K. government is still trying to gain access to encrypted iCloud data, according to the Financial Times after British officials allegedly filed a new secret order demanding Apple build a backdoor On Wednesday, the British newspaper reported that the U.K. Home Office sent an order to Apple earlier in September requesting that the tech giant creates a system to let officials access encrypted cloud backups of British citizens. Privacy activists have warned that complying with such an order would be a ...
X @mert | helius.dev
mert | helius.dev· 2025-10-01 10:35
look some of you are in the replies asking why I've been shilling Zcash for a whilerelatively simplei) three important missions in crypto: markets, store of value, privacy/freedomthe last one has been slept on, and it's about to make a comeback as CBDCs and centralized coins accelerateii) there are various large tech improvements coming that will 1,000x performance and scale as well as help with security and finalityiii) monero is a 5B coin and somehow zcash was below 700M when I started talking about itthi ...
X @Cointelegraph
Cointelegraph· 2025-09-26 09:30
🇪🇺 INSIGHT: The EU’s “Chat Control” plan would force messaging apps to scan every private message, video and photo before encryption to fight child abuse. https://t.co/EbaeyfrgYS ...
X @Litecoin
Litecoin· 2025-09-14 15:05
RT Naomi Brockwell priv/acc (@naomibrockwell)Make privacy a badge of honor.Make privacy tools a status symbol.Make the act of encrypting, self-hosting, and masking your identity a signal something that says you’re independent, intelligent, and not easily manipulated.Let's make privacy cool again. ...
Cybersecurity Experts Urge Lawmakers to Pursue Lawful Access Solutions Without Compromising Encryption Integrity
Globenewswire· 2025-08-27 16:27
Core Perspective - The article discusses the implications of encryption backdoors as UK and EU lawmakers consider granting law enforcement access to encrypted data, highlighting concerns from data security experts and privacy advocates about potential risks to digital trust and security [1][2][3]. Group 1: Risks of Weakening Encryption - Weakening encryption for law enforcement could create systemic risks for the general public, undermining digital trust and security [2][3]. - Recent actions, such as Apple halting key encryption protections for UK users, illustrate the backlash against government demands that compromise data security [4]. - The Thales 2025 Digital Trust Index indicates a decline in public confidence in digital services, with only 32% of consumers trusting even the most security-conscious sectors like banking, and 82% abandoning brands over privacy concerns [5]. Group 2: Alternatives to Backdoors - Paperclip advocates for alternatives that maintain end-to-end encryption while allowing lawful access mechanisms under the control of data owners, such as client-managed administrative tools [7]. - Any access mechanism must include robust safeguards, transparent oversight, and clear limitations to prevent abuse [8]. Group 3: Importance of Encryption - Encryption is critical for business continuity, regulatory compliance, and incident response across various sectors, including healthcare, finance, and communications [8]. - International regulations like GDPR and NIS2 Directive emphasize the necessity of secure encryption for data, indicating that weakening encryption could jeopardize consumer data and national infrastructure [9]. Group 4: Collaborative Approach - The article calls for a collaborative approach involving legislators, technologists, civil society, and private sector leaders to address the challenges posed by encryption policies [10]. - The company expresses readiness to work with regulators to develop solutions that uphold security, privacy, and lawful oversight without compromising the safety of the majority [11]. Group 5: About Paperclip Inc. - Paperclip Inc. has over three decades of experience in data security and document management, serving Fortune 1000 companies worldwide [12]. - The company’s SAFE® solution is designed to protect sensitive data from theft and ransom, ensuring that critical data assets are always encrypted and available [14][15].
X @Bankless
Bankless· 2025-08-25 14:43
Core Technology & Architecture - NilGPT utilizes Nillion's privacy tools to secure data throughout its lifecycle, offering a private AI alternative for handling sensitive data [6] - NilGPT integrates three Nillion components: nilCC (Nillion Confidential Compute), nilAI (Nillion Artificial Intelligence), and nilDB [4] - User data is encrypted locally, split via secret-sharing, and stored across independent nilDB nodes using Multi-Party Computation (MPC), ensuring data remains inaccessible without the passphrase [2][5] - nilAI processes queries in Trusted Execution Environments (TEEs) using the Llama-3.1-8B-Instruct model via a RESTful API, keeping data hidden [5] Privacy & Security Features - NilGPT's design hinges on breach-resistant architecture, confidential computation, and verifiable guarantees [2][3] - Trusted Execution Environments (TEEs) and cryptographic primitives protect queries, responses, and chat history, isolating data from server owners [3][4][5] - Planned open-source code, TEE attestations, and provable cryptography will allow users to verify security [3] Market Positioning & User Experience - NilGPT offers a familiar chatbot interface with email or wallet-based account creation for private, cross-device chat history [4] - NilGPT aims to provide zero UX compromises with three agent modes: wellness assistant, personal assistant, companion [4] - NilGPT demands less trust than current AI privacy options, though some features like verifications are upcoming [6]