92 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			HTML
		
	
	
	
	
	
			
		
		
	
	
			92 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			HTML
		
	
	
	
	
	
| ---
 | ||
| layout: page
 | ||
| permalink: /software/real-time-communication/
 | ||
| title: "Real-Time Communication"
 | ||
| description: "Discover secure and private ways to communicate with others online without letting any third parties read your messages."
 | ||
| ---
 | ||
| 
 | ||
| {% include sections/instant-messenger.html %}
 | ||
| 
 | ||
| <h3 id="exploiting-centralized-networks" class="anchor">
 | ||
|   <a href="#exploiting-centralized-networks">
 | ||
|     <i class="fas fa-link anchor-icon"></i>
 | ||
| </a>
 | ||
|   Recent news about breaking E2EE on centralized instant messengers
 | ||
| </h3>
 | ||
| 
 | ||
| <h5>June 2020</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://www.eff.org/deeplinks/2020/06/senates-new-anti-encryption-bill-even-worse-earn-it-and-thats-saying-something">The Senate’s New Anti-Encryption Bill Is Even Worse Than EARN IT, and That’s Saying Something (EFF)</a></li>
 | ||
|   <li><a href="https://cyberlaw.stanford.edu/blog/2020/06/there%E2%80%99s-now-even-worse-anti-encryption-bill-earn-it-doesn%E2%80%99t-make-earn-it-bill-ok">There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK. (Stanford)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h5>March 2020</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://www.eff.org/deeplinks/2020/03/graham-blumenthal-bill-new-path-doj-finally-break-encryption">The Graham-Blumenthal Bill: A New Path for DOJ to Finally Break Encryption (EFF)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h5>January 2020</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://cyberlaw.stanford.edu/blog/2020/01/earn-it-act-how-ban-end-end-encryption-without-actually-banning-it">The EARN IT Act: How to Ban End-to-End Encryption Without Actually Banning It (Stanford)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h5>November 2019</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://www.reuters.com/article/us-interpol-encryption-exclusive-idUSKBN1XR0S7">Exclusive: Interpol plans to condemn encryption spread, citing predators, sources say (Reuters)</a></li>
 | ||
|   <li><a href="https://arstechnica.com/tech-policy/2019/11/think-of-the-children-fbi-sought-interpol-statement-against-end-to-end-crypto/">Think of the children: FBI sought Interpol statement against end-to-end crypto (ArsTechnica)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h5>October 2019</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://www.eff.org/deeplinks/2019/10/open-letter-governments-us-uk-and-australia-facebook-all-out-attack-encryption">The Open Letter from the Governments of US, UK, and Australia to Facebook is An All-Out Attack on Encryption (EFF)</a></li>
 | ||
|   <li><a href="https://arstechnica.com/tech-policy/2019/10/the-broken-record-why-barrs-call-against-end-to-end-encryption-is-nuts/">The broken record: Why Barr’s call against end-to-end encryption is nuts (ArsTechnica)</a></li>
 | ||
|   <li><a href="https://arstechnica.com/information-technology/2019/10/ag-barr-is-pushing-facebook-to-backdoor-whatsapp-and-halt-encryption-plans">US wants Facebook to backdoor WhatsApp and halt encryption plans (ArsTechnica)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h5>August 2019</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://arstechnica.com/tech-policy/2019/08/post-snowden-tech-became-more-secure-but-is-govt-really-at-risk-of-going-dark">Post Snowden tech became more secure, but is government really at risk of going dark? (ArsTechnica)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h5>July 2019</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://techcrunch.com/2019/07/23/william-barr-consumers-security-risks-backdoors/">US attorney general William Barr says Americans should accept security risks of encryption backdoors (TechCrunch)</a></li>
 | ||
|   <li><a href="https://www.theregister.co.uk/2019/07/23/us_encryption_backdoor/">Low Barr: Don't give me that crap about security, just put the backdoors in the encryption, roars US Attorney General (The Register)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h5>May 2019</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://www.theguardian.com/uk-news/2019/may/30/apple-and-whatsapp-condemn-gchq-plans-to-eavesdrop-on-encrypted-chats">Apple and WhatsApp condemn GCHQ plans to eavesdrop on encrypted chats (The Guardian)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h5>January 2019</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://www.justsecurity.org/62114/give-ghost-backdoor/">Give Up the Ghost: A Backdoor by Another Name (Just Security)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h5>December 2018</h5>
 | ||
| <ul>
 | ||
|   <li><a href="https://www.zdnet.com/article/whats-actually-in-australias-encryption-laws-everything-you-need-to-know/">What's actually in Australia's encryption laws? Everything you need to know (ZDnet)</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h3>Complete Comparison</h3>
 | ||
| <ul>
 | ||
|   <li><a href="https://securechatguide.org/effguide.html">securechatguide.org</a> - Guide to Choosing a Messenger.</li>
 | ||
|   <li><a href="https://www.securemessagingapps.com/">securemessagingapps.com</a> - Secure Messaging Apps Comparison.</li>
 | ||
| </ul>
 | ||
| 
 | ||
| <h3 id="#rtc-independent-security-audits">Independent security audits</h3>
 | ||
| <ul>
 | ||
|   <li><a href="https://eprint.iacr.org/2016/1013.pdf">A Formal Security Analysis of the Signal Messaging Protocol (2019)</a> by Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt and Douglas Stebila</li>
 | ||
|   <li><a href="https://www.nccgroup.trust/us/our-research/matrix-olm-cryptographic-review/">Matrix Olm Cryptographic Review</a></li>
 | ||
|   <li><a href="https://briarproject.org/news/2017-beta-released-security-audit">Briar - Darknet Messenger Releases Beta, Passes Security Audit</a></li>
 | ||
| </ul>
 | ||
| 
 | ||
| <hr/>
 | ||
| 
 | ||
| {% include sections/voice-video-messenger.html %}
 | ||
| 
 | ||
| <hr/>
 | ||
| 
 | ||
| {% include sections/teamchat.html %}
 | 
