Hashtag

#E2EE

286 posts tagged with this hashtag.

@TomsITCafe@mastodon.social
@matrix@mastodon.matrix.org

💡 Got a story to tell about Matrix? The 2026 CFP is open!

Topics include: Matrix internals, public sector deployments, community, safety, and more.

🗓️ Oct 20-23, 2026 | Malmö, Sweden

cfp.2026.matrix.org/matrix-con

cfp.2026.matrix.org

The Matrix Conference 2026

Schedule, talks and talk submissions for The Matrix Conference 2026

@apps@toot.fedilab.app
@benpate@mastodon.social

ZOMG! news on the Fediverse keeps getting better

The @HolosSocial team is planning to implement the same encryption standard as Mastodon, Bonfire, and Emissary.

When it lands, truly private messages should interoperate between all four platforms. This is an _absolute_win_ for open platforms and open APIs.

mastodon.social

Holos Social (@HolosSocial@mastodon.social)

@benpate Holos will update its E2EE model to align with the shared spec, shipped well before 2027 and landing in the Fediverse first. Mastodon will likely make its own choices later on, and Holos will adapt again to stay compatible. No problem. @lgsp@social.tchncs.de @apps@toot.fedilab.app

@HolosSocial@mastodon.social · Reply to Ben Pate 🤘🏻

@benpate
Holos will update its E2EE model to align with the shared spec, shipped well before 2027 and landing in the Fediverse first. Mastodon will likely make its own choices later on, and Holos will adapt again to stay compatible. No problem.
@lgsp @apps

@apps@toot.fedilab.app
@apps@toot.fedilab.app
@apps@toot.fedilab.app
@apps@toot.fedilab.app
@benpate@mastodon.social

ZOMG! news on the Fediverse keeps getting better

The @HolosSocial team is planning to implement the same encryption standard as Mastodon, Bonfire, and Emissary.

When it lands, truly private messages should interoperate between all four platforms. This is an _absolute_win_ for open platforms and open APIs.

mastodon.social

Holos Social (@HolosSocial@mastodon.social)

@benpate Holos will update its E2EE model to align with the shared spec, shipped well before 2027 and landing in the Fediverse first. Mastodon will likely make its own choices later on, and Holos will adapt again to stay compatible. No problem. @lgsp@social.tchncs.de @apps@toot.fedilab.app

@HolosSocial@mastodon.social · Reply to Ben Pate 🤘🏻

@benpate
Holos will update its E2EE model to align with the shared spec, shipped well before 2027 and landing in the Fediverse first. Mastodon will likely make its own choices later on, and Holos will adapt again to stay compatible. No problem.
@lgsp @apps

@benpate@mastodon.social

ZOMG! news on the Fediverse keeps getting better

The @HolosSocial team is planning to implement the same encryption standard as Mastodon, Bonfire, and Emissary.

When it lands, truly private messages should interoperate between all four platforms. This is an _absolute_win_ for open platforms and open APIs.

mastodon.social

Holos Social (@HolosSocial@mastodon.social)

@benpate Holos will update its E2EE model to align with the shared spec, shipped well before 2027 and landing in the Fediverse first. Mastodon will likely make its own choices later on, and Holos will adapt again to stay compatible. No problem. @lgsp@social.tchncs.de @apps@toot.fedilab.app

@HolosSocial@mastodon.social · Reply to Ben Pate 🤘🏻

@benpate
Holos will update its E2EE model to align with the shared spec, shipped well before 2027 and landing in the Fediverse first. Mastodon will likely make its own choices later on, and Holos will adapt again to stay compatible. No problem.
@lgsp @apps

@markwyner@mas.to
@markwyner@mas.to
@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social

@manul70 Yup! Though I'm less concerned with nation states. Nation-states are considered an "Advanced Persistent Threat" - and if they want into your devices, then god help you. Relevant xkcd: xkcd.com/538/

But, this will be great for thwarting the next tier down: web scrapers, nosy admins, and corporate spies.

Anyone building is a win for the Fediverse...

MASTODON building e2ee is a HUGE win for the Fediverse.

xkcd.com

Security

@benpate@mastodon.social · Reply to rick

@rick @phnt@fluffytail.org

Sorry, I can't see the intermediate message you're replying to (xenofem.me is returning errors) so here's just a generic take on content scanning.

It's not possible to content scan MLS-encrypted messages, so that won't apply to this project. And yeah, people will use to do bad things. It's the same calculus as with Matrix, Signal, Apple Messages, and others: the benefits to good people outweigh the negatives.

@benpate@mastodon.social · Reply to GreenSkyOverMe (Monika)

@GreenSkyOverMe

As I understand it, Mastodon is building to the MLS in ActivityPub spec from the SWF - the same one and are building to today. So it will be compatible with those.

I think Hollos uses the Signal protocol, which is similar, but not the same as MLS.

What other solutions are you referring to?

swicg.github.io/activitypub-e2

swicg.github.io

Messaging Layer Security in ActivityPub

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social · Reply to linstrom-developer

@linstrom-developer

The good news is that the whole spec is modular. And it’s not too much work on the server. If you can build out basic C2S services, then 90% of the work is on the client (as you’d hope with )

But clients *should* be interchangeable, so the Emissary messenger app would be able to work with a Linstrom server.

It’s the seeds of an ecosystem that many more builders will be joining. 🤘🏻🤘🏻🤘🏻

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@arcanechat@fosstodon.org

listening to music on 👎

listening to inside while the playlist and currently playing song is synchronized so me and the boys chill listening to the same song at the same time in real-time 👍

all end-to-end , with Perfect Forward Secrecy (), no centralized servers, no platform, no , no logins, no personal data, no age verification, no bullshit, just you, your friends and the chilling vibes

an screenshot of an in-chat mini-app in ArcaneChat, the mini-app is a music player with a playlist
ALT text

an screenshot of an in-chat mini-app in ArcaneChat, the mini-app is a music player with a playlist

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@benpate@mastodon.social

Have you seen this news?

just got funding to add end to end encryption into their software.

So, some time next year, you’ll be able to send truly private messages to the vast majority of the

Im so excited about this.

Because it’s an open spec, this opens the doors for every Fediverse app to join the party.

Yesterday, this project was a proof of concept. Today, Mastodon has turned it into a stampede.

blog.joinmastodon.org/2026/04/

blog.joinmastodon.org

Sovereign Tech Agency funding

Announcing a service agreement for new work to improve Mastodon and the broader ecosystem.

@arcanechat@fosstodon.org

listening to music on 👎

listening to inside while the playlist and currently playing song is synchronized so me and the boys chill listening to the same song at the same time in real-time 👍

all end-to-end , with Perfect Forward Secrecy (), no centralized servers, no platform, no , no logins, no personal data, no age verification, no bullshit, just you, your friends and the chilling vibes

an screenshot of an in-chat mini-app in ArcaneChat, the mini-app is a music player with a playlist
ALT text

an screenshot of an in-chat mini-app in ArcaneChat, the mini-app is a music player with a playlist

@HolosSocial@mastodon.social

started at the end of 2025. A full server now runs on your phone, with the ability to use your own domain as your identity, DMs via Signal Protocol, zero-knowledge encrypted backup, media served from your own cloud, a tailored timeline based on your interests thanks to , and the ability to switch views depending on your mood or the content you want to browse. Thank you for your feedback and support that helped to go through these steps.

@HolosSocial@mastodon.social

started at the end of 2025. A full server now runs on your phone, with the ability to use your own domain as your identity, DMs via Signal Protocol, zero-knowledge encrypted backup, media served from your own cloud, a tailored timeline based on your interests thanks to , and the ability to switch views depending on your mood or the content you want to browse. Thank you for your feedback and support that helped to go through these steps.

@HolosSocial@mastodon.social

started at the end of 2025. A full server now runs on your phone, with the ability to use your own domain as your identity, DMs via Signal Protocol, zero-knowledge encrypted backup, media served from your own cloud, a tailored timeline based on your interests thanks to , and the ability to switch views depending on your mood or the content you want to browse. Thank you for your feedback and support that helped to go through these steps.

@HolosSocial@mastodon.social

started at the end of 2025. A full server now runs on your phone, with the ability to use your own domain as your identity, DMs via Signal Protocol, zero-knowledge encrypted backup, media served from your own cloud, a tailored timeline based on your interests thanks to , and the ability to switch views depending on your mood or the content you want to browse. Thank you for your feedback and support that helped to go through these steps.

@HolosSocial@mastodon.social

started at the end of 2025. A full server now runs on your phone, with the ability to use your own domain as your identity, DMs via Signal Protocol, zero-knowledge encrypted backup, media served from your own cloud, a tailored timeline based on your interests thanks to , and the ability to switch views depending on your mood or the content you want to browse. Thank you for your feedback and support that helped to go through these steps.

@ErikvanStraten@todon.nl · Reply to f*cking b*tch club

@grammasaurus : if I understand the patent correctly, the content seen by a user in their browser will not for 100% originate from your website given its domain name.

However, Google may let their Chrome browser show your domain name in the address bar and even suggest that a server-authenticated and encrypted valid https connection is being used (proving the authenticity of your website, which is then fully broken).

Google may even force other browser makers (such as Mozilla, sponsored by Google) to do the same.

@SteveRudolfi

@apps@toot.fedilab.app · Reply to Fedilab Apps

Taking on challenges like direct messages or making your identity independent from any server was a priority for me. Not depending on any external API means all the cards are in our hands to respond to what people need, without compromise. Behind the scenes, the work between the app and the relay is tightly coupled. A lot of relay improvements, especially around Bloom filter performance, are not always reflected in changelogs.(3/4)

@benpate@mastodon.social

I'm deep into refactoring the code today. My goal is to reconstruct all of the server side code.

So, it's back to roulette for today's coding music. It's simple: go to search, pick a hashtag (#Ambient for me, please), then play the top album in the results. They shuffle every time you reload, so there's always something new.

First up for me ~ Pathfinder by HCM: bandwagon.fm/678ec24cd84b0eb34

bandwagon.fm

Pathfinder

@benpate@mastodon.social

I'm deep into refactoring the code today. My goal is to reconstruct all of the server side code.

So, it's back to roulette for today's coding music. It's simple: go to search, pick a hashtag (#Ambient for me, please), then play the top album in the results. They shuffle every time you reload, so there's always something new.

First up for me ~ Pathfinder by HCM: bandwagon.fm/678ec24cd84b0eb34

bandwagon.fm

Pathfinder

@benpate@mastodon.social

I'm deep into refactoring the code today. My goal is to reconstruct all of the server side code.

So, it's back to roulette for today's coding music. It's simple: go to search, pick a hashtag (#Ambient for me, please), then play the top album in the results. They shuffle every time you reload, so there's always something new.

First up for me ~ Pathfinder by HCM: bandwagon.fm/678ec24cd84b0eb34

bandwagon.fm

Pathfinder

@benpate@mastodon.social · Reply to dansup

@dansup That would be amazing. I would love to help you any way you need, and I can chat whenever it's good for you.

And, don't forget @Bonfire - they're also building to the same standard. will be awesome for the .. but only if there's general between different projects.

If you want some fun bedtime reading before we chat, I'm collecting all of my notes on the project here: emissary.dev/e2ee

That page includes links to the spec, Github, and other stuff.

emissary.dev

Emissary | Developer Site - MLS in ActivityPub

@benpate@mastodon.social

I'm deep into refactoring the code today. My goal is to reconstruct all of the server side code.

So, it's back to roulette for today's coding music. It's simple: go to search, pick a hashtag (#Ambient for me, please), then play the top album in the results. They shuffle every time you reload, so there's always something new.

First up for me ~ Pathfinder by HCM: bandwagon.fm/678ec24cd84b0eb34

bandwagon.fm

Pathfinder

@benpate@mastodon.social

I'm deep into refactoring the code today. My goal is to reconstruct all of the server side code.

So, it's back to roulette for today's coding music. It's simple: go to search, pick a hashtag (#Ambient for me, please), then play the top album in the results. They shuffle every time you reload, so there's always something new.

First up for me ~ Pathfinder by HCM: bandwagon.fm/678ec24cd84b0eb34

bandwagon.fm

Pathfinder

@strypey@mastodon.nzoss.nz

"The option “Move automatically to DeltaChat Folder” as well as other legacy options will be removed in the next weeks.

...

Only if you share the same email address for chatting and classic usage, which is discouraged since some time, the encrypted messages in the Inbox may be annoying."

delta.chat/en/legacy-move

This is news to me @delta.

(1/?)

delta.chat

Delta Chat: Use a Dedicated Chat Profile

Use a Dedicated Chat Profile This page is a service for users still using legacy options. If you did not get a warning, go for something else, maybe play a game inside Delta Chat :) Required Steps ...

@benpate@mastodon.social · Reply to wakest likes your bugs ⁂

@liaizon

Everything on the table:

I should do this, but have been waiting because I *really* want to self-host the main and accounts on my own software.

Right now, Emissary is a great PUBLISHER and READER, but it does a poor job with DMs. So I couldn’t really use Emissary to support questions like this one.

It’s been on my roadmap for a while, and it’s why I’m excited to build DMs, too.

But I do plan to launch these as soon as I have a good solution for DMs.

@benpate@mastodon.social · Reply to Hollo :hollo:

@hollo

Fantastic! If you already support the ActivityPub API (C2S) then the server-side changes are relatively small. Once we've road-tested the spec, I'm happy to help you set it up :)

And, my apologies. I confused you with another project that's doing with the Signal protocol. In my defense, holos.social is a similar enough name at first glance.

holos.social

Fediverse Relay - Mobile-First Federated Social Network

A mobile-first federated social network powered by ActivityPub. Join the fediverse with privacy, security, and freedom.

@benpate@mastodon.social

Check this out: clip.place/w/ajgJ5Hi69bbbxHCK3

I just published a video of the new "end to end encryption" protocol for ActivityPub in . The UX is rougher than I'd like, but you can see the client app is coming along nicely.

Today, it sends and receives messages using MLS, a widely used industry standard and successor to the Signal protocol.

By June 2026, it should be ready for you.

For more details on the project and my progress, see: emissary.dev/e2ee

emissary.dev

Emissary | Developer Site - MLS in ActivityPub

@benpate@mastodon.social · Reply to Hollo :hollo:

@hollo

Very cool, guys! Kudos!

is also working on encrypted DMs similar to Hollo. They’re using MLS, which is similar, but slightly different from the Signal protocol you’re using.

I know it’s a big request, but what are the chances of getting your messages to work with Bonfire (and ) too?

It would be great for the Fediverse to have a unified E2EE standard in 2026.

Let me know if it’s a possibility. I’m happy to tour you through our work so far!

@benpate@mastodon.social

Check this out: clip.place/w/ajgJ5Hi69bbbxHCK3

I just published a video of the new "end to end encryption" protocol for ActivityPub in . The UX is rougher than I'd like, but you can see the client app is coming along nicely.

Today, it sends and receives messages using MLS, a widely used industry standard and successor to the Signal protocol.

By June 2026, it should be ready for you.

For more details on the project and my progress, see: emissary.dev/e2ee

emissary.dev

Emissary | Developer Site - MLS in ActivityPub

@benpate@mastodon.social

Check this out: clip.place/w/ajgJ5Hi69bbbxHCK3

I just published a video of the new "end to end encryption" protocol for ActivityPub in . The UX is rougher than I'd like, but you can see the client app is coming along nicely.

Today, it sends and receives messages using MLS, a widely used industry standard and successor to the Signal protocol.

By June 2026, it should be ready for you.

For more details on the project and my progress, see: emissary.dev/e2ee

emissary.dev

Emissary | Developer Site - MLS in ActivityPub

@benpate@mastodon.social

Check this out: clip.place/w/ajgJ5Hi69bbbxHCK3

I just published a video of the new "end to end encryption" protocol for ActivityPub in . The UX is rougher than I'd like, but you can see the client app is coming along nicely.

Today, it sends and receives messages using MLS, a widely used industry standard and successor to the Signal protocol.

By June 2026, it should be ready for you.

For more details on the project and my progress, see: emissary.dev/e2ee

emissary.dev

Emissary | Developer Site - MLS in ActivityPub

@benpate@mastodon.social

Check this out: clip.place/w/ajgJ5Hi69bbbxHCK3

I just published a video of the new "end to end encryption" protocol for ActivityPub in . The UX is rougher than I'd like, but you can see the client app is coming along nicely.

Today, it sends and receives messages using MLS, a widely used industry standard and successor to the Signal protocol.

By June 2026, it should be ready for you.

For more details on the project and my progress, see: emissary.dev/e2ee

emissary.dev

Emissary | Developer Site - MLS in ActivityPub

@xoron@infosec.exchange

Signal Protocol for a P2P Webapp

TL;DR: I have open-sourced a implementation of the that compiles to for -based messaging, overcoming the limitations of the official library.

I am sharing my implementation of the Signal Protocol designed specifically for the . While the official libsignal is the gold standard, its targets are often optimized for Node.js, which creates integration challenges for client-side web applications.

My version is built in and compiles to , utilizing to provide robust for decentralized environments. It currently powers the end-to-end security for my messaging project.

Protocol Demo:
signal.positive-intentions.com/

P2P App Demo:
p2p.positive-intentions.com/if

I am looking for feedback from the and community. If you have experience with audits or formal-proof verification, I would appreciate your eyes on the codebase as I work toward a more finished state.

GitHub Repository:
github.com/positive-intentions

signal protocol
ALT text

signal protocol

@xoron@infosec.exchange

Signal Protocol for a P2P Webapp

TL;DR: I have open-sourced a implementation of the that compiles to for -based messaging, overcoming the limitations of the official library.

I am sharing my implementation of the Signal Protocol designed specifically for the . While the official libsignal is the gold standard, its targets are often optimized for Node.js, which creates integration challenges for client-side web applications.

My version is built in and compiles to , utilizing to provide robust for decentralized environments. It currently powers the end-to-end security for my messaging project.

Protocol Demo:
signal.positive-intentions.com/

P2P App Demo:
p2p.positive-intentions.com/if

I am looking for feedback from the and community. If you have experience with audits or formal-proof verification, I would appreciate your eyes on the codebase as I work toward a more finished state.

GitHub Repository:
github.com/positive-intentions

signal protocol
ALT text

signal protocol

@xoron@infosec.exchange

Signal Protocol for a P2P Webapp

TL;DR: I have open-sourced a implementation of the that compiles to for -based messaging, overcoming the limitations of the official library.

I am sharing my implementation of the Signal Protocol designed specifically for the . While the official libsignal is the gold standard, its targets are often optimized for Node.js, which creates integration challenges for client-side web applications.

My version is built in and compiles to , utilizing to provide robust for decentralized environments. It currently powers the end-to-end security for my messaging project.

Protocol Demo:
signal.positive-intentions.com/

P2P App Demo:
p2p.positive-intentions.com/if

I am looking for feedback from the and community. If you have experience with audits or formal-proof verification, I would appreciate your eyes on the codebase as I work toward a more finished state.

GitHub Repository:
github.com/positive-intentions

signal protocol
ALT text

signal protocol

@apps@toot.fedilab.app

We talk about forgetting some of you might not know this project.
is a full ActivityPub server running on your device. Currently on Android, next on iOS.
We already introduced DMs and identity through custom domains. You own your followers, your keys, and your identity. Relays are just infrastructure.
On the footer of holos.social we added pages explaining the project. Have a look!

Mastodon: @HolosSocial Don't hesitate to share

holos.social

Fediverse Relay - Mobile-First Federated Social Network

A mobile-first federated social network powered by ActivityPub. Join the fediverse with privacy, security, and freedom.

@apps@toot.fedilab.app

We talk about forgetting some of you might not know this project.
is a full ActivityPub server running on your device. Currently on Android, next on iOS.
We already introduced DMs and identity through custom domains. You own your followers, your keys, and your identity. Relays are just infrastructure.
On the footer of holos.social we added pages explaining the project. Have a look!

Mastodon: @HolosSocial Don't hesitate to share

holos.social

Fediverse Relay - Mobile-First Federated Social Network

A mobile-first federated social network powered by ActivityPub. Join the fediverse with privacy, security, and freedom.

@homegrown@social.growyourown.services

If you're interested in setting up a secure chat service for you and your friends, you might want to try @snikket_im

🌱 snikket.org

It's really cheap to run and easy to set up, it's managed hosting so you don't need to do techy stuff.

Technical details: it runs on XMPP with OMEMO end-to-end encryption, but this is hidden behind non-technical branding so it doesn't scare people.

Instances are federated, Snikket and other types of XMPP instance can communicate.

snikket.org

Snikket Chat

Snikket is a simple, secure and private messaging app

@homegrown@social.growyourown.services

If you're interested in setting up a secure chat service for you and your friends, you might want to try @snikket_im

🌱 snikket.org

It's really cheap to run and easy to set up, it's managed hosting so you don't need to do techy stuff.

Technical details: it runs on XMPP with OMEMO end-to-end encryption, but this is hidden behind non-technical branding so it doesn't scare people.

Instances are federated, Snikket and other types of XMPP instance can communicate.

snikket.org

Snikket Chat

Snikket is a simple, secure and private messaging app

@papiris@hachyderm.io

I want to be part of a flat collective/network of folks / orgs working together to provide resilient e2ee data storage using free software.

Like a file backup / object storage federation of sorts.

I want it to be scalable, i.e. folks and orgs who have spare storage capacity can contribute this capacity to the collective, effectively increasing the collective's total storage capacity. The collective should gracefully handle nodes dropping off or quitting the collective, and re-joining.

The API should be well-known, preferably something like S3, so the collective/network easily integrates as a backend for existing software.

I think there should be some way to 'balance the books' so to speak, to avoid selfish behavior like a participant providing 3GiB of storage and using 3TiB.

The balancing can be in-software, e.g. each participant gets an identity which the software uses to identify how much the participant contributes and utilizes across all their nodes.

The balancing can also be out-of software, through a member system or similar.

Would be nice with a social aspect.

Is there already something like this?

What software would be good for building something like this?

@deuxfleurs would fit this use case?
If I understand correctly, Garage can scale to many nodes in many locations/zones, but 3-4 zones (one of which can be a hot spare) is recommended. If a garage cluster consists of 50 zones with 150 nodes total, will chunks be spread across zones in a way that isn't limited by low-capacity zones? Does the total storage capacity of the cluster depend on whichever location has the least capacity?

Another option I found earlier is @peergos, but I'm fairly lacking in knowledge about the project. Being p2p, would that fit this use case better?

@papiris@hachyderm.io

I want to be part of a flat collective/network of folks / orgs working together to provide resilient e2ee data storage using free software.

Like a file backup / object storage federation of sorts.

I want it to be scalable, i.e. folks and orgs who have spare storage capacity can contribute this capacity to the collective, effectively increasing the collective's total storage capacity. The collective should gracefully handle nodes dropping off or quitting the collective, and re-joining.

The API should be well-known, preferably something like S3, so the collective/network easily integrates as a backend for existing software.

I think there should be some way to 'balance the books' so to speak, to avoid selfish behavior like a participant providing 3GiB of storage and using 3TiB.

The balancing can be in-software, e.g. each participant gets an identity which the software uses to identify how much the participant contributes and utilizes across all their nodes.

The balancing can also be out-of software, through a member system or similar.

Would be nice with a social aspect.

Is there already something like this?

What software would be good for building something like this?

@deuxfleurs would fit this use case?
If I understand correctly, Garage can scale to many nodes in many locations/zones, but 3-4 zones (one of which can be a hot spare) is recommended. If a garage cluster consists of 50 zones with 150 nodes total, will chunks be spread across zones in a way that isn't limited by low-capacity zones? Does the total storage capacity of the cluster depend on whichever location has the least capacity?

Another option I found earlier is @peergos, but I'm fairly lacking in knowledge about the project. Being p2p, would that fit this use case better?

@apps@toot.fedilab.app

We have published a new version of app (rc-1) that supports DMs over ActivityPub.

We wrote a page that explains our E2EE implementation: holos.social/e2ee

If you want to discover how Holos app and relay work together: holos.social/how-it-works

holos.social

How It Works - Holos

Your phone becomes your social server

@HolosSocial@mastodon.social

We are entering a new step in the development of and we need more people to test.
We have reopened subscriptions through the app: holos.social/signup

We wrote a page explaining how we implemented DMs over : holos.social/e2ee

Don't hesitate to contribute and share your feedback with us. Thank you.

holos.social

End-to-End Encryption - Holos

Your private messages, readable only by you and your recipient

@HolosSocial@mastodon.social

We are entering a new step in the development of and we need more people to test.
We have reopened subscriptions through the app: holos.social/signup

We wrote a page explaining how we implemented DMs over : holos.social/e2ee

Don't hesitate to contribute and share your feedback with us. Thank you.

holos.social

End-to-End Encryption - Holos

Your private messages, readable only by you and your recipient

@HolosSocial@mastodon.social

We are entering a new step in the development of and we need more people to test.
We have reopened subscriptions through the app: holos.social/signup

We wrote a page explaining how we implemented DMs over : holos.social/e2ee

Don't hesitate to contribute and share your feedback with us. Thank you.

holos.social

End-to-End Encryption - Holos

Your private messages, readable only by you and your recipient

@HolosSocial@mastodon.social

We are entering a new step in the development of and we need more people to test.
We have reopened subscriptions through the app: holos.social/signup

We wrote a page explaining how we implemented DMs over : holos.social/e2ee

Don't hesitate to contribute and share your feedback with us. Thank you.

holos.social

End-to-End Encryption - Holos

Your private messages, readable only by you and your recipient

@HolosSocial@mastodon.social

We are entering a new step in the development of and we need more people to test.
We have reopened subscriptions through the app: holos.social/signup

We wrote a page explaining how we implemented DMs over : holos.social/e2ee

Don't hesitate to contribute and share your feedback with us. Thank you.

holos.social

End-to-End Encryption - Holos

Your private messages, readable only by you and your recipient

@HolosSocial@mastodon.social

We are entering a new step in the development of and we need more people to test.
We have reopened subscriptions through the app: holos.social/signup

We wrote a page explaining how we implemented DMs over : holos.social/e2ee

Don't hesitate to contribute and share your feedback with us. Thank you.

holos.social

End-to-End Encryption - Holos

Your private messages, readable only by you and your recipient

@apps@toot.fedilab.app

We have published a new version of app (rc-1) that supports DMs over ActivityPub.

We wrote a page that explains our E2EE implementation: holos.social/e2ee

If you want to discover how Holos app and relay work together: holos.social/how-it-works

holos.social

How It Works - Holos

Your phone becomes your social server

@apps@toot.fedilab.app

We have published a new version of app (rc-1) that supports DMs over ActivityPub.

We wrote a page that explains our E2EE implementation: holos.social/e2ee

If you want to discover how Holos app and relay work together: holos.social/how-it-works

holos.social

How It Works - Holos

Your phone becomes your social server

@vivekanandanks@mstdn.social · Reply to evacide

@evacide
Someone clarify me please 🤔

If e2ee happens from client to client, means a closed proprietary app like WhatsApp can use the decrypted messages at the client level & do can steal it even though the connection is marketed as e2ee

Am I right, or I'm missing out something?

Coz I see the option to send last 5 messages to meta when I report a spam and block the number.

So the e2ee is useless if the client is closed source right? 🤔

@i47i@hachyderm.io

Lawsuit Alleges That WhatsApp Has No End-to-End Encryption

A lawsuit filed in San Francisco alleges that 's end-to-end encryption contains backdoors allowing employees to access user messages in real-time.

According to the complaint, internal tools allow engineers to view chats by User ID without a separate decryption step, bypassing the Signal Protocol protections the app claims to use.

The lawsuit cites £whistleblowers who claim that workers can request access to specific accounts via internal tasks, gaining unlimited temporal scope to a user's history, including deleted messages. Meta has labeled these claims false and absurd.

Technical experts note that while the Signal Protocol itself is mathematically secure, the integrity of end-to-end encryption relies entirely on the security of the endpoints. Potential vulnerabilities in WhatsApp include unencrypted cloud backups, metadata collection, and the fact that the client software is closed-source.

Without the ability to audit the code or verify public keys through an independent directory, users must trust that the application is not exfiltrating plaintext data before it is encrypted for transit.

The legal action highlights the ongoing tension between corporate privacy marketing and the technical reality of centralized messaging platforms. If the allegations of an internal "widget" for message access are proven true, it would represent a fundamental breach of the encryption standards Meta has advertised since 2016.
it.slashdot.org/story/26/01/27

it.slashdot.org

Lawsuit Alleges That WhatsApp Has No End-to-End Encryption - Slashdot

Longtime Slashdot reader schwit1 shares a report from PCMag: A lawsuit claims that WhatsApp's end-to-end encryption is a sham, and is demanding damages, but the app's parent company, Meta, calls the claims "false and absurd." The lawsuit was filed in a San Francisco US district court on Friday and c...

@i47i@hachyderm.io

Lawsuit Alleges That WhatsApp Has No End-to-End Encryption

A lawsuit filed in San Francisco alleges that 's end-to-end encryption contains backdoors allowing employees to access user messages in real-time.

According to the complaint, internal tools allow engineers to view chats by User ID without a separate decryption step, bypassing the Signal Protocol protections the app claims to use.

The lawsuit cites £whistleblowers who claim that workers can request access to specific accounts via internal tasks, gaining unlimited temporal scope to a user's history, including deleted messages. Meta has labeled these claims false and absurd.

Technical experts note that while the Signal Protocol itself is mathematically secure, the integrity of end-to-end encryption relies entirely on the security of the endpoints. Potential vulnerabilities in WhatsApp include unencrypted cloud backups, metadata collection, and the fact that the client software is closed-source.

Without the ability to audit the code or verify public keys through an independent directory, users must trust that the application is not exfiltrating plaintext data before it is encrypted for transit.

The legal action highlights the ongoing tension between corporate privacy marketing and the technical reality of centralized messaging platforms. If the allegations of an internal "widget" for message access are proven true, it would represent a fundamental breach of the encryption standards Meta has advertised since 2016.
it.slashdot.org/story/26/01/27

it.slashdot.org

Lawsuit Alleges That WhatsApp Has No End-to-End Encryption - Slashdot

Longtime Slashdot reader schwit1 shares a report from PCMag: A lawsuit claims that WhatsApp's end-to-end encryption is a sham, and is demanding damages, but the app's parent company, Meta, calls the claims "false and absurd." The lawsuit was filed in a San Francisco US district court on Friday and c...

@ambiguous_yelp@veganism.social · Reply to evacide

@evacide @mshelton

Signal is centralised and was attempted backdoored by the uks online safety bill and saved by signal threatening to walk. Simplex is open source and quantum resistant e2ee like signal and also has its secret group chats and metadata protection like Signal but SimpleX is also decentralised with ip protection, tor support, no persistent id basically "a burner phone for every contact"
Signals centralisation also makes it more vulnerable to total censorship, all you need to do is block signals domains, being a decentralised network SimplexChat has no single point of failure to censor and anyone can run their own relay node

@benpate@mastodon.social

I've just sent the first end-to-end-encrypted messages from one instance to another.

News from around the USA really has me down, so it's important to celebrate the little wins 🎉

And, there's still so much to do. But with equal quantities of luck and caffeine, I can screencast some early prototypes for you before too long.

I believe is important for the because it will give us more ways to use this network, and expand what people can do here.

Application screenshot of the terminal from my laptop, showing debug output of an ActivityPub message being sent from one account and received by another.

It's really a bunch of gibberish, but that's the point. The messages are "end to end" encrypted using MLS, so there's nothing to actually read. And the lack of readable information is the whole point.
ALT text

Application screenshot of the terminal from my laptop, showing debug output of an ActivityPub message being sent from one account and received by another. It's really a bunch of gibberish, but that's the point. The messages are "end to end" encrypted using MLS, so there's nothing to actually read. And the lack of readable information is the whole point.

@benpate@mastodon.social

I've just sent the first end-to-end-encrypted messages from one instance to another.

News from around the USA really has me down, so it's important to celebrate the little wins 🎉

And, there's still so much to do. But with equal quantities of luck and caffeine, I can screencast some early prototypes for you before too long.

I believe is important for the because it will give us more ways to use this network, and expand what people can do here.

Application screenshot of the terminal from my laptop, showing debug output of an ActivityPub message being sent from one account and received by another.

It's really a bunch of gibberish, but that's the point. The messages are "end to end" encrypted using MLS, so there's nothing to actually read. And the lack of readable information is the whole point.
ALT text

Application screenshot of the terminal from my laptop, showing debug output of an ActivityPub message being sent from one account and received by another. It's really a bunch of gibberish, but that's the point. The messages are "end to end" encrypted using MLS, so there's nothing to actually read. And the lack of readable information is the whole point.

@delta@chaos.social

does

- no bindings to public handles/numbers

- no address-book upload

- not do public contact or group discovery

- not have critical persistent server state (!)

Social identification is private, between people though ephemeral messages.

Servers see messages with random sender and recipient addresses, but those can not be mapped to a phone number or public handle. Servers see IP addresses. But you can use Tor, or a VPN, if you want to hide that.

It' not all bad :)

@benpate@mastodon.social

I've just sent the first end-to-end-encrypted messages from one instance to another.

News from around the USA really has me down, so it's important to celebrate the little wins 🎉

And, there's still so much to do. But with equal quantities of luck and caffeine, I can screencast some early prototypes for you before too long.

I believe is important for the because it will give us more ways to use this network, and expand what people can do here.

Application screenshot of the terminal from my laptop, showing debug output of an ActivityPub message being sent from one account and received by another.

It's really a bunch of gibberish, but that's the point. The messages are "end to end" encrypted using MLS, so there's nothing to actually read. And the lack of readable information is the whole point.
ALT text

Application screenshot of the terminal from my laptop, showing debug output of an ActivityPub message being sent from one account and received by another. It's really a bunch of gibberish, but that's the point. The messages are "end to end" encrypted using MLS, so there's nothing to actually read. And the lack of readable information is the whole point.

@delta@chaos.social

does

- no bindings to public handles/numbers

- no address-book upload

- not do public contact or group discovery

- not have critical persistent server state (!)

Social identification is private, between people though ephemeral messages.

Servers see messages with random sender and recipient addresses, but those can not be mapped to a phone number or public handle. Servers see IP addresses. But you can use Tor, or a VPN, if you want to hide that.

It' not all bad :)

@benpate@mastodon.social

I've just sent the first end-to-end-encrypted messages from one instance to another.

News from around the USA really has me down, so it's important to celebrate the little wins 🎉

And, there's still so much to do. But with equal quantities of luck and caffeine, I can screencast some early prototypes for you before too long.

I believe is important for the because it will give us more ways to use this network, and expand what people can do here.

Application screenshot of the terminal from my laptop, showing debug output of an ActivityPub message being sent from one account and received by another.

It's really a bunch of gibberish, but that's the point. The messages are "end to end" encrypted using MLS, so there's nothing to actually read. And the lack of readable information is the whole point.
ALT text

Application screenshot of the terminal from my laptop, showing debug output of an ActivityPub message being sent from one account and received by another. It's really a bunch of gibberish, but that's the point. The messages are "end to end" encrypted using MLS, so there's nothing to actually read. And the lack of readable information is the whole point.

Free Open-Source Whistleblower Platform Without Self-Hosting

Anonymous, end-to-end encrypted reporting for journalists, lawyers, employers, and more. Hush Line is a free & open-source whistleblower platform that provides secure, anonymous tip lines with no self-hosting, maintenance, or technical overhead.

🤫 hushline.app
:mastodon: @hushlineapp

hushline.app

Free Open-Source Whistleblower Platform Without Self-Hosting | Hush Line

Hush Line is a free & open-source whistleblower platform that provides secure, anonymous tip lines with no self-hosting, maintenance, or technical overhead.

WhatsApp is untrustable

TL;DR: As the client applications of WhatsApp are closed-source, claims of end-to-end encryption cannot be validated. This invalidates the primary benefit of end-to-end encryption, that is, not needing to trust a third-party. […]

👉 toki.la/posts/whatsapp

toki.la

WhatsApp is untrustable

what's so secure about 'end-to-end-encryption', anyway?

Free Open-Source Whistleblower Platform Without Self-Hosting

Anonymous, end-to-end encrypted reporting for journalists, lawyers, employers, and more. Hush Line is a free & open-source whistleblower platform that provides secure, anonymous tip lines with no self-hosting, maintenance, or technical overhead.

🤫 hushline.app
:mastodon: @hushlineapp

hushline.app

Free Open-Source Whistleblower Platform Without Self-Hosting | Hush Line

Hush Line is a free & open-source whistleblower platform that provides secure, anonymous tip lines with no self-hosting, maintenance, or technical overhead.

@nextgraph@fosstodon.org

If you are at and want to learn more about the current advances we made in the SDK of @nextgraph thanks to the contributions of @laurin ., he will be presenting his work on Tuesday the 30th at 10:30 in the CDC Triangle.

events.ccc.de/congress/2025/hu

events.ccc.de

[39c3] NextGraph Demo: Local First, E2EE, RDF graph DB, and a Reactive ORM SDK

@nextgraph@fosstodon.org

If you are at and want to learn more about the current advances we made in the SDK of @nextgraph thanks to the contributions of @laurin ., he will be presenting his work on Tuesday the 30th at 10:30 in the CDC Triangle.

events.ccc.de/congress/2025/hu

events.ccc.de

[39c3] NextGraph Demo: Local First, E2EE, RDF graph DB, and a Reactive ORM SDK

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@smallcircles@social.coop · Reply to Bob Mottram ✅

@bob

I'm happy with this development.

Just not with the way in which the now evolves, i.e. on the basis of protocol decay, tech debt, and whack-a-mole development. Which have been my and frustration in the past years of facilitation and advocacy.

Where I have use cases is in Personal , to enable participation, and subsequently work collectively on

coding.social/introduction/#pe

coding.social

Social networking reimagined

We find novel ways to collaborate and create value together.

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@bonfire@indieweb.social

Big news for the ! End-to-end encryption is coming to .

@swf with support from @sovtechfund is coordinating two interoperable implementations.

Bonfire is proud to be one of these first two projects, alongside by @benpate

We think should simply be the default for any private communications, and we’re especially thrilled to bring private, trusted collaboration to the fediverse.

socialwebfoundation.org

Implementing Encrypted Messaging over ActivityPub

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls,…

@evanprodromou@socialwebfoundation.org
One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network. ActivityPub is extensible, though. As part […]

One of the project areas of the Social Web Foundation for the last year has been end-to-end encrypted messaging. ActivityPub, the standard protocol that powers the Social Web, has privacy controls, but they do not protect the content of messages from server operators. Encrypted messaging has become a standard feature on most social networks since ActivityPub was created, and its lack has inhibited Social Web adoption and public trust in the network.

ActivityPub is extensible, though. As part of our E2EE program, Mallory, Tom and I adapted the Messaging Layer Security (MLS) standard as an extension of ActivityPub to make the MLS over ActivityPub specification. The protocol fits the great MLS E2EE system onto the ActivityPub API and federation protocol.

But a protocol specification is not enough; it must be implemented. That’s why we’re so happy to announce that the Sovereign Tech Fund has commissioned work with the Social Web Foundation to coordinate two new interoperable implementations of MLS over ActivityPub. This investment by the Sovereign Tech Fund will help move the Fediverse towards more privacy for social web users, no matter what server they use.

We decided to partner with two different projects in order to make sure that we’re making an open standard that can work between implementations. With two implementers, we’ll need to communicate clearly about architectural and implementation decisions, and make sure that those decisions end up in the final version of the spec — not in a TODO comment in the source code of a single project.

The first project is Emissary, the great social web application platform behind projects like Atlas and Bandwagon. Ben Pate, Emissary founder, says, “The Emissary Project is deeply committed to the Fediverse, where we are building a free and trustworthy Internet for all 8 billion humans. Delivering on that promise, Emissary is excited to team up with the Social Web Foundation to bring End-to-End-Encryption (E2EE) to the Fediverse. We are eternally grateful for the SWF’s leadership and support, without which this project could not have happened.  Our work is already underway, and in 2026 anyone will be able to build E2EE applications on the Emissary platform.”

The second project is Bonfire. Bonfire is a modular framework for building federated apps, with its first app (Bonfire Social) offering a social networking experience enhanced with tools for privacy, trust, and collaboration (such as circles and boundaries).

The maintainers of Bonfire, Ivan Minutillo and Mayel de Borniol, said: “We think that end-to-end encryption should simply be the default for any private communication online. Working with the Social Web Foundation to bring E2EE to ActivityPub marks a crucial step in fostering privacy and trust, and especially in enabling the fediverse to become a safe space for activists and communities to organise, coordinate, and collaborate meaningfully. By making secure, user-friendly messaging a core part of the fediverse, we’re helping lay the groundwork for decentralised networks where people can go beyond talking in the mythical ‘global town square’ and actually organise and accomplish things together.”

This work will happen best if the Fediverse community tracks it closely. We’ll be making updates here on the SWF blog as progress continues. Developers and active users may also be interested in the ActivityPub E2EE Messaging Task Force at the W3C, where the specification is being developed into a report for the Social Web Community group. Finally, we’ll be using the #JustBetweenUs hashtag to share progress and ideas, so you can follow it to see what’s been happening.

socialwebfoundation.org

JustBetweenUs – Social Web Foundation

Posts about JustBetweenUs written by Evan Prodromou

@CryptPad@xwiki.com

🔐 Did CryptPad help you this year?

Millions of documents were written and shared on CryptPad this year, all encrypted on the user’s device.

If every active user gave 5 EUR in December, the project could be funded for all of 2026 without external grants.

If you want to support private, open-source collaboration, you can donate here:
👉 opencollective.com/cryptpad

Thank you to everyone who already supports us 💚.

opencollective.com

CryptPad - Open Collective

Collaborative suite, end-to-end encrypted and open-source. Made at XWiki.

@CryptPad@xwiki.com

🔐 Did CryptPad help you this year?

Millions of documents were written and shared on CryptPad this year, all encrypted on the user’s device.

If every active user gave 5 EUR in December, the project could be funded for all of 2026 without external grants.

If you want to support private, open-source collaboration, you can donate here:
👉 opencollective.com/cryptpad

Thank you to everyone who already supports us 💚.

opencollective.com

CryptPad - Open Collective

Collaborative suite, end-to-end encrypted and open-source. Made at XWiki.

@louischance@piaille.fr

I just started using @delta and it's just great!
Quick and straigthforward sign-up process, very cool features, no ads, no AI crap, allows text, image and voice messages, groups, multiple accounts. And free! (based on donations).
Everything is end to end encrypted, can be synced across devices and zero personal data is required whatsoever to create an account (no phone number, no email). Using standard yet powerful chatmail relays.

My daughter needs to communicate with a correspondent in another country, she has no phone but can use a laptop, so this is perfect. Also we can create a family group 😊

Kudos to the team behind this amazing project.

@louischance@piaille.fr

I just started using @delta and it's just great!
Quick and straigthforward sign-up process, very cool features, no ads, no AI crap, allows text, image and voice messages, groups, multiple accounts. And free! (based on donations).
Everything is end to end encrypted, can be synced across devices and zero personal data is required whatsoever to create an account (no phone number, no email). Using standard yet powerful chatmail relays.

My daughter needs to communicate with a correspondent in another country, she has no phone but can use a laptop, so this is perfect. Also we can create a family group 😊

Kudos to the team behind this amazing project.

@sozialwelten@ifwo.eu · Reply to Râu Cao ⚡

@raucao It is also not a part of the official Mastodon Roadmap even though there are some open issues in the GitHub repository concerning E2EE.

I personally hope that it will get integrated into ActivityPub and/or Mastodon but for 2026 and 2027 I do not see any signs that there is anything remotely close to being published.

​s : github.com/mastodon/mastodon/i
: joinmastodon.org/roadmap

Screenshot from the mastodon roadmap 

Roadmap

Here's a glimpse of what we're working on
Released
Quote Posts

Version 4.5: Users can now quote others posts. Users can opt out entirely from all quoting or remove themselves from a quoted post if they wish. Learn more.
Released
Fetch all replies

Version 4.5: No more missing replies to your posts! Threads now search for all replies and display them.
Next release
Collections

Version 4.6: Users and admins can create a collection of accounts they recommend. This allows both new and existing user to easily follow a range of curated users quickly. Learn more.
Next release
Institution support

Version 4.6: Allow institutions more control over the landing page and allow visitors to sign up for updates with an email account.
Next release
Better onboarding

Version 4.6: Make improvements to how new users first arrive on Mastodon so they understand what that can do easily.
Exploring
Moderation tools

Looking at ways to make moderation easier, e.g. shared block lists.
Exploring
Simplify Private Mentions

Make Private Mentions calmer, more like chat messages. Remove them from the public feed (which scares people) and have better notifications.
ALT text

Screenshot from the mastodon roadmap Roadmap Here's a glimpse of what we're working on Released Quote Posts Version 4.5: Users can now quote others posts. Users can opt out entirely from all quoting or remove themselves from a quoted post if they wish. Learn more. Released Fetch all replies Version 4.5: No more missing replies to your posts! Threads now search for all replies and display them. Next release Collections Version 4.6: Users and admins can create a collection of accounts they recommend. This allows both new and existing user to easily follow a range of curated users quickly. Learn more. Next release Institution support Version 4.6: Allow institutions more control over the landing page and allow visitors to sign up for updates with an email account. Next release Better onboarding Version 4.6: Make improvements to how new users first arrive on Mastodon so they understand what that can do easily. Exploring Moderation tools Looking at ways to make moderation easier, e.g. shared block lists. Exploring Simplify Private Mentions Make Private Mentions calmer, more like chat messages. Remove them from the public feed (which scares people) and have better notifications.

Screenshot of open E2EE issues in the github mastodon repo
ALT text

Screenshot of open E2EE issues in the github mastodon repo

@sozialwelten@ifwo.eu

End-to-end Encryption (E2EE) over ActivityPub

Encrypted direct messages supply the confidence that people need to connect with family, friends and colleagues privately over a social network. As part of the Summer of Protocols 2024, we explore the integration of end-to-end encryption (E2EE) into the ActivityPub protocol.

socialwebfoundation.org/progra

Screenshot der verlinkten Website 


End-to-end Encryption (E2EE) over ActivityPub

Encrypted direct messages supply the confidence that people need to connect with family, friends and colleagues privately over a social network. As part of the Summer of Protocols 2024, we explore the integration of end-to-end encryption (E2EE) into the ActivityPub protocol. We conduct a review of encryption protocols and integration architectures, and selected Messaging Layer Security (MLS). We also considered the user experience, ensuring that key management, message archiving, and the handling of mixed encrypted and unencrypted messages would be intuitive and user-friendly.
Deliverables

    Proposed integration of Messaging Layer Security (MLS) into ActivityPub
    User interface specification for a reference implementation
    Software architecture for a reference implementation
ALT text

Screenshot der verlinkten Website End-to-end Encryption (E2EE) over ActivityPub Encrypted direct messages supply the confidence that people need to connect with family, friends and colleagues privately over a social network. As part of the Summer of Protocols 2024, we explore the integration of end-to-end encryption (E2EE) into the ActivityPub protocol. We conduct a review of encryption protocols and integration architectures, and selected Messaging Layer Security (MLS). We also considered the user experience, ensuring that key management, message archiving, and the handling of mixed encrypted and unencrypted messages would be intuitive and user-friendly. Deliverables Proposed integration of Messaging Layer Security (MLS) into ActivityPub User interface specification for a reference implementation Software architecture for a reference implementation

@hen@berlin.social

What is going on in with their craze for restricting user freedoms?

Now they are intimidating developers, because they make good software with actual security from start to finish??

If you get a new phone, get a with GrapheneOS. Donate to them, they can use the support.

Show these totalitarian States that and are important for everyone, not only people breaking legitimate laws.

@jamesmarshall@sfba.social

Are there any fediverse apps where the bulk of the processing, the rendering, and the authoritative datastore are all on the client? In other words, where the server does almost nothing but forward messages to clients and other servers, and minimizes storage on the server?

This structure seems necessary for a privacy-centric app, in order to minimize how much a user needs to trust their own server and possibly other servers. E2ee will help a lot, but it would be even better if servers didn't store who all our follows and followers are, for example.

Just brainstorming on how to get to a fediverse app with good privacy. I wrote a non-AP app like this with a simple UI, but I'd much rather take an existing fediverse app with a well-developed UX and modify it as needed. So that's what I'm looking for.

Thanks for any ideas!

@jamesmarshall@sfba.social

Are there any fediverse apps where the bulk of the processing, the rendering, and the authoritative datastore are all on the client? In other words, where the server does almost nothing but forward messages to clients and other servers, and minimizes storage on the server?

This structure seems necessary for a privacy-centric app, in order to minimize how much a user needs to trust their own server and possibly other servers. E2ee will help a lot, but it would be even better if servers didn't store who all our follows and followers are, for example.

Just brainstorming on how to get to a fediverse app with good privacy. I wrote a non-AP app like this with a simple UI, but I'd much rather take an existing fediverse app with a well-developed UX and modify it as needed. So that's what I'm looking for.

Thanks for any ideas!

@je5perl@eupolicy.social · Reply to Jesper Lund

While constantly accusing the opponents of of spreading false narratives (always without evidence), Peter Hummelgaard has no problems with giving highly misleading answers to journalists.

When asked about security problems with client-side scanning, he first declines to go into specifics on the technical details, and then highlights the voluntary scanning schemes (from 5:00 newsroom.consilium.europa.eu/e)

Highly misleading because there is no voluntary scanning with CSS (for ).

newsroom.consilium.europa.eu

Council of EU - Newsroom

The multimedia platform of the Council of the European Union offering free of charge broadcast-quality videos (MPEG4) and photos (JPEG) of all important events and activities

@Em0nM4stodon@infosec.exchange
@Em0nM4stodon@infosec.exchange
@phoenix_r_d@mastodon.social

We are excited to share our latest work on making secure messaging more decentralized!

We've developed DMLS – a new approach that brings fork resilience to the MLS protocol, solving a key challenge in distributed systems while maintaining Forward Secrecy.

This work was made possible by eQualitie, who funded it as part of the SplinterCon Breakout program.

blog.phnx.im/making-mls-more-d

blog.phnx.im

Making MLS more decentralized

It’s no secret that we at Phoenix R&D are big fans of the Messaging Layer Security (MLS) protocol, having helped it to come into existence. It’s a versatile group key agreement and messaging protocol that’s used to power both asynchronous and real-time applications. MLS is relatively

@phoenix_r_d@mastodon.social

We are excited to share our latest work on making secure messaging more decentralized!

We've developed DMLS – a new approach that brings fork resilience to the MLS protocol, solving a key challenge in distributed systems while maintaining Forward Secrecy.

This work was made possible by eQualitie, who funded it as part of the SplinterCon Breakout program.

blog.phnx.im/making-mls-more-d

blog.phnx.im

Making MLS more decentralized

It’s no secret that we at Phoenix R&D are big fans of the Messaging Layer Security (MLS) protocol, having helped it to come into existence. It’s a versatile group key agreement and messaging protocol that’s used to power both asynchronous and real-time applications. MLS is relatively

@phoenix_r_d@mastodon.social

We are excited to share our latest work on making secure messaging more decentralized!

We've developed DMLS – a new approach that brings fork resilience to the MLS protocol, solving a key challenge in distributed systems while maintaining Forward Secrecy.

This work was made possible by eQualitie, who funded it as part of the SplinterCon Breakout program.

blog.phnx.im/making-mls-more-d

blog.phnx.im

Making MLS more decentralized

It’s no secret that we at Phoenix R&D are big fans of the Messaging Layer Security (MLS) protocol, having helped it to come into existence. It’s a versatile group key agreement and messaging protocol that’s used to power both asynchronous and real-time applications. MLS is relatively

@phoenix_r_d@mastodon.social

We are excited to share our latest work on making secure messaging more decentralized!

We've developed DMLS – a new approach that brings fork resilience to the MLS protocol, solving a key challenge in distributed systems while maintaining Forward Secrecy.

This work was made possible by eQualitie, who funded it as part of the SplinterCon Breakout program.

blog.phnx.im/making-mls-more-d

blog.phnx.im

Making MLS more decentralized

It’s no secret that we at Phoenix R&D are big fans of the Messaging Layer Security (MLS) protocol, having helped it to come into existence. It’s a versatile group key agreement and messaging protocol that’s used to power both asynchronous and real-time applications. MLS is relatively

@Em0nM4stodon@infosec.exchange

Today October 21st is
Global Encryption Day! 🔒🎉

This is a good time to remember that encryption is essential to online security and digital privacy.

Despite some governments pushing hard to weaken it, we must remind them that we all need encryption, and especially end-to-end encryption, to stay safe online 💚

Privacy is a human right
and end-to-end encryption is one of the best tool we have to enforce that right.

privacyguides.org/articles/202

privacyguides.org

Encryption Is Not a Crime

Encryption is not a crime, encryption protects us all. Encryption, and especially end-to-end encryption, is an essential tool to protect everyone online. Attempts to undermine encryption are an attack to our fundamental right to privacy and an attack to our inherent right to security and safety.

@Em0nM4stodon@infosec.exchange

Today October 21st is
Global Encryption Day! 🔒🎉

This is a good time to remember that encryption is essential to online security and digital privacy.

Despite some governments pushing hard to weaken it, we must remind them that we all need encryption, and especially end-to-end encryption, to stay safe online 💚

Privacy is a human right
and end-to-end encryption is one of the best tool we have to enforce that right.

privacyguides.org/articles/202

privacyguides.org

Encryption Is Not a Crime

Encryption is not a crime, encryption protects us all. Encryption, and especially end-to-end encryption, is an essential tool to protect everyone online. Attempts to undermine encryption are an attack to our fundamental right to privacy and an attack to our inherent right to security and safety.

@blueghost@mastodon.online · Reply to Signal
@je5perl@eupolicy.social · Reply to Jesper Lund

While constantly accusing the opponents of of spreading false narratives (always without evidence), Peter Hummelgaard has no problems with giving highly misleading answers to journalists.

When asked about security problems with client-side scanning, he first declines to go into specifics on the technical details, and then highlights the voluntary scanning schemes (from 5:00 newsroom.consilium.europa.eu/e)

Highly misleading because there is no voluntary scanning with CSS (for ).

newsroom.consilium.europa.eu

Council of EU - Newsroom

The multimedia platform of the Council of the European Union offering free of charge broadcast-quality videos (MPEG4) and photos (JPEG) of all important events and activities

@Em0nM4stodon@infosec.exchange

Safety Reminder:

Although the Fediverse is much better than Big Tech for your privacy, no communication here is end-to-end encrypted, and all your Mastodon public and quiet-public posts can be seen by anyone on the internet.

For sensitive communications, you should only use trustworthy applications using end-to-end encryption.

Stay safe 💚

@Em0nM4stodon@infosec.exchange

Safety Reminder:

Although the Fediverse is much better than Big Tech for your privacy, no communication here is end-to-end encrypted, and all your Mastodon public and quiet-public posts can be seen by anyone on the internet.

For sensitive communications, you should only use trustworthy applications using end-to-end encryption.

Stay safe 💚

@Em0nM4stodon@infosec.exchange

Safety Reminder:

Although the Fediverse is much better than Big Tech for your privacy, no communication here is end-to-end encrypted, and all your Mastodon public and quiet-public posts can be seen by anyone on the internet.

For sensitive communications, you should only use trustworthy applications using end-to-end encryption.

Stay safe 💚

@xoron@infosec.exchange

Want to send messages and video calls with:

* no installs
* no sign-ups
* no tracking
* end-to-end encryption

This new prototype uses PeerJS to establish a secure browser-to-browser connection. Everything is ephemeral and cleared when you refresh the page—true zerodata privacy!

Check out the [testable demo here](p2p.positive-intentions.com/if).

I am working towards a look-and-feel to match Whatsapp as seen in this [hardcoded UI demo](glitr.positive-intentions.com).

IMPORTANT NOTE: This is still a work-in-progress and a close-source project. It is based on the open source MVP see [here](github.com/positive-intentions). It has NOT been audited or reviewed. For testing purposes only, not a replacement for your current messaging app.

* Docs: positive-intentions.com/docs/c
* Reddit: reddit.com/r/positive_intentio
* GitHub: github.com/positive-intentions

github.com

positive-intentions

positive-intentions has 9 repositories available. Follow their code on GitHub.

@xoron@infosec.exchange

Want to send messages and video calls with:

* no installs
* no sign-ups
* no tracking
* end-to-end encryption

This new prototype uses PeerJS to establish a secure browser-to-browser connection. Everything is ephemeral and cleared when you refresh the page—true zerodata privacy!

Check out the [testable demo here](p2p.positive-intentions.com/if).

I am working towards a look-and-feel to match Whatsapp as seen in this [hardcoded UI demo](glitr.positive-intentions.com).

IMPORTANT NOTE: This is still a work-in-progress and a close-source project. It is based on the open source MVP see [here](github.com/positive-intentions). It has NOT been audited or reviewed. For testing purposes only, not a replacement for your current messaging app.

* Docs: positive-intentions.com/docs/c
* Reddit: reddit.com/r/positive_intentio
* GitHub: github.com/positive-intentions

github.com

positive-intentions

positive-intentions has 9 repositories available. Follow their code on GitHub.

@alghaff@mastodon.online
@alghaff@mastodon.online
@khaleesicodes@eupolicy.social

Es ist schockierend, dass das @BMDS das sich so klar zu Staatsmodernisierung und Souverenität bekennt. Sich nicht äußern will wenn es um den Schutz von geht. Einem Ministerium, dass sich diese Ziele auf die Fahnen geschrieben hat muss klar sein, dass Verschlüsselung und vertrauliche Kommunikation untrennbar von IT-Sicherheit und Souveränität sind.
Hier zu empfehle ich die Lektüre von:
arxiv.org/abs/2110.07450
Quelle zur Position des BMDS:
netzpolitik.org/2025/chatkontr

netzpolitik.org

Chatkontrolle: Der Digitalminister duckt sich weg

Wenn in Kürze die Entscheidung fällt, ob Europa eine verpflichtende Chatkontrolle bekommt, ist auch die Haltung der Bundesregierung maßgeblich. Doch der Digitalminister mag sich lieber nicht positionieren. Digitale Weichenstellungen und gefährliche Formen technisierter Massenüberwachung sieht er offenbar nicht als sein Metier. Eine Einordnung.

@khaleesicodes@eupolicy.social

Es ist schockierend, dass das @BMDS das sich so klar zu Staatsmodernisierung und Souverenität bekennt. Sich nicht äußern will wenn es um den Schutz von geht. Einem Ministerium, dass sich diese Ziele auf die Fahnen geschrieben hat muss klar sein, dass Verschlüsselung und vertrauliche Kommunikation untrennbar von IT-Sicherheit und Souveränität sind.
Hier zu empfehle ich die Lektüre von:
arxiv.org/abs/2110.07450
Quelle zur Position des BMDS:
netzpolitik.org/2025/chatkontr

netzpolitik.org

Chatkontrolle: Der Digitalminister duckt sich weg

Wenn in Kürze die Entscheidung fällt, ob Europa eine verpflichtende Chatkontrolle bekommt, ist auch die Haltung der Bundesregierung maßgeblich. Doch der Digitalminister mag sich lieber nicht positionieren. Digitale Weichenstellungen und gefährliche Formen technisierter Massenüberwachung sieht er offenbar nicht als sein Metier. Eine Einordnung.

@Em0nM4stodon@infosec.exchange

In case you are falsely feeling protected outside of Europe:

Chat Control doesn't just concern Europeans. It concerns all of us.

These kind of regulations will come for all of us, everywhere, if we do not ALL push against it everywhere.

If you do not understand how this is all intertwined, I invite you to read more privacy news and in-depth analysis. Because we must all support each other's privacy fights.

Privacy is a human right 💚

Fight for a better world, together ✊🌍

🎉

@privacyguides@mastodon.neat.computer

🕑 EU Citizens have 4 days: the clock is ticking!

European countries are finalizing their positions on Chat Control this Friday. If your country supports Chat Control, it is vital you contact your representatives and voice your opposition to the EU's latest surveillance and censorship tactic. 🇪🇺

The latest from staff writer Em: privacyguides.org/articles/202

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".
ALT text

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".

@khaleesicodes@eupolicy.social
@privacyguides@mastodon.neat.computer

🕑 EU Citizens have 4 days: the clock is ticking!

European countries are finalizing their positions on Chat Control this Friday. If your country supports Chat Control, it is vital you contact your representatives and voice your opposition to the EU's latest surveillance and censorship tactic. 🇪🇺

The latest from staff writer Em: privacyguides.org/articles/202

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".
ALT text

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".

@privacyguides@mastodon.neat.computer

🕑 EU Citizens have 4 days: the clock is ticking!

European countries are finalizing their positions on Chat Control this Friday. If your country supports Chat Control, it is vital you contact your representatives and voice your opposition to the EU's latest surveillance and censorship tactic. 🇪🇺

The latest from staff writer Em: privacyguides.org/articles/202

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".
ALT text

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".

@privacyguides@mastodon.neat.computer

🕑 EU Citizens have 4 days: the clock is ticking!

European countries are finalizing their positions on Chat Control this Friday. If your country supports Chat Control, it is vital you contact your representatives and voice your opposition to the EU's latest surveillance and censorship tactic. 🇪🇺

The latest from staff writer Em: privacyguides.org/articles/202

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".
ALT text

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".

@privacyguides@mastodon.neat.computer

🕑 EU Citizens have 4 days: the clock is ticking!

European countries are finalizing their positions on Chat Control this Friday. If your country supports Chat Control, it is vital you contact your representatives and voice your opposition to the EU's latest surveillance and censorship tactic. 🇪🇺

The latest from staff writer Em: privacyguides.org/articles/202

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".
ALT text

A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying "Act now! www.chatcontrol.eu".

@Em0nM4stodon@infosec.exchange

More than 90% of all my communications are going through @signalapp . I don't know what I would do without it.

I'm so scared anything could happen to it. That's why I give them money every month, and you should too if you can :signal: 💙👇

Support Signal: signal.org/donate/

signal.org

Donate to Signal Private Messenger

Your donation helps pay for the development, servers, and bandwidth of an app used by millions around the world for private and instantaneous communication. Please make a donation today.

@Em0nM4stodon@infosec.exchange

More than 90% of all my communications are going through @signalapp . I don't know what I would do without it.

I'm so scared anything could happen to it. That's why I give them money every month, and you should too if you can :signal: 💙👇

Support Signal: signal.org/donate/

signal.org

Donate to Signal Private Messenger

Your donation helps pay for the development, servers, and bandwidth of an app used by millions around the world for private and instantaneous communication. Please make a donation today.

@jospoortvliet@fosstodon.org

I find it deeply troubling that the @EUCommission is using to communicate. End-to-end encryption and disappearing messages have no place in public administration. Society has a right to from the people who work for them. We pay their salaries and we deserve to know what they do with the power we give them.

The worst part: While they hide THEIR communications they want to enforce to break OUR

ftm.eu/articles/von-der-leyen-

ftm.eu

Von der Leyen sets messages on auto-delete

The European Commission has previously said it didn’t automatically delete messages.

@jospoortvliet@fosstodon.org

I find it deeply troubling that the @EUCommission is using to communicate. End-to-end encryption and disappearing messages have no place in public administration. Society has a right to from the people who work for them. We pay their salaries and we deserve to know what they do with the power we give them.

The worst part: While they hide THEIR communications they want to enforce to break OUR

ftm.eu/articles/von-der-leyen-

ftm.eu

Von der Leyen sets messages on auto-delete

The European Commission has previously said it didn’t automatically delete messages.

@afterdawn@mementomori.social
@watchfulcitizen@goingdark.social

"Parents who find Signal on their child's phone should contact the police." - Petra Lundh, Sweden's National Police Commissioner

I don’t know what’s worse: if they actually believe this, or if they’re deliberately trying to fool the masses. Both are terrifying.

Framing a basic right to private communication as a danger isn’t just careless, it’s harmful.

What’s next? Criminals drive cars, call us if you see one.

tv4.se/artikel/3SFX15URbIpuIgT

tv4.se

Signal-appen: Rikspolischefens uttalande väcker kritik 2025

Rikspolischefen Petra Lundh kritiseras för uttalande om Signal-appen. Experter försvarar säker kommunikation 2025.

@watchfulcitizen@goingdark.social

"Parents who find Signal on their child's phone should contact the police." - Petra Lundh, Sweden's National Police Commissioner

I don’t know what’s worse: if they actually believe this, or if they’re deliberately trying to fool the masses. Both are terrifying.

Framing a basic right to private communication as a danger isn’t just careless, it’s harmful.

What’s next? Criminals drive cars, call us if you see one.

tv4.se/artikel/3SFX15URbIpuIgT

tv4.se

Signal-appen: Rikspolischefens uttalande väcker kritik 2025

Rikspolischefen Petra Lundh kritiseras för uttalande om Signal-appen. Experter försvarar säker kommunikation 2025.

@openrightsgroup@social.openrightsgroup.org

The UK has pulled its order to put a backdoor into Apple's encrypted services.

BUT "powers to attack encryption are still on the law books, and pose a serious risk to user security and protection against criminal abuse of our data."

🗣️ @jim, ORG Exec Director.

bbc.co.uk/news/articles/cdj2m3

bbc.com

UK backs down in Apple privacy row, US says

UK authorities have demanded access to Apple users' protected files when required for investigations.

@Em0nM4stodon@infosec.exchange

In case you are falsely feeling protected outside of Europe:

Chat Control doesn't just concern Europeans. It concerns all of us.

These kind of regulations will come for all of us, everywhere, if we do not ALL push against it everywhere.

If you do not understand how this is all intertwined, I invite you to read more privacy news and in-depth analysis. Because we must all support each other's privacy fights.

Privacy is a human right 💚

Fight for a better world, together ✊🌍

🎉

@openrightsgroup@social.openrightsgroup.org
@openrightsgroup@social.openrightsgroup.org
@adbenitez@mastodon.social · Reply to pancake :verified:

@pancake every post, comment and like in the social network is thanks to , the container super-app, but if you want forward-secrecy-secure ephemeral communications inside a Delta Chat chat, there is the "Live Chat" mini-app in the store (IRC style plus /me and "foo is typing..." support!!)

@delta

@kkarhan@infosec.space · Reply to Kevin Karhan :verified:

I mean, these ain't like in the old days where a few Megabytes got you and other Multi-Protocol Clients of the old days where everyone had to implement bespoke, custom and incompatible and *often completely undocumented, proprietary * protocols like , , , etc.

  • Nowadays all these do have some kind of or Web Interface one can just login (because *none of them do proper with of all the keys!) so this should be way easier these days: All they do is do HTTP(S) GET/POST so the most critical part is to attain credentials like a and to basically run a console on i.e. to reverse-engineer the ...

en.wikipedia.org

Comparison of cross-platform instant messaging clients - Wikipedia

@Em0nM4stodon@infosec.exchange

Magical backdoor only for "the good guys" is a complete fantasy 🔑✨

Let's say the strategy is akin to creating a MagicalKey that unlocks every door (a magical key because thinking encryption backdoors would only be used by "the good guys" is a great example of magical thinking).

Imagine only 1000 police officers have MagicalKeys.

Overtime, let's say only 1% of the police officers accidentally lose their MagicalKey. Now 10 MagicalKeys are lost in the wild and could be used by anyone else, for any purposes, including crime.

Then, let's say only 0.1% of police officers get corrupted by a crime gang. That's just one right? This corrupted "good guy" lets the gang create a double of the MagicalKey. Which crime gang wouldn't want a key that can magically open any door?

Now, the gang creates doubles of the MagicalKey they have. They use it subtly at first to avoid detection. They make sure they never leave traces behind, so victims have no idea their door got unlocked.

During this time, they steal your data, they sell it, they use it to impersonate you, they use it to harm you and your loved ones.

Then, another criminal figures out on their own how to emulate a MagicalKey without even having access to one.

The criminal creates a reproducible mold for this Emulated-MagicalKey and sells it to other criminals on the criminal market. Now, the MagicalKey™️ is available to any criminals looking for it.

Restrictions on the backdoor are off. Your personal data is up for grabs.

This is what is going to happen if backdoors are implemented in end-to-end encryption. But don't worry they say, "it's only for the good guys!".

At least, the criminals' data will also be up for grabs, right?

Nope! The criminals knew about this, so they just started using different channels that weren't impacted.

Criminals will have their privacy intact, they don't care about using illegal tools, but your legal privacy protections will be gone.

Backdoored end-to-end encryption isn't end-to-end anymore, it's just open-ended encryption. This offers pretty much no protection at all.

Extract from: privacyguides.org/articles/202

privacyguides.org

Encryption Is Not a Crime

Encryption is not a crime, encryption protects all of us. Encryption, and especially end-to-end encryption, is an essential tool to protect everyone online. Attempts to undermine encryption are an attack to our fundamental right to privacy and an attack to our inherent right to security and safety.

@Em0nM4stodon@infosec.exchange

Magical backdoor only for "the good guys" is a complete fantasy 🔑✨

Let's say the strategy is akin to creating a MagicalKey that unlocks every door (a magical key because thinking encryption backdoors would only be used by "the good guys" is a great example of magical thinking).

Imagine only 1000 police officers have MagicalKeys.

Overtime, let's say only 1% of the police officers accidentally lose their MagicalKey. Now 10 MagicalKeys are lost in the wild and could be used by anyone else, for any purposes, including crime.

Then, let's say only 0.1% of police officers get corrupted by a crime gang. That's just one right? This corrupted "good guy" lets the gang create a double of the MagicalKey. Which crime gang wouldn't want a key that can magically open any door?

Now, the gang creates doubles of the MagicalKey they have. They use it subtly at first to avoid detection. They make sure they never leave traces behind, so victims have no idea their door got unlocked.

During this time, they steal your data, they sell it, they use it to impersonate you, they use it to harm you and your loved ones.

Then, another criminal figures out on their own how to emulate a MagicalKey without even having access to one.

The criminal creates a reproducible mold for this Emulated-MagicalKey and sells it to other criminals on the criminal market. Now, the MagicalKey™️ is available to any criminals looking for it.

Restrictions on the backdoor are off. Your personal data is up for grabs.

This is what is going to happen if backdoors are implemented in end-to-end encryption. But don't worry they say, "it's only for the good guys!".

At least, the criminals' data will also be up for grabs, right?

Nope! The criminals knew about this, so they just started using different channels that weren't impacted.

Criminals will have their privacy intact, they don't care about using illegal tools, but your legal privacy protections will be gone.

Backdoored end-to-end encryption isn't end-to-end anymore, it's just open-ended encryption. This offers pretty much no protection at all.

Extract from: privacyguides.org/articles/202

privacyguides.org

Encryption Is Not a Crime

Encryption is not a crime, encryption protects all of us. Encryption, and especially end-to-end encryption, is an essential tool to protect everyone online. Attempts to undermine encryption are an attack to our fundamental right to privacy and an attack to our inherent right to security and safety.

@Em0nM4stodon@infosec.exchange

Magical backdoor only for "the good guys" is a complete fantasy 🔑✨

Let's say the strategy is akin to creating a MagicalKey that unlocks every door (a magical key because thinking encryption backdoors would only be used by "the good guys" is a great example of magical thinking).

Imagine only 1000 police officers have MagicalKeys.

Overtime, let's say only 1% of the police officers accidentally lose their MagicalKey. Now 10 MagicalKeys are lost in the wild and could be used by anyone else, for any purposes, including crime.

Then, let's say only 0.1% of police officers get corrupted by a crime gang. That's just one right? This corrupted "good guy" lets the gang create a double of the MagicalKey. Which crime gang wouldn't want a key that can magically open any door?

Now, the gang creates doubles of the MagicalKey they have. They use it subtly at first to avoid detection. They make sure they never leave traces behind, so victims have no idea their door got unlocked.

During this time, they steal your data, they sell it, they use it to impersonate you, they use it to harm you and your loved ones.

Then, another criminal figures out on their own how to emulate a MagicalKey without even having access to one.

The criminal creates a reproducible mold for this Emulated-MagicalKey and sells it to other criminals on the criminal market. Now, the MagicalKey™️ is available to any criminals looking for it.

Restrictions on the backdoor are off. Your personal data is up for grabs.

This is what is going to happen if backdoors are implemented in end-to-end encryption. But don't worry they say, "it's only for the good guys!".

At least, the criminals' data will also be up for grabs, right?

Nope! The criminals knew about this, so they just started using different channels that weren't impacted.

Criminals will have their privacy intact, they don't care about using illegal tools, but your legal privacy protections will be gone.

Backdoored end-to-end encryption isn't end-to-end anymore, it's just open-ended encryption. This offers pretty much no protection at all.

Extract from: privacyguides.org/articles/202

privacyguides.org

Encryption Is Not a Crime

Encryption is not a crime, encryption protects all of us. Encryption, and especially end-to-end encryption, is an essential tool to protect everyone online. Attempts to undermine encryption are an attack to our fundamental right to privacy and an attack to our inherent right to security and safety.

@1br0wn@eupolicy.social

All experts around the world — please consider applying to save the EU from its own fuckwitted police ideas about “safe” backdoors
From: @aristot73
infosec.exchange/@aristot73/11

infosec.exchange

Aristotelis Tzafalias (@aristot73@infosec.exchange)

European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025. #dataretention #lawfulinterception #digitalforensics #encryption "The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes" https://ec.europa.eu/transparency/expert-groups-register/screen/expert-groups/consult?lang=en&groupID=4005

@1br0wn@eupolicy.social

All experts around the world — please consider applying to save the EU from its own fuckwitted police ideas about “safe” backdoors
From: @aristot73
infosec.exchange/@aristot73/11

infosec.exchange

Aristotelis Tzafalias (@aristot73@infosec.exchange)

European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025. #dataretention #lawfulinterception #digitalforensics #encryption "The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes" https://ec.europa.eu/transparency/expert-groups-register/screen/expert-groups/consult?lang=en&groupID=4005

@khaleesicodes@eupolicy.social

Hier nochmal der ganze Überblick zum aktuellen Kampf um und
📅 Dezember 2024
Die High-Level Working Group „Going Dark“ stellt erste Pläne zur Umgehung von Verschlüsselung vor. Einordnung von der Zivilgesellschaft:
👉 ccc.de/de/updates/2024/gegen-u

📅 April 2025
Die EU-Kommission legt mit dem -Fahrplan ein umfassendes Überwachungskonzept vor:
👉 edri.org/our-work/protecteu-se

1/x

edri.org

‘ProtectEU’ security strategy - European Digital Rights (EDRi)

The European Commission presented an internal security strategy that would undermine digital rights and even increase security threats.

@echo_pbreyer@digitalcourage.social
@echo_pbreyer@digitalcourage.social
@starlight@mk.absturztau.be
@starlight@mk.absturztau.be
@Em0nM4stodon@infosec.exchange
@delta@chaos.social

Russian authorities continue to demand the impossible, namely that we give them user data we don't have. Today the Moscow City Court rejected our objections and sided with the communication surveillance authority Roskomnadzor and the Federal Security Buereau (FSB). Not too surprising. Many more details and next step considerations you can find in this press release

merlinux.eu/press/2025-05-14-r

@delta@chaos.social

Russian authorities continue to demand the impossible, namely that we give them user data we don't have. Today the Moscow City Court rejected our objections and sided with the communication surveillance authority Roskomnadzor and the Federal Security Buereau (FSB). Not too surprising. Many more details and next step considerations you can find in this press release

merlinux.eu/press/2025-05-14-r

@nextgraph@fosstodon.org

We are excited to be part of the biggest annual event of the Local First community, namely, the Local First Conference in Berlin, from Monday 26 to Wednesday 28 of May !

The first day is called the Community Day, with workshops and unconference activities, plus an after-party.

We will be presenting NextGraph and the feature called "Social Queries" during that day at 16:30. It is free entrance.

Hope to see you there!

more info here

nextgraph.org/local-first-conf

nextgraph.org

Local First Conference in Berlin

We're going to the Local First Conference in Berlin on the 26, 27 and 28 of May for a live coding session.

@openrightsgroup@social.openrightsgroup.org

BREAKING: The UK government's attempt to hold the Apple encryption case entirely in secret has been REJECTED.

ORG, Big Brother Watch and Index on Censorship made a submission to the court arguing for open justice.

In a win for privacy rights, the court agrees.

It said it didn't accept “that the revelation of the bare details of the case would be damaging to the public interest or prejudicial to national security”.

openrightsgroup.org/press-rele

openrightsgroup.org

IPT supports ORG’s call for open hearing in Apple encryption case

The court responsible for hearing Apple’s challenge against the UK Government demanding that it breaks encryption has rejected the Home Office’s bid to have the case heard in secret.

@openrightsgroup@social.openrightsgroup.org

BREAKING: The UK government's attempt to hold the Apple encryption case entirely in secret has been REJECTED.

ORG, Big Brother Watch and Index on Censorship made a submission to the court arguing for open justice.

In a win for privacy rights, the court agrees.

It said it didn't accept “that the revelation of the bare details of the case would be damaging to the public interest or prejudicial to national security”.

openrightsgroup.org/press-rele

openrightsgroup.org

IPT supports ORG’s call for open hearing in Apple encryption case

The court responsible for hearing Apple’s challenge against the UK Government demanding that it breaks encryption has rejected the Home Office’s bid to have the case heard in secret.

@publicvoit@graz.social

If you're using and you've learned about their latest claim to introduce real end-to-end : it's a lie.

Google has the control and/or you can't do anything against that Google takes control any time.

Real works differently: only the sender and receiver are able to access the protected content.

arstechnica.com/security/2025/

michal.sapka.pl/2025/gmail-e2e

also defined E2EE such that the message is encrypted from the sender to them, processed in clear text and re-encrypted for the transmission to the receiver.

Don't let them fool you with false claims and wrong definitions.

michal.sapka.pl

Gmail E2E is as terrible as expected

Google announced that end-to-end encryption would be coming to Gmail. What a sweet day! Finally Google does something good. Is it a new protocol to

@publicvoit@graz.social

If you're using and you've learned about their latest claim to introduce real end-to-end : it's a lie.

Google has the control and/or you can't do anything against that Google takes control any time.

Real works differently: only the sender and receiver are able to access the protected content.

arstechnica.com/security/2025/

michal.sapka.pl/2025/gmail-e2e

also defined E2EE such that the message is encrypted from the sender to them, processed in clear text and re-encrypted for the transmission to the receiver.

Don't let them fool you with false claims and wrong definitions.

michal.sapka.pl

Gmail E2E is as terrible as expected

Google announced that end-to-end encryption would be coming to Gmail. What a sweet day! Finally Google does something good. Is it a new protocol to

@aqunt@piipitin.fi
@aqunt@piipitin.fi
@switchingsoftware@fedifreu.de

We would like to endorse what @kuketzblog writes about the inclusion of an “AI assistant” into an instant messenger that is still widely used:

It is unfortunate that many journalists do not realise how dangerous the new AI in WhatsApp really is. Der Spiegel, for example, writes in a recent article: “Meta AI does not have access to users' private chats, however, thanks to end-to-end encryption.” As a matter of fact, the AI does have access as it is used in the context of private chats or group chats. Sadly, this misinformation lulls users into a false sense of security. 🤦

Source (in German): social.tchncs.de/@kuketzblog/1

social.tchncs.de

Mike Kuketz 🛡 (@kuketzblog@social.tchncs.de)

Es ist bedauerlich, dass viele Journalisten nicht erkennen, wie gefährlich die neue KI in WhatsApp wirklich ist. Der Spiegel schreibt bspw. in einem aktuellen Beitrag: »Zugriff auf Privatchats von Usern hat Meta AI jedoch nicht, dank der Ende-zu-Ende-Verschlüsselung.« Dabei hat die KI durchaus Zugriff, wenn sie im Kontext privater Chats oder Gruppenchats verwendet wird. So verbreiten sich leider Falschinformationen, die Nutzer in falscher Sicherheit wiegen. 🤦

@switchingsoftware@fedifreu.de

We would like to endorse what @kuketzblog writes about the inclusion of an “AI assistant” into an instant messenger that is still widely used:

It is unfortunate that many journalists do not realise how dangerous the new AI in WhatsApp really is. Der Spiegel, for example, writes in a recent article: “Meta AI does not have access to users' private chats, however, thanks to end-to-end encryption.” As a matter of fact, the AI does have access as it is used in the context of private chats or group chats. Sadly, this misinformation lulls users into a false sense of security. 🤦

Source (in German): social.tchncs.de/@kuketzblog/1

social.tchncs.de

Mike Kuketz 🛡 (@kuketzblog@social.tchncs.de)

Es ist bedauerlich, dass viele Journalisten nicht erkennen, wie gefährlich die neue KI in WhatsApp wirklich ist. Der Spiegel schreibt bspw. in einem aktuellen Beitrag: »Zugriff auf Privatchats von Usern hat Meta AI jedoch nicht, dank der Ende-zu-Ende-Verschlüsselung.« Dabei hat die KI durchaus Zugriff, wenn sie im Kontext privater Chats oder Gruppenchats verwendet wird. So verbreiten sich leider Falschinformationen, die Nutzer in falscher Sicherheit wiegen. 🤦

@thenewoil@mastodon.thenewoil.org
@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group
@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group
@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

“The UK cannot claim to be strengthening the country’s cyber defences while at the same time issuing notices to companies like Apple and demanding that they reduce the security of the services they offer."

🗣️ @JamesBaker – ORG Programme Manager.

computerweekly.com/news/366619

@kkarhan@infosec.space
Rant re: Signal Shills being dangerous Tech Illiterates

Seriously, fans are just who are unwilling to even consider the possibility that @signalapp as a isn't sustainable or that @Mer__edith and her predecessor, - - shilling ain't their best friends and would happily risk jail for them.

I and when the evidence is there, I do expect public apologies from every single one of you shills that live on a "!" mentality believing every advertising lie!

If Signal was actually secure, it would be used by every single "Darknet Drug Lord"!

Because requires , & !

youtube.com

[English] Pfandleiher on... The offline-pgp-method and why Encrochat, SKY ECC and ANON are failing.

HOLY bringt mich sicher durch den 9h Stream! ++Werbung++ 🎮Schaut gerne mal bei HOLYENERGY rein und erhaltet folgende RABATTE:* https://holyenergy.de/?ref=p...

@kuketzblog@social.tchncs.de

WhatsApp war schon immer ein Datenschutz-Desaster. Mit der Einführung der Ende-zu-Ende-Verschlüsselung waren zumindest die Inhalte geschützt – doch das dürfte mit dem neuen KI-Assistenten Geschichte sein. Eine KI, die ständig mithört, konterkariert jede E2EE und macht sie wertlos.

netzpolitik.org/2025/angriff-a

netzpolitik.org

Angriff auf Privatsphäre: Meta-Messenger führen KI-Assistenten in Europa ein

Künftig können Nutzer*innen von WhatsApp und Co. mit einer KI chatten und auch sprechen. Dabei werden ihre Daten mit Meta geteilt. Und ein Test-Feature lässt die KI sogar durchgängig mithören.

@kuketzblog@social.tchncs.de

WhatsApp war schon immer ein Datenschutz-Desaster. Mit der Einführung der Ende-zu-Ende-Verschlüsselung waren zumindest die Inhalte geschützt – doch das dürfte mit dem neuen KI-Assistenten Geschichte sein. Eine KI, die ständig mithört, konterkariert jede E2EE und macht sie wertlos.

netzpolitik.org/2025/angriff-a

netzpolitik.org

Angriff auf Privatsphäre: Meta-Messenger führen KI-Assistenten in Europa ein

Künftig können Nutzer*innen von WhatsApp und Co. mit einer KI chatten und auch sprechen. Dabei werden ihre Daten mit Meta geteilt. Und ein Test-Feature lässt die KI sogar durchgängig mithören.

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group
@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group
@openrightsgroup@social.openrightsgroup.org

"This is a significant test for the battle between law enforcement and technology.”

Holding the Apple case in secret makes the legal process more cloak and dagger, less scales and sword.

It makes it harder to challenge the UK government's order to break encryption and creates a dangerous precedent.

This case sets the stage for more shady encryption-breaking orders to be made.

theguardian.com/technology/202

theguardian.com

What could Apple’s high court challenge mean for data protection?

The UK’s battle for access to encrypted services could define how companies are able to safeguard customer data in the future

@openrightsgroup@social.openrightsgroup.org
@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

In response to the State's demand for insecurity, Apple withdrew its encrypted services from the UK and appealed.

A secret tribunal now decides 🤫

This hearing MUST happen in public.

It starts with Apple... the UK government will chomp away encryption to a rotten core.

digit.fyi/apple-to-battle-uk-g

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

In response to the State's demand for insecurity, Apple withdrew its encrypted services from the UK and appealed.

A secret tribunal now decides 🤫

This hearing MUST happen in public.

It starts with Apple... the UK government will chomp away encryption to a rotten core.

digit.fyi/apple-to-battle-uk-g

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

History is a set of lies agreed upon.

The UK government took to revisionist tactics and wiped its advice for lawyers and barristers to use Apple encrypted services.

Putting victims of crime at a greater risk of harm so you don't contradict yourself isn't a good look 🤷‍♂️

techcrunch.com/2025/03/06/uk-q

techcrunch.com

UK quietly scrubs encryption advice from government websites | TechCrunch

The UK is no longer recommending the use of encryption for at-risk groups following its iCloud backdoor demands

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group
@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group
@openrightsgroup@social.openrightsgroup.org

Make it rain 🌧️

The UK government’s demand for a spy hole makes your iCloud storage leaky.

All your pics, docs, finances and more are up for grabs. Hackers, blackmailers and predators will have a field day.

Sign our petition to save Apple encrypted services!

➡️ you.38degrees.org.uk/petitions

Image: Apple logo with multiple bites taken out of it on a blue swirly background. Text: Petition – Keep our Apple data encrypted.
ALT text

Image: Apple logo with multiple bites taken out of it on a blue swirly background. Text: Petition – Keep our Apple data encrypted.

@openrightsgroup@social.openrightsgroup.org
@openrightsgroup@social.openrightsgroup.org
@jim@social.openrightsgroup.org · Reply to Jim Killock

To explain: Apple withdrew ADP from the UK, which means the UK can continue to request any data they like regarding UK citizens.

The problem is that the UK claimed jurisdiction over Apple encryption globally, saying the UK had a right to request any data from Apple from anyone across the globe they have an interest in.

@jim@social.openrightsgroup.org · Reply to Jim Killock
@jim@social.openrightsgroup.org
@openrightsgroup@social.openrightsgroup.org
@openrightsgroup@social.openrightsgroup.org
@openrightsgroup@social.openrightsgroup.org

Save Encryption. Save the World 🌐

Only by blocking message scanning technology on messaging apps can we ensure online safety!

End-to-end encryption prevents predators and hackers from weeding their way into our private lives.

We must 💬

openrightsgroup.org/blog/the-c

openrightsgroup.org

The Case for Encryption

Spying on private messages has long been on the security services’ wish list.

@openrightsgroup@social.openrightsgroup.org
@openrightsgroup@social.openrightsgroup.org
@openrightsgroup@social.openrightsgroup.org

LGBTQ people need online communities for support 🏳️‍🌈 🌐

End-to-end encryption underpins this essential lifeline with the safety of confidentiality.

It's a matter of survival, particularly for people who live with unsupportive families or in oppressive societies.

Save encryption. 💬

openrightsgroup.org/blog/queer

Image: 3D inflated message bubble with the pride flag. Text: Save Encryption – Practice Safe Text.
ALT text

Image: 3D inflated message bubble with the pride flag. Text: Save Encryption – Practice Safe Text.

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

“Strong encryption strengthens the foundation of trust online and ensures that our digital spaces remain ones where individuals can live authentically and without fear.”

Shae Gardner from LGBT Tech explains why encryption is so important for the LGBTQ community 🏳️‍🌈

💬

Video from LGBT Tech explaining the importance of encryption for the LGBTQ community.
ALT text

Video from LGBT Tech explaining the importance of encryption for the LGBTQ community.

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

Queer identities can be weaponised against us through harassment, blackmail or violence.

Introducing a backdoor to encrypted services with message scanning tech means anyone can find their way into your private life.

Privacy is safety for the LGBTQ community 🏳️‍🌈 🌐

💬

openrightsgroup.org/blog/queer

openrightsgroup.org

Queercryption: Safety in Numbers

We deserve to live free from persecution.

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

“Strong encryption strengthens the foundation of trust online and ensures that our digital spaces remain ones where individuals can live authentically and without fear.”

Shae Gardner from LGBT Tech explains why encryption is so important for the LGBTQ community 🏳️‍🌈

💬

Video from LGBT Tech explaining the importance of encryption for the LGBTQ community.
ALT text

Video from LGBT Tech explaining the importance of encryption for the LGBTQ community.

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

LGBTQ people are core users of the Internet 🏳️‍🌈 🌐

80% participate in social networking, compared to 58% of the general public.

Messaging apps that use end-to-end encryption help to keep LGBTQ people safe.

Read more from LGBT Tech ⬇️

lgbttech.org/post/2019/11/22/l

💬

Vide from LGBT Tech, explaining the importance of encryption for the LGBTQ community.
ALT text

Vide from LGBT Tech, explaining the importance of encryption for the LGBTQ community.

@openrightsgroup@social.openrightsgroup.org

LGBTQ people need online communities for support 🏳️‍🌈 🌐

End-to-end encryption underpins this essential lifeline with the safety of confidentiality.

It's a matter of survival, particularly for people who live with unsupportive families or in oppressive societies.

Save encryption. 💬

openrightsgroup.org/blog/queer

Image: 3D inflated message bubble with the pride flag. Text: Save Encryption – Practice Safe Text.
ALT text

Image: 3D inflated message bubble with the pride flag. Text: Save Encryption – Practice Safe Text.

@Jeremiah@alpaca.gold · Reply to Karl Emil Nikka

@karlemilnikka I appreciate @Mer__edith holding the line on end-to-end encryption and raising awareness of Sverige’s chat backdoor proposal.

@dfri is a nonprofit community organization fighting for digital privacy rights in Sverige. It responded to the government’s request for comment in January:

dfri.se/gemensamt-remissvar-pa

dfri.se

Gemensamt remissvar på Ju2024/02286 Datalagring och åtkomst till elektronisk information – :DFRI

@samuel@social.spejset.org

Denna fråga svarade V, C, MP och SD ja på i somras.

Står de alla fast vi det här nu appropå regeringens lagförslag om bakdörrar i totalsträckskrypterade appar som Signal?

Maila dem och fråga!

Förslag på mailtext och kontaktuppgifter finns här:

samuels.bitar.se/backdorrar-os

4. Tycker ni att totalsträckskrypterad kommunikation ska fortsätta vara tillåten och att man inte ska tvinga tjänster eller appar att kringå krypteringen?
ALT text

4. Tycker ni att totalsträckskrypterad kommunikation ska fortsätta vara tillåten och att man inte ska tvinga tjänster eller appar att kringå krypteringen?

@samuel@social.spejset.org

Denna fråga svarade V, C, MP och SD ja på i somras.

Står de alla fast vi det här nu appropå regeringens lagförslag om bakdörrar i totalsträckskrypterade appar som Signal?

Maila dem och fråga!

Förslag på mailtext och kontaktuppgifter finns här:

samuels.bitar.se/backdorrar-os

4. Tycker ni att totalsträckskrypterad kommunikation ska fortsätta vara tillåten och att man inte ska tvinga tjänster eller appar att kringå krypteringen?
ALT text

4. Tycker ni att totalsträckskrypterad kommunikation ska fortsätta vara tillåten och att man inte ska tvinga tjänster eller appar att kringå krypteringen?

@openrightsgroup@social.openrightsgroup.org

❌ You can't trade privacy to prevent crime.

⚠️ Message scanning tech punches a hole in everyone's security. Surveillance organisations, hackers, scammers and predators alike will be able to creep into your life.

Read our longread on the need to protect end-to-end encryption ⬇️

openrightsgroup.org/blog/the-c

openrightsgroup.org

The Case for Encryption

Spying on private messages has long been on the security services’ wish list.

@openrightsgroup@social.openrightsgroup.org

❌ You can't trade privacy to prevent crime.

⚠️ Message scanning tech punches a hole in everyone's security. Surveillance organisations, hackers, scammers and predators alike will be able to creep into your life.

Read our longread on the need to protect end-to-end encryption ⬇️

openrightsgroup.org/blog/the-c

openrightsgroup.org

The Case for Encryption

Spying on private messages has long been on the security services’ wish list.

@karlemilnikka@social.nikkasystems.com
@karlemilnikka@social.nikkasystems.com
@internic@mathstodon.xyz · Reply to Matthew Green

@matthew_d_green To ask a very basic question: What is the meaning of a "U.K. user" in the case of a mobile device interacting with a cloud service? Is it someone with a U.K. billing address, or someone with a U.K. phone number, or someone currently within the boarders of the U.K. at any given moment, or something different?

On a more general note, the existence of this law seems like a good further argument not to trust any implementation whose client software is not open source, ideally with 3rd party audits and reproducible builds. And with the way the App Store works, can one ever know exactly what one is getting?

@openrightsgroup@social.openrightsgroup.org

🚨🚨🚨🚨🚨🚨

APPLE WITHDRAW ENCRYPTION TECH FROM UK

🚨🚨🚨🚨🚨🚨

@JamesBaker says for ORG:

“The Home Office’s actions have deprived millions of Britons from accessing a security feature. As a result U.K. citizens will be at higher risk of their personal data and family photos falling into the hands of criminals and predators.”

bbc.co.uk/news/articles/cgj54e

bbc.com

Apple pulls data protection tool after UK government security row

Customers' photos and documents stored online will no longer be protected by end to end encryption.

@openrightsgroup@social.openrightsgroup.org

🚨🚨🚨🚨🚨🚨

APPLE WITHDRAW ENCRYPTION TECH FROM UK

🚨🚨🚨🚨🚨🚨

@JamesBaker says for ORG:

“The Home Office’s actions have deprived millions of Britons from accessing a security feature. As a result U.K. citizens will be at higher risk of their personal data and family photos falling into the hands of criminals and predators.”

bbc.co.uk/news/articles/cgj54e

bbc.com

Apple pulls data protection tool after UK government security row

Customers' photos and documents stored online will no longer be protected by end to end encryption.

@liberaforms@fosstodon.org

Release Candidate version 4.0.0-rc1 is available so you may now evaluate it.

blog.liberaforms.org/2025/02/1

LiberaForms 4 will come with end-to-end encryption, and we would like to test our implementation in general and especially using different browsers (Safari, Edge, etc).

Please help by creating an account at dev.liberaforms.org and use the new E2EE features.

Consider sending us encrypted feedback if you do decide to: dev.liberaforms.org/release-ca

Please repost!

Symbol for "end-to-end encryption"
ALT text

Symbol for "end-to-end encryption"

@liberaforms@fosstodon.org

Release Candidate version 4.0.0-rc1 is available so you may now evaluate it.

blog.liberaforms.org/2025/02/1

LiberaForms 4 will come with end-to-end encryption, and we would like to test our implementation in general and especially using different browsers (Safari, Edge, etc).

Please help by creating an account at dev.liberaforms.org and use the new E2EE features.

Consider sending us encrypted feedback if you do decide to: dev.liberaforms.org/release-ca

Please repost!

Symbol for "end-to-end encryption"
ALT text

Symbol for "end-to-end encryption"

@openrightsgroup@social.openrightsgroup.org

“The government want to be able to access anything and everything, anywhere, any time.

Their ambition to undermine basic security is frightening, unaccountable and would make everyone less safe.

It is straightforward bullying.”

🗣️ ORG’s @JamesBaker on the UK government’s order to break Apple’s encryption for millions.

metro.co.uk/2025/02/08/privacy

metro.co.uk

Privacy fears for millions as government demands access to messages and photos

'The government want to be able to access anything and everything, anywhere, any time.'

@Em0nM4stodon@infosec.exchange

New article by me ⛨✨!

CryptPad Review: Replacing Google Docs

If you have been looking for a privacy-respectful replacement to Google Docs, now is the time to move! 📦

@cryptpad offers a full office suite that is completely end-to-end encrypted and built from the ground up with data minimization in mind.

And it's free! 🎉

Why stay with Google when there is a much better option literally right there👇
privacyguides.org/articles/202

privacyguides.org

CryptPad Review: Replacing Google Docs

If you have been looking for a privacy-respectful replacement to Google Docs, now is the time to switch to the end-to-end encrypted office suite CryptPad.

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

The UK government seeks to break encryption in secret, with minimal accountability and potentially global impacts.

They're failing in their primary duty to protect British citizens in a world where cybersecurity threats are increasing.

Privacy = security. We must protect encryption!

bbc.co.uk/news/articles/c20g28

bbc.com

UK government demands access to Apple users' encrypted data

The Home Office served the notice to the tech giant under the Investigatory Powers Act.

@openrightsgroup@social.openrightsgroup.org · Reply to Open Rights Group

The UK government seeks to break encryption in secret, with minimal accountability and potentially global impacts.

They're failing in their primary duty to protect British citizens in a world where cybersecurity threats are increasing.

Privacy = security. We must protect encryption!

bbc.co.uk/news/articles/c20g28

bbc.com

UK government demands access to Apple users' encrypted data

The Home Office served the notice to the tech giant under the Investigatory Powers Act.

@openrightsgroup@social.openrightsgroup.org
@ErikJonker@mastodon.social
@strypey@mastodon.nzoss.nz

"This week the FBI, the US Cybersecurity and Infrastructure Security Agency (CISA) and partner agencies in New Zealand, Australia and Canada began advocating for the use of end-to-end encrypted (E2EE) communications.

The move is in reaction to law enforcement backdoors in the public telephone network - including AT&T, Verizon and T-Mobile - being hijacked by Salt Typhoon; a cyberattack group believed to be operated by the Chinese government."

element.io/blog/senators-implo

element.io

Senators implore Department of Defense to expand the use of Matrix

Senators Ron Wyden and Eric Schmitt push the Defense Department to expand the use of Matrix to deliver sovereign, end-to-end encrypted and interoperable communications.

@Em0nM4stodon@infosec.exchange

Remember Friends:

You cannot both have secure end-to-end encryption to protect your communication AND also have a backdoor/key/access only for "the good guys."

This is not possible.
Do not believe anyone telling you otherwise.

End-to-end encryption protects us all,
we must fight to keep it ✊🔒

@neil@mastodon.neilzone.co.uk

Over a year ago, I wrote ”A month using XMPP (using Snikket) for every call and chat”.

For something like 15 months now, Sandra and I have used XMPP via @snikket_im for probably 99.9% of our calls, messages, and video chats, running on an Intel NUC.

We both use the Snikket mobile app, and I also use @dino and @profanity in Linux.

Perhaps a fun holiday / weekend project, if you want family-friendly, self-hosted, communications?

neilzone.co.uk/2023/08/a-month

neilzone.co.uk

A month using XMPP (using Snikket) for every call and chat

For the last month, I’ve been using XMPP (using Snikket) for every call and chat between me and my wife Sandra, at least.

@homegrown@social.growyourown.services

You can start your own E2EE messaging server very easily and cheaply via @snikket_im, they are trying to make XMPP more user-friendly and easy to set up:

🌱 snikket.org

XMPP (also often called Jabber) is a long-established open messaging standard, like the Fediverse but for messaging. Just like on the Fediverse, people on one XMPP server can talk to people on other XMPP servers.

If you just want to sign up without making a server, try joinjabber.org

JoinJabber

Welcome to the JoinJabber community! An inclusive space on the Jabber network With Jabber you can securely chat or call with your friends and family. Or you can join public group chats with people that share your interests, without having to share your personal data. Jabber, also known as XMPP, is an open standard for online communication. This means that the network belongs to all of us, not just to a single organization.

@justin@ser.endipito.us

I finally began documenting the cryptosystem I'm implementing in

gitlab.com/enigmatick/enigmati

Even though my implementation in Enigmatick is still a work-in-progress, I think I've settled on the big details enough that I can begin documenting the ideas. And my implementation is less important than getting the core ideas out there for thought and discussion.

Please use this issue for comments:

gitlab.com/enigmatick/enigmati

gitlab.com

Discussion Ticket for E2EE (#3) · Issues · Enigmatick / core · GitLab

Topic

@homlett@mamot.fr

→ U.S. officials urge Americans to use encrypted apps amid unprecedented cyberattack
nbcnews.com/tech/security/us-o

“The hacking campaign, nicknamed SaltTyphoon by Microsoft, is one of the largest intelligence compromises in US history, and it has not yet been fully remediated.”

“Privacy advocates have long advocated using end-to-end encrypted E2EE apps.” *sigh*

👇

nbcnews.com

U.S. officials urge Americans to use encrypted apps amid cyberattack that exposed live phone calls

FBI and CISA officials said it was impossible to predict when the telecommunications companies would be fully safe from interlopers.

@soatok@furry.engineer

A while ago, I announced that I was going to build for the Fediverse, so that we might have private direct messaging.

Then I stumbled over the lack of available tooling for Key Transparency in a federated environment. So I started working on a specification for a Public Key Directory server.

I'm happy to announce that I finally have all my ideas on paper.

github.com/fedi-e2ee/public-ke

This specification is not complete. It still needs:

  1. Additional rounds of copy-editing, to ensure terms are consistent and easily understood.
  2. Peer review, especially from cryptography experts.
  3. A reference implementation.
  4. Machine-verifiable security proofs of the security of the protocols described.
  5. More peer review.
  6. Third-party testing of the reference implementation.
  7. Other people's ideas.

That last one is optional, but if anyone identifies an opportunity to make this project more successful, I'd love to hear it.

github.com

GitHub - fedi-e2ee/public-key-directory-specification: Specification for a Fediverse Directory Server for Public Keys

Specification for a Fediverse Directory Server for Public Keys - fedi-e2ee/public-key-directory-specification

@Em0nM4stodon@infosec.exchange
@aqunt@piipitin.fi
@strypey@mastodon.nzoss.nz

"Back at FOSDEM in February we showed off how Matrix could be used for E2EE-preserving messaging interoperability as required by the Digital Markets Act messaging interoperability - and we announced that Element had been working with Meta on integrating with its DMA APIs in order to connect WhatsApp to Matrix."

@matthew

matrix.org/blog/2024/09/whatsa

matrix.org

Update on Native Matrix interoperability with WhatsApp

Matrix, the open protocol for secure decentralised communications

@afterdawn@mementomori.social

Lakiehdotus, joka ei vain suostu katoamaan:

Euroopan Unioni ja etenkin Unkari haluavat edelleen kieltää vahvan salauksen EU:ssa. Kielto koskisi Signalia, WhatsAppia, sähköpostia ja kaikkea muutakin salattua viestiliikennettä.

Nyt Unkari kiirehtii lakiesitystä, jotta se menisi läpi maan puheenjohtajuuden aikana, ennen vuodenvaihdetta.

dawn.fi/uutiset/2024/10/03/eu-

dawn.fi

EU haluaa edelleen kieltää vahvan salauksen, Unkari kiirehtii

Unkari haluaisi Euroopan Unionin kieltävän vahvan salauksen mahdollisimman pian.

@je5perl@eupolicy.social

Red Barnet påstår i en kronik i Berlingske, at seneste kompromis ikke omgår eller svækker kryptering berlingske.dk/kronikker/red-ba

Det er simpelthen FORKERT.

Det fremgår tydeligt af betragtning 26a, at end-to-end krypterede kommunikationstjenester skal scanne private beskeder før de overføres krypteret til modtageren.

Det er client-side scanning (spyware), som svækker sikkerheden lige så meget som andre bagdøre i .

Der er INTET NYT i seneste kompromistekst på dette punkt.

Kronik i Berlingske, hvor Red Barnet påstår, at det seneste Chat Control kompromis fastslår, at loven »ikke skal ulovliggøre, umuliggøre, svække, omgå eller på anden vis underminere cybersikkerhed, i særdeleshed kryptering, herunder også end-to-end-kryptering«
ALT text

Kronik i Berlingske, hvor Red Barnet påstår, at det seneste Chat Control kompromis fastslår, at loven »ikke skal ulovliggøre, umuliggøre, svække, omgå eller på anden vis underminere cybersikkerhed, i særdeleshed kryptering, herunder også end-to-end-kryptering«

Den faktiske tekst til seneste kompromis, hvor det klart fremgår, at end-to-end krypteredede tjestester skal bruge client-side-scanning (scanne indholdet før det overføres i krypteret form).
ALT text

Den faktiske tekst til seneste kompromis, hvor det klart fremgår, at end-to-end krypteredede tjestester skal bruge client-side-scanning (scanne indholdet før det overføres i krypteret form).

@je5perl@eupolicy.social

The Europol press conference today announcing the takedown of the miniature encrypted communications service Ghost (1000 messages exchanged per day, a fraction of EncroChat), quickly turned into a lobbying exercise for the HLG:

"[Private companies] must ensure that their platforms are not safe havens for criminals and should provide mechanisms for lawful data access under judicial oversight and in full respect of fundamental rights" (aka backdoors)

europol.europa.eu/media-press/

europol.europa.eu

Global Coalition Takes Down New Criminal Communication Platform | Europol

Global Coalition Takes Down New Criminal Communication Platform

@marcel@waldvogel.family · Reply to Marcel Waldvogel

Denn: Es gibt gute Gründe, Ende-zu-Ende-verschlüsselt zu kommunizieren.
1️⃣ Persönliche Nachrichten im Familienkreis gehen niemanden etwas an. Punkt.
2️⃣ Firmeninternas, die ich mit Arbeitskolleg:innen tausche, ausserhalb der Firma auch nicht
3️⃣ Aber auch der Anbieter hat Vorteile: Falls doch einmal Sicherheitslücke passieren sollte oder Hacker in das System eindringen: Es können keine Daten gestohlen werden.

Win-win, eigentlich

4/n
dnip.ch/2024/09/09/chatkontrol

dnip.ch

Chatkontrolle: Es geht weiter! - Das Netz ist politisch

In der EU wird seit letztem Mittwoch wieder über die sogenannte «Chatkontrolle» verhandelt. Worum geht es da? Und welche Auswirkungen hat das auf die Schweiz?

@phoenix_r_d@mastodon.social

We ended 2023 with a talk at . @raphaelrobert and Konrad presented the new standard for end-to-end encryption, Messaging Layer Security (MLS). The room was packed and some people couldn't attend in person – luckily the talk is now online and can be watched again.
🍿 media.ccc.de/v/37c3-12064-rfc_

Thank you @ccc and all helping hands for the great event!

Raphael presenting MLS at 37C3
ALT text

Raphael presenting MLS at 37C3

@rene_mobile@infosec.exchange

I did a talk at on "Secure Messaging (and attacks against it)" and the great organization team has already put the video recording online at
media.ccc.de/v/26cd6d27-247f-5. Many thanks to the audience for so many insightful questions and discussions - it is rare that the audience is so engaged and aware of nuance! Slides are available at mayrhofer.eu.org/talk/secure-m

Abstract: Secure messaging apps are one of the most-used app categories on current mobile devices, and a significant subset of human communication is handled through them. This makes them an interesting target for forensics, surveillance, and general information collection for intelligence services and police institutions. In this talk, we will discuss various options for such surveillance and their respective difficulties, pointing out which options do not seem realistic given all the practical considerations.

TL;DR: There is no good option for surveiling E2EE messenger apps; all of them are broken or practically unrealistic in various ways. I don't see an option to do that without real, significant problems that make all of us less safe. Please stop claiming that it is possible without these nasty issues.

Håck Ma's Castle logo
ALT text

Håck Ma's Castle logo

@nw@ioc.exchange
@havn@mas.to

I'm conflicted by this (theverge.com/2024/8/24/2422767)…

Sure, tons of shady stuff goes on on – but the same is true for (it's just a less popular app). Is this arrest along the same lines as politicians wanting to ban , or is it a proper consequence of laissez-faire moderation?

(It's also interesting that Telegram simultaneously is "the most insecure thing on earth" (because it mostly encrypts on server), _and_ hated by governments because they can't get access…)

theverge.com

French authorities arrest Telegram’s CEO

Pavel Durov could be indicted in the morning.

@matrix@mastodon.matrix.org

Blazing fast Matrix, Native E2EE Group Calls, state of the art auth and potential WhatsApp interop.

Matthew covers the last year in Matrix and how it can be used to speed up the opening of communications silo required by the EU Digital Markets Act

youtu.be/s5BrVVf0B1I

youtube.com

FOSDEM 2024 - Opening up communication silos with Matrix 2.0 and the EU Digital Markets Act

What role does Matrix play in opening up communications silo, as mandated by the EU Digital Markets Act? Matthew walks us through this, after a general updat...

@neustradamus@mastodon.social
@switchingsoftware@digitalcourage.social

We've updated switching.software again!

For instance, we updated the description of @cryptpad, an easy to use yet powerful end-to-end encrypted replacement for , and unencrypted pads.

If you find outdated content, please look through the open issues before creating new ones: codeberg.org/swiso/website/iss

codeberg.org

website

Hugo-powered website of the "switching.software" project |

@ente@mstdn.social

We've added beautiful previews for shared links! 🧑‍🎨

The links themselves are and the previews are crafted on device, so you get 💯

Check it out, we think you'll like this 😊

Poster for Ente's feature that enables previews for shared links.
ALT text

Poster for Ente's feature that enables previews for shared links.

@kkarhan@mstdn.social · Reply to Ahri Boy (backup)

@ahriboy Unlike @torproject which is sufficiently decentralized that people from the can't shutdown [otherwise they would've been forced at gunpoint several times already], stinks like did since The Causa Bühler...

In fact @protonmail snitches on users constantly and I'd also not trust @Tutanota in that sense.
youtube.com/watch?v=QCx_G_R0UmQ

Remember: = = no effective beyond & transport encryption!

youtube.com

ProtonMail Sends User IP and Device Info to Swiss Authorities.

Original articleshttps://mobile.twitter.com/tenacioustek/status/1434604102676271106https://techcrunch.com/2021/09/06/protonmail-logged-ip-address-of-french-a...

@kkarhan@mstdn.social · Reply to Kevin Karhan :verified:

@element @amatecha @matrix @liaizon @maxschrems @noybeu @protonmail

Because not only do they comply in like duely issued requests in their juristiction but can't even be bothered with demanding due process and instead sellout their customers like pathetic little shitheads of the caliber that publicly lie and claim they use when they don't do so at all...

youtube.com/watch?v=8PW3O2mqTn8

youtube.com

WhatsApp end-to-end encryption

WhatsApp protects your messages and calls with end-to-end encryption, so only you and the person you're chatting with can read or listen to them.To see more ...

On ..

SIMPLE STEPS:

* Turn Off Bluetooth (use headphone jack if possible)

* Don't overshare perm mac & Turn Off WiFi w/not in use (wipri -w does both automatically for / linux phones - phone apps exist)

* Use / - Hidden Services w/Possible (e2ee) - detach ID

* Use Frontends For Searching Big Tech (ex: , , )

* Compartmentalize (container, profiles, sandbox)

* /


📝 PUBLIC TUTORIALS: buymeacoffee.com/politictech/p