Hacking group Cult of the Dead Cow plans system to encrypt social media and other apps::undefined

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    33
    ·
    1 year ago

    This is the best summary I could come up with:


    SAN FRANCISCO — Once known for distributing hacking tools and shaming software companies into improving their security, a famed group of technology activists is now working to develop a system that will allow the creation of messaging and social networking apps that won’t keep hold of users’ personal data.

    The latest effort, to be detailed at the massive annual Def Con hacking conference in Las Vegas next week, seeks to provide a foundation for messaging, file sharing and even social networking apps without harvesting any data, all secured by the kind of end-to-end encryption that makes interception hard even for governments.

    The team behind Veilid has not yet released documentation explaining its design choices, and collaborative work on an initial messaging app, intended to function without requiring a phone number, has yet to produce a test version.

    The FBI did not respond to a request for comment, but law enforcement agencies often complain that end-to-end encryption makes it hard to scan messages for criminal plots and for police to recover evidence after the fact.

    That pair includes Peiter Zatko, widely known as Mudge, who was a program manager at the Pentagon’s Defense Advanced Research Projects Agency, or DARPA, and the head of security for the online payments facilitator Stripe.


    I’m a bot and I’m open source!

    • tool@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 year ago

      Reading that name brought me back to a very specific time. The internet was still the wild west at that point.

  • fenwickrysen@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    1 year ago

    “Oom,” I say, “Oom.” Good to see the cDc putting out software again; the name is a wonderful play on the words “veiled” and “valid.” I’m excited to see what gets built for Veilid after details of the protocol are re-veal-ed at DefCon. ;-)