Logo

    e2ee

    Explore " e2ee" with insightful episodes like "Sicherheit und Benutzerfreundlichkeit in Harmonie", "Signal's Post-Quantum PQXDH, Same-Origin Policy, E2EE in the Browser Revisted", "Warum digitales Vertrauen wichtig ist", "5. Nowhere to Hide?" and "How companies can go beyond end-to-end encryption" from podcasts like ""under CTRL", "Security Cryptography Whatever", "under CTRL", "In Conversation With" and "under CTRL"" and more!

    Episodes (20)

    Sicherheit und Benutzerfreundlichkeit in Harmonie

    Sicherheit und Benutzerfreundlichkeit in Harmonie

    Wie kann Ihr Unternehmen die Sicherheit und Privatsphäre seiner Daten in Übereinstimmung mit aktuellen Datenschutzbestimmungen gewährleisten, ohne seinen Mitarbeitern das Leben – und die interne und externe Zusammenarbeit – schwer zu machen?  In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwort von Elisabeth Rötsch, Account Executive bei Threema, und Peter Stössel, Chief Revenue Officer bei Tresorit.

    Sie diskutieren die aktuellen Cyberbedrohungen und Datenschutzanforderungen, denen Unternehmen sich gegenübersehen, und wie Ende-zu-Ende-verschlüsselte Lösungen wie Threema.Work und Tresorit mit ihrer breiten Produktpalette benutzerfreundlicher Apps, Integrationen und Add-ons helfen können, Risiken einzudämmen und Compliance mit z. B. der DSGVO, NIS2 und DORA zu erzielen. Anhand von Threemas und Tresorits Entstehungsgeschichte, ihren aktuellen Erfolgskennzahlen und positiven Kundenerfahrungen wird beleuchtet, wie der Schutz von Privatsphäre – ein grundlegendes Menschenrecht und die Mission beider Plattformen – gewährleistet werden kann, ohne dabei die Usability aufs Spiel zu setzen. 

    Während Threema.Work als Messenger-Dienst den Schwerpunkt auf geschützte Unternehmenskommunikation gelegt hat und Tresorits Fokus auf sicheren Datentausch gerichtet ist, haben die Anwendungen in Sachen Bedienbarkeit und Nutzerkomfort ein gemeinsames Ziel: ihren Kunden eine intuitiv nutzbare Ende-zu-Ende-Verschlüsselung mit Zero-Knowledge-Prinzip zu bieten, die sich nahtlos in bereits bestehende Arbeitsabläufe und Systeme einfügt.

    Sie möchten mehr über Tresorits sicheren Workspace in der Cloud erfahren? Besuchen Sie unsere Webseite oder kontaktieren Sie uns.

    Lesen Sie die im Podcast erwähnten Beiträge zur Nutzung von Tresorit in Unternehmen und NGOs: 

    Kundenstimme Viessmann

    Wenn Datenschutz eine Frage von Leben und Tod ist – ein Gespräch mit Menschenrechtsaktivist Ethan Gutmann

    Folgen Sie uns auf unseren Social-Media-Kanälen:

    Signal's Post-Quantum PQXDH, Same-Origin Policy, E2EE in the Browser Revisted

    Signal's Post-Quantum PQXDH, Same-Origin Policy, E2EE in the Browser Revisted

    We're back! Signal rolled out a protocol change to be post-quantum resilient! Someone was caught intercepting Jabber TLS via certificate transparency! Was the same-origin policy in web browers just a dirty hack all along? Plus secure message format formalisms, and even more beating of the dead horse that is E2EE in the browser.

    Transcript: https://securitycryptographywhatever.com/2023/11/07/PQXDH-etc

    Links:

    - https://zfnd.org/so-you-want-to-build-an-end-to-end-encrypted-web-app/
    - https://github.com/superfly/macaroon
    - https://cryspen.com/post/pqxdh/
    - https://eprint.iacr.org/2023/1390.pdf


    "Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

    Warum digitales Vertrauen wichtig ist

    Warum digitales Vertrauen wichtig ist

    Vertrauen ist das Herzstück produktiver Geschäftsbeziehungen. 

    Doch die Verbraucher zögern oft, ihr Vertrauen in die digitalen Technologien zu setzen, die moderne und bahnbrechende Unternehmen vorantreiben.

    In dieser Folge setzt sich Stefan Killer-Haug von Tresorit mit Nicolas Zahn von der Swiss Digital Initiative zusammen, um über die Besonderheiten des digitalen Vertrauens zu sprechen und zu erklären, warum der Aufbau von Verbrauchervertrauen entscheidend ist, wenn Unternehmen die Vorteile der Spitzentechnologie wirklich nutzen wollen.

    Wir gehen auch auf einige der wichtigsten Themen ein, die den Umgang von Unternehmen mit Daten heute und in Zukunft bestimmen: von der Frage, wie sich die Vorstellung von digitalem Vertrauen in den verschiedenen internationalen Märkten unterscheidet, bis hin zum Erhalt des Kundenvertrauens in einer Welt der KI.

    Wenn Sie in Zukunft mehr von unseren Webinaren sehen möchten, vergessen Sie nicht, sich hier beim LinkedIn-Kanal von Tresorit anzumelden.

    5. Nowhere to Hide?

    5. Nowhere to Hide?

    Nowhere to Hide is part of the IWF’s In Conversation With series exploring the technological and political issues surrounding the global spread of child sexual abuse material. 

    This episode looks at how end-to-end encryption goes further than standard encryption, meaning even the service providers themselves can’t see what has been shared between two users.

    It means that service providers who deploy end-to-end encryption on their platforms and messaging services are actively disabling their ability to detect child sexual abuse imagery. That is, unless they deploy additional safeguards.

    Speaking on the podcast, Dan Sexton, Chief Technical Officer at the IWF, said: “It is very concerning for the IWF. Our mission, our vision, is a safer internet for all, and that the internet is free of child sexual abuse material.

    “A big part of how we achieve that mission is providing data on known images and videos to industry so they can detect and block that content, prevent it from being uploaded, saved, shared, distributed and, right now, no one is doing that in end-to-end encrypted messaging services. And that is deeply concerning for us.”


    He added: “When a child reports content of themselves to us, we want to be able to say to those children, to those victims, that their content will be found, and it will be blocked across the internet. Right now, we can’t do that with end-to-end encrypted services. That is very concerning for us, and very concerning for those children.”

    Mr Sexton, however, said it is possible for safety solutions to be “made compatible” with end-to-end encryption. He said the way in which the technology is being used is the problem, rather than the technology itself.

    He said preventing the sharing or upload of child sexual abuse material into end-to-end encrypted spaces can be as unobtrusive as scanning for viruses or malware, and doesn’t require any intrusion into individuals’ privacy.

    Read more here.

    Support the show

    How companies can go beyond end-to-end encryption

    How companies can go beyond end-to-end encryption

    End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers. 

    But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk. 

    In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions. 

    We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks.

    S2E18: Making Digital Contact Cards Private, Shareable & Updatable with Brad Dominy (Neucards)

    S2E18: Making Digital Contact Cards Private, Shareable & Updatable with Brad Dominy (Neucards)

    I am delighted to welcome my next guest, Brad Dominy. Brad is a MacOS and iOS developer and Founder & Inventor of Neucards, a privacy-preserving app that enables secure shareable and updatable digital contacts. In this conversation, we delve into why personally managing our digital contacts has been so difficult and Brad's novel approach to securely manage our contacts, architected with privacy by design and default.

    Contacts have always been the “junk drawer” of digital data, where people have information that they want to keep up-to-date, but are rarely able to based on current technology. The vCard standard is outdated, but is the only standard that works across iOS, Android, and Microsoft. It is still the most commonly used contact format, but lacks any capacity for updating contacts. Once someone exchanges their contact information with you, it then falls on you to keep that up-to-date. This is why Brad created Neucards: to gain the benefits of sharing information easily, privately (with E2EE) and receiving updates across all platforms.


    Topics Covered:

    • Why it is difficult to keep our digital contacts up-to-date across devices and platforms.
    • Brad describes his career journey that inspired him to invent Neucards; the problems Neucards solves for; and why this became his passion project for over a decade
    • Why companies haven’t innovated more in the digital contacts space
    • The 3 main features that make Neucards different from other contact apps
    • How Neucards enables you to share digital contacts data easily & securely
    • Neucards' privacy by design and default approach to sharing and updating digital contacts
    • How you can use NFC tap tags with Neucards to make the process of sharing digital contacts much easier
    • Whether Neucards can solve the "New phone, who dis?" problem
    • Whether we will see an update to the vCard standard or new standards for digital contacts
    • Neucards' roadmap, including a 'mask communications' feature
    • The importance of language; the difference between 'privacy-preserving' vs. 'privacy-enabling' architectural approaches

    Resources Mentioned:

    Guest Info:



    Privado.ai
    Privacy assurance at the speed of product development. Get instant visibility w/ privacy code scans.

    Shifting Privacy Left Media
    Where privacy engineers gather, share, & learn

    Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

    Copyright © 2022 - 2023 Principled LLC. All rights reserved.

    Elementor-addon kan give admin-adgang, Siemens-datterselskab ramt af datalæk, Twitter introducerer E2EE

    Elementor-addon kan give admin-adgang, Siemens-datterselskab ramt af datalæk, Twitter introducerer E2EE

    Tre nyheder dækker dagens udsendelse: Et Siemens-datterselskab, nemlig Brightly Software, er blevet ramt af et cyberangreb der påvirker nuværende og tidligere studerende.

    Elementor pluginnet til WordPress understøtter mange addons, en af dem er Essential Addons for Elementor. Men den har en kritisk sårbarhed.

    Twitter vil gerne udrulle end 2 end encryption på brugeres private beskeder, og i første omgang får bl.a. Twitter Blue brugere lov til at teste featuren af.

    Vært: Omar Hawwash, Cybersikkerhedskonsulent og journalist, LEVEL7

    Private messaging via Session w/ Kee Jefferys

    Private messaging via Session w/ Kee Jefferys

    Looking to explore alternatives to Signal and heard of Session, but not sure what sets it apart? This episode, we're sitting down with Kee Jefferys, CTO of Session, to chat about their Session messenger and it's approaches to chat, encryption, and network privacy.

    More about Kee Jefferys:

    More about Session:

    Opt Out's Sponsors:

    Supporting Opt Out:

    Support the show
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io