SECURITY: Germany may dictate no end-to-end encryption

Tuesday, October 14, 2025

https://digitalchew.com/2025/10/05/chat-control-could-break-encryption-warns-signal/

Chat Control Could Break Encryption, Warns Signal
Reginald Edward
October 5, 2025

*** begin quote ***

Key Takeaways

  • Signal’s president warns Germany that Chat Control could destroy user privacy.
  • Chat Control forces apps to scan messages before encryption.
  • The plan would weaken secure chats and allow mass surveillance.
  • Signal says it will leave the EU if Chat Control becomes law.
  • Germany’s vote on Chat Control could shape global privacy rules.

*** end quote ***

And what happens when one Gooferment does it —  whatever the particular “it” is, other Gooferments think “what a great idea” and do it too.

Argh!

— 30 —


INTERESTING: Jèrriais continued to be used as a secret language for passing messages for the rest of the war

Wednesday, June 25, 2025

The secret British language that was used to outwit the Nazis

17 July 2023
Oliver Berry Features correspondent

*** begin quote ***

Instead of taking up arms, islanders found other, subtler ways to resist. They engaged in a campaign of passive resistance, and Jèrriais became central to their efforts. With its complex vocabulary and regional variations, the language was all but impossible for outsiders – even French-speaking Germans – to follow. As such, it made the perfect secret code, and islanders increasingly used it to exchange information, make clandestine plans against their occupiers and, occasionally, even mock their them right under their noses.

“Jèrriais articles at the beginning of the occupation managed to get through resistance messages,” explained Geraint Jennings, a linguist, scholar and Jèrriais expert who works at L’Office du Jèrriais to promote the language. “Articles openly printed that it’s best to speak Jèrriais so ‘certain people’ won’t be able to understand it – IE the Germans! Of course, they soon cottoned on to that and clamped down with censorship, but Jèrriais continued to be used as a secret language for passing messages for the rest of the war.”

Ironically, despite its wartime role, the use of Jèrriais declined at an alarming rate after liberation in 1945. Like many of Britain’s minority languages, such as Manx, Gaelic, Welsh and Cornish, Jèrriais was derided as a language spoken only by the uneducated, and it had been in gradual decline since the late 19th Century – a trend that accelerated rapidly after the end of WW2.

*** end quote ***

Fascinating stuff.  Like most of the lost languages, “We, The Sheeple” have no idea what has been lost.

Hopefully, AI and some dedicated individuals can capture and save it.

—30—


PRODUCTIVITY: DROPBOX response; “drugs in prison”

Thursday, September 6, 2012

http://www.readwriteweb.com/enterprise/2012/08/should-your-company-just-say-no-to-dropbox.php

Should Your Company Just Say “No” To Dropbox?
Brian Proffitt

*** Begin Quote ***

As the business world increasingly turns to mobile devices and cloud-based file-sharing services to store or collaborate on important documents, the amount of information that’s falling into the wrong hands keeps climbing.

The numbers tell the tale: 90% of organizations had a leak of sensitive or confidential information over the past year. That’s one of the take-aways from a new study from security analysts at the Ponemon Institute.

Dropbox Is Useful – And That’s The Problem

Services like Dropbox, Bitcasa, YouSendIt and others are useful and efficient ways to get documents and files from one worker to another, especially in this age of mobile devices and distributed workforces. Plus, they’re cheap (or free) and easy for individual workers or small departments to set up.

But increasing use of these tools in the workplace, even for legitimate business reasons such as collaboration, puts a lot of private information at risk. And companies are starting to notice.

How bad is the situation? According to the Ponemon study, 60% of organizations have employees who frequently or very frequently put confidential files on services like Dropbox without permission. And just about that same percentage (59%) reported that what controls they do have in place were ineffective at managing who has access to sensitive files.

*** and ***

Some companies are already reacting with strong policies regulating use of such file-sharing services. IBM, for instance, has banned employee access to services like Dropbox and iCloud. Even the iPhone’s Siri is turned off for fear that sensitive information could be discovered from search query data stored at Apple.

This might be going too far for many companies. Especially if they don’t provide some sort of alternative. IBM has its own custom-built solution for file sharing, but many smaller operations can’t afford such measures.

*** End quote ***

Sure, that’s going to stop the practice.

Every hear of encryption.

Sensitive file? Run it thru PKZIP.

Use LASTPASS to select a 97 character password to encrypt it.

Problem solved.

Argh!

IMHO the rule should be if you can’t able it; you can’t ban it.

Bans don’t work.

Why?

“Drugs in Prison”!

The human being is the world’s best “rat” in terms of adaptability and maze solving.

Tell some one they can’t in an obnoxious enough fashion, and they will spend every waking hour proving you’re wrong.

Enable the behavior in a secure fashion.

Security should never say “no”; they should say “yes, and here’ s how to do it”.

Argh!

*****


INTERESTING: Laptop encryption is the crux of a Fifth Amendment issue

Tuesday, February 21, 2012

http://arstechnica.com/tech-policy/news/2012/02/feds-urge-court-to-reject-laptop-encryption-appeal.ars

Feds urge court to reject laptop encryption appeal
By David Kravets, wired.com

*** begin quote ***

Colorado federal authorities seized the encrypted Toshiba laptop from defendant Ramona Fricosu in 2010 with valid court warrants while investigating alleged mortgage fraud, and demanded she decrypt it.

Ruling that the woman’s Fifth Amendment rights against compelled self-incrimination would not be breached, US District Judge Robert Blackburn ordered the woman in January to decrypt the laptop by the end of February. The judge refused to stay his decision to allow Fricosu time to appeal.

*** end quote ***

Would someone please explain how this is not being compelled to testify against one’s self?

# – # – # – # – #