SECURITY: Germany may dictate no end-to-end encryption

Tuesday, October 14, 2025

https://digitalchew.com/2025/10/05/chat-control-could-break-encryption-warns-signal/

Chat Control Could Break Encryption, Warns Signal
Reginald Edward
October 5, 2025

*** begin quote ***

Key Takeaways

  • Signal’s president warns Germany that Chat Control could destroy user privacy.
  • Chat Control forces apps to scan messages before encryption.
  • The plan would weaken secure chats and allow mass surveillance.
  • Signal says it will leave the EU if Chat Control becomes law.
  • Germany’s vote on Chat Control could shape global privacy rules.

*** end quote ***

And what happens when one Gooferment does it —  whatever the particular “it” is, other Gooferments think “what a great idea” and do it too.

Argh!

— 30 —


TECHNOLOGY: Why can’t I compile a spreadsheet?

Wednesday, September 24, 2025

https://a.tldrnewsletter.com/web-version?ep=1&lc=834d23bc-ea90-11ec-9258-0241b9615763&p=fed2061c-8fbc-11f0-a7bf-214dec94fde6&pt=campaign&t=1757673580&s=aa29e0273801d56e71f15cc32a41f44053f1403baf33cd1ccbc2231fcfb6c211

TLDR 2025-09-12

*** begin quote ***

That giant mountain of spreadsheets and screenshots standing between your startup and your success. 

*** end quote ***

Why hasn’t someone come out with a simple way to “compile” a spreadsheet?

Once I’ve “perfected” my spreadsheet, why can’t I “freeze” into an app.  That app would allow input BUT, (and there is always a BIG butt), not allow formulas or formatting changes.

When I was the bar manager at my local American Legion post, I had several spreadsheets for various functions.  Unfortunately, I couldn’t share them with my team because invariably some one would mess it up the formulas or format.  So even when we got square to take credit cards, my data entry work didn’t ease up; it increased.  Argh!

I could have coded an app in assembler, Fortran, or COBOL, but why bother?  That was more work than just entering, and in some cases, reentering the same data.  Luckly, COVID came an killed the Post’s business.  Thanks to Gooferment diktats and no reduction in fees to non-profits, we went from stay afloat to being underwater. Argh!

I still would like  de able to “freeze” a spreadsheet.  Maybe I should apply to Apple, Microsoft, or Google to develop it for them.  I don’t see them doing much to advance spreadsheet technology? 

FWIW!

# – # – # – # – # 

p.s., I’d like some TLDR swag. Laugh!

https://refer.tldr.tech/3dabce84/

— 30 —


SECURITY: Don’t forget the old printer as a “data leak”

Thursday, September 18, 2025

FROM TLDR Information Security 2025-09-10

*** begin quote ***

USB drives are still a problem – but they’re not your only data exfiltration risk (Sponsor)

While most organizations focus on blocking USB devices, attackers and insiders can just as easily steal data through network shares, cloud storage, or even local folder access. You need visibility and control over ALL storage access points.

*** end quote ***

Yeah, but I remember that brokers used to keep a shadow book at home.  Meticulously copying or printing duplicates of “their” Client accounts.  

Now it’s easy to just use your phone to take a picture.  AI or software will even extract the text from the picture so no reentering data drudgery. 

I’ve even seen utilities that will put files into QR codes for backup and recovery.

Never underestimate human inginuity to get what they want. Be it drugs, sex, money, or data.

— 30 —


MONEY: Walmart and Amazon are going to “mint” Stablecoins

Thursday, June 19, 2025

https://www.wsj.com/finance/banking/walmart-amazon-stablecoin-07de2fdd?st=Uj2rA8&reflink=desktopwebshare_permalink&utm_source=tldrnewsletter

Walmart and Amazon Are Exploring Issuing Their Own Stablecoins

  • Corporate coins could take payments activity away from banks and the traditional financial system

By Gina Heeb, AnnaMaria Andriotis, Josh Dawsey
Updated June 13, 2025 4:51 pm ET

# – # – # – # – # 

FROM TLDR 2025-06-16

*** begin quote ***

Walmart and Amazon Are Exploring Issuing Their Own Stablecoins

Several multinational giants, including Walmart and Amazon, are discussing potential efforts to issue stablecoins. Whether these initiatives will go ahead depends on a bill still yet to clear the Senate and House called the Genius Act, which establishes a regulatory framework for stablecoins. Stablecoins could allow merchants to bypass traditional payment rails, which cost them billions of dollars in fees each year. A regulatory framework for stablecoins would enable an alternative payment type for merchants that could significantly lower their expenses and create competition against Visa and Mastercard. 

*** end quote ***

# – # – # – # – # 

To me this is BIG (<synonym for the act of procreation in real time>) deal.

I never understood why Walmart was allowed to establish its own bank.  The politicians and bureaucrats are always whining about the “poor unbanked”.  But Walmart could solve that problem quickly, cheaply, and easily.  So could Amazon.

Stablecoins by either of them could serve the same purpose as a bank without the regulatory hassle.

Let’s wait and see.  Competition in the “traditional financial system” for JP Morgan Chase, Bank of America, Visa, and Mastercard could certainly be good for the consumers.

—30—


SECURITY:  YubiKeys are vulnerable to cloning attacks

Wednesday, September 4, 2024

https://tldr.tech/infosec/2024-09-04

TLDR Information Security 2024-09-04

https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel (3 minute read)

The YubiKey 5 hardware token for two-factor authentication has a cryptographic flaw that makes it vulnerable to cloning attacks when physically accessed by an attacker. Yubico has confirmed that all YubiKey 5 models are susceptible to cloning due to a side channel vulnerability in the Infineon microcontroller used in various authentication devices. Updating firmware on affected YubiKeys is not possible, leaving them permanently vulnerable to potential attacks.

# – # – # – # – # 

Guess that you can toss these in the trash can or trash bin!

Still think that the authenticator app of a phone is the best two factor authentication technique.

—30—