Microsoft Details “Whisper Leak” Vulnerability That Could Expose Encypted AI Chat It turns out even encrypted AI chats might not be as private as you think. Microsoft security researchers have ...
#News #AI #Cybersecurity #microsoft
Origin | Interest | Match
#News #AI #Cybersecurity #microsoft
Origin | Interest | Match
Microsoft Details “Whisper Leak” Vulnerability That Could Expose Encypted AI Chat
It turns out even encrypted AI chats might not be as private as you think. Microsoft security researchers have now detailed a vulnerability, dubbed “Whisper Leak,” that could let attackers guess what users are talking about with AI chatbots via Transport Layer Security (TLS). What’s scary is that attackers don’t even need to decrypt a […]
windowsreport.com
November 10, 2025 at 5:34 PM
Microsoft Details “Whisper Leak” Vulnerability That Could Expose Encypted AI Chat It turns out even encrypted AI chats might not be as private as you think. Microsoft security researchers have ...
#News #AI #Cybersecurity #microsoft
Origin | Interest | Match
#News #AI #Cybersecurity #microsoft
Origin | Interest | Match
And how can you be 100% sure your phone isn't sending the text you're typing to a remote server _before_ it passes it to your p2p encypted app ?
October 27, 2025 at 4:13 PM
And how can you be 100% sure your phone isn't sending the text you're typing to a remote server _before_ it passes it to your p2p encypted app ?
I'd suggest that he's turning it into more of a Telegram style underground/encypted messaging platform for far-right organisations, even extremists, to communicate and organise without scrutiny or clpability.
October 20, 2025 at 12:23 PM
I'd suggest that he's turning it into more of a Telegram style underground/encypted messaging platform for far-right organisations, even extremists, to communicate and organise without scrutiny or clpability.
no encypted chat obscures the id of the device you use....
they only encrypt the content of what you write...
they only encrypt the content of what you write...
July 2, 2025 at 7:21 AM
no encypted chat obscures the id of the device you use....
they only encrypt the content of what you write...
they only encrypt the content of what you write...
I'd laugh few years ago, but not now since I need to work with it.
But every protocol trying to be secure from BLEmishes uses its own encypted tunnel inside BLE.
BLE implementations on devices are so fscked in many ways, you need nRF52840 sniffer to actually check whatever is really trasmitted.
But every protocol trying to be secure from BLEmishes uses its own encypted tunnel inside BLE.
BLE implementations on devices are so fscked in many ways, you need nRF52840 sniffer to actually check whatever is really trasmitted.
May 26, 2025 at 10:49 PM
I'd laugh few years ago, but not now since I need to work with it.
But every protocol trying to be secure from BLEmishes uses its own encypted tunnel inside BLE.
BLE implementations on devices are so fscked in many ways, you need nRF52840 sniffer to actually check whatever is really trasmitted.
But every protocol trying to be secure from BLEmishes uses its own encypted tunnel inside BLE.
BLE implementations on devices are so fscked in many ways, you need nRF52840 sniffer to actually check whatever is really trasmitted.
Kinda hard to do when SOP for safe password storage involves encrypting them in ways that can't readily be reversed (such that the encypted forms of "password123" and "Password123." will be unrecognisably dissimilar.
May 22, 2025 at 12:06 PM
Kinda hard to do when SOP for safe password storage involves encrypting them in ways that can't readily be reversed (such that the encypted forms of "password123" and "Password123." will be unrecognisably dissimilar.
wowowow
accumulated 535 pulls on ZZZ as an f2p LOL
accumulated 535 pulls on ZZZ as an f2p LOL
May 6, 2025 at 4:41 AM
wowowow
accumulated 535 pulls on ZZZ as an f2p LOL
accumulated 535 pulls on ZZZ as an f2p LOL
If you're a Robert B. Parker fan on Matrix, you're welcome to join my public room Fans of Robert B. Parker: matrix.to#/#rbp-fans:m...
You can use Matrix for end-to-end encypted communication. You can use it for fan clubs while you're at it, or vice versa.
You can use Matrix for end-to-end encypted communication. You can use it for fan clubs while you're at it, or vice versa.
Matrix - Decentralised and secure communication
You're invited to talk on Matrix. If you don't already have a client this link will help you pick one, and join the conversation. If you already have one, this link will help you join the conversation
https://matrix.to/#/#rbp-fans:matrix.org
April 9, 2025 at 10:29 AM
If you're a Robert B. Parker fan on Matrix, you're welcome to join my public room Fans of Robert B. Parker: matrix.to#/#rbp-fans:m...
You can use Matrix for end-to-end encypted communication. You can use it for fan clubs while you're at it, or vice versa.
You can use Matrix for end-to-end encypted communication. You can use it for fan clubs while you're at it, or vice versa.
March 28, 2025 at 11:48 PM
"We will continue to do our job" is apparently:
-level civilan housing, killing children
-use encypted self-deleting messages to coordinate the plans (prayer emoji)
-moronically include journalists in the said secret plans
-take no accountability
-tweet through it
Shining city on a hill.
-level civilan housing, killing children
-use encypted self-deleting messages to coordinate the plans (prayer emoji)
-moronically include journalists in the said secret plans
-take no accountability
-tweet through it
Shining city on a hill.
March 26, 2025 at 4:24 PM
"We will continue to do our job" is apparently:
-level civilan housing, killing children
-use encypted self-deleting messages to coordinate the plans (prayer emoji)
-moronically include journalists in the said secret plans
-take no accountability
-tweet through it
Shining city on a hill.
-level civilan housing, killing children
-use encypted self-deleting messages to coordinate the plans (prayer emoji)
-moronically include journalists in the said secret plans
-take no accountability
-tweet through it
Shining city on a hill.
True. But even I have trouble reading 4kbit encypted messages…..
This is often lost on the average user. End-to-end encryption only protects against man-in-the-middle attacks, where data is intercepted or manipulated going between users. Once it arrives the data isn't encrypted, thus why MitM attacks are rare. Hackers just work to gain access to the endpoint.
March 26, 2025 at 2:05 PM
True. But even I have trouble reading 4kbit encypted messages…..
Ja, det er sikkert et langt stykke ad vejen, nok. Især hvis man undlader, at bruge Gboard på sit tastatur, da det potentielt kan logge og sende keystrokes, før man overhovedet trykker send og derfor, nok heller ikke er encypted.
Sårbarheder befinder sig tit også i RAM'ne. Men ja der er....
Sårbarheder befinder sig tit også i RAM'ne. Men ja der er....
March 7, 2025 at 4:17 PM
Ja, det er sikkert et langt stykke ad vejen, nok. Især hvis man undlader, at bruge Gboard på sit tastatur, da det potentielt kan logge og sende keystrokes, før man overhovedet trykker send og derfor, nok heller ikke er encypted.
Sårbarheder befinder sig tit også i RAM'ne. Men ja der er....
Sårbarheder befinder sig tit også i RAM'ne. Men ja der er....
#EndFascism #Resist #MakeNazisAfraidAgain #RiseUp #CommunityOrganizing #NoKings #NoMasters
For those doing some real direct action organizing -- please do so off of social media. Make sure your conversations are protected. Use encypted messaging while planning. Or turn phones off in-person.
For those doing some real direct action organizing -- please do so off of social media. Make sure your conversations are protected. Use encypted messaging while planning. Or turn phones off in-person.
February 27, 2025 at 1:45 AM
#EndFascism #Resist #MakeNazisAfraidAgain #RiseUp #CommunityOrganizing #NoKings #NoMasters
For those doing some real direct action organizing -- please do so off of social media. Make sure your conversations are protected. Use encypted messaging while planning. Or turn phones off in-person.
For those doing some real direct action organizing -- please do so off of social media. Make sure your conversations are protected. Use encypted messaging while planning. Or turn phones off in-person.
I do not want to think about the things you must do in your universe. I saw you also hacked my encypted logs.
February 17, 2025 at 1:58 AM
I do not want to think about the things you must do in your universe. I saw you also hacked my encypted logs.
I’ve been enjoying the #EnCypted podcast by Jasper L’Strange (surely that can’t be his real name can it?)
Mostly Mr L’Strange reads classic #ghost stories in his . . . strange . . . quavering voice
But sometimes he reads his own stories ⬇️ which are excellent 💀
podcasts.apple.com/au/podcast/e...
Mostly Mr L’Strange reads classic #ghost stories in his . . . strange . . . quavering voice
But sometimes he reads his own stories ⬇️ which are excellent 💀
podcasts.apple.com/au/podcast/e...
"Strange Bedfellows" by Jasper - EnCrypted: The Classic Horror Podcast - Apple Podcasts
Podcast Episode · EnCrypted: The Classic Horror Podcast · 31/10/2023 · 1h 5m
podcasts.apple.com
February 3, 2025 at 8:22 AM
I’ve been enjoying the #EnCypted podcast by Jasper L’Strange (surely that can’t be his real name can it?)
Mostly Mr L’Strange reads classic #ghost stories in his . . . strange . . . quavering voice
But sometimes he reads his own stories ⬇️ which are excellent 💀
podcasts.apple.com/au/podcast/e...
Mostly Mr L’Strange reads classic #ghost stories in his . . . strange . . . quavering voice
But sometimes he reads his own stories ⬇️ which are excellent 💀
podcasts.apple.com/au/podcast/e...
I don't use it like that. I communicate to friends who live in other countries and with people who I want to stay encypted. are you saying whatsapp really isn't encrypted? if that is true then I need to reassess. but I want to know the facts. I do not used FB (NEVER TRUSTED it from the beginning)
January 24, 2025 at 12:54 AM
I don't use it like that. I communicate to friends who live in other countries and with people who I want to stay encypted. are you saying whatsapp really isn't encrypted? if that is true then I need to reassess. but I want to know the facts. I do not used FB (NEVER TRUSTED it from the beginning)
update: I shoehorned in encypted messaging applications & discovery implications, and it was EXCELLENT. Here's to occasionally updating syllabi to cover neat new topics you want to talk about 👍
so much I want to shoehorn in. there's an infinite number of topics we should totally cover and only 2 weeks to do it in (It's a Wintersession class; I can't handle teaching for a full term bc work)
January 18, 2025 at 3:13 AM
update: I shoehorned in encypted messaging applications & discovery implications, and it was EXCELLENT. Here's to occasionally updating syllabi to cover neat new topics you want to talk about 👍
December 18, 2024 at 12:27 PM
The irony of the FBI telling people to use encypted messaging in light of the nation-state compromise of telecom systems, after spending decades fighting personal encryption because it makes their job more difficult, creates a bitter irony that is nearly impossible to swallow.
December 13, 2024 at 1:54 PM
The irony of the FBI telling people to use encypted messaging in light of the nation-state compromise of telecom systems, after spending decades fighting personal encryption because it makes their job more difficult, creates a bitter irony that is nearly impossible to swallow.
The irony of the FBI telling people to use encypted messaging in light of the nation-state compromise of telecom systems, after spending decades fighting personal encryption because it makes their job more difficult, creates a bitter irony that is nearly impossible to swallow.
December 13, 2024 at 2:15 PM
The irony of the FBI telling people to use encypted messaging in light of the nation-state compromise of telecom systems, after spending decades fighting personal encryption because it makes their job more difficult, creates a bitter irony that is nearly impossible to swallow.
Configurado con ello por defecto, sin importar los ajustes de la red a donde te estes conectando, por defecto solo usan el DNS especificado por el DHCP si no pueden establecer conexión con el encypted DNS de antemano, y aún así una vez tienen conexión lo hacen. A menos que seas un objetivo de un...
December 11, 2024 at 9:12 PM
Configurado con ello por defecto, sin importar los ajustes de la red a donde te estes conectando, por defecto solo usan el DNS especificado por el DHCP si no pueden establecer conexión con el encypted DNS de antemano, y aún así una vez tienen conexión lo hacen. A menos que seas un objetivo de un...