Hacker Newsnew | past | comments | ask | show | jobs | submit | kbns's commentslogin

While I understand the challenges with SMTP-based email, dismissing privacy concerns as ignorance is unhelpful. It's not at all a technical difficulty—Modern threats demand updated solutions, and opportunistic-TLS isn't enough. Financial incentives and data monetization do play a role in the reluctance of major providers. If new protocols can secure chat apps, similar efforts should be made for email.

Users deserve better privacy protections despite historical constraints.


> It's not at all a technical difficult

Tell us how you'd implement it and be backwards compatible with existing SMTP servers.

> Financial incentives and data monetization do play a role in the reluctance of major providers.

Do you have evidence that they're preventing E2E SMTP from becoming an RFC?


including quora.


quora is ccp owned by now?


use 'before:$year' ( eg. "funny clips before:2018" ) is our current saviour.


Is there a key to restrict the search results to a specific channel?


Thank you. Since i'm using this to encrypt backups, speed is not a problem.


"roll your own crypto" means writing a new encryption scheme. But here i'm just using multiple schemes without connection to one another by using different encryption keys.

What if AES-256 gets compromised?

Basically i'm storing my encrypted data online. Anyone can see it but only i can decrypt it.


You *are* inventing a new crypto algorithm.

A symmetric cipher is a permutation, multiple symmetric ciphers in sequence is still a permutation. There has been no analysis done on the latter to determine if the sequence you use hides a weakness. I'd much prefer a well analysed system to an unanalysed one.


> multiple symmetric ciphers in sequence is still a permutation.

No its not. The data feeding to the next algorithm is an already encrypted data from the previous algorithm. Theres 0 connection b/w them.

For example . step 1 . encrypt message (M) with key (K1) using AES to produce cipher text (C1) step 2 . encrypt message C1 with key K2 using TripleDES to produce C2. step n . and so on using all algorithms with different Keys.

I don't see any connections b/w them. 0 entropy. Please correct me if i'm wrong.


It's still a permutation: shuffling a deck of cards again doesn't make it any more random (apologies to Diaconis). A symmetric cipher is just a shuffle -- no more, no less. Sure, it "feels" unlikely that there would be a problem but can you prove that or prove at least some level of confidence in it?

The bottom line is just AES is good enough. Your data almost certainly isn't worth the effort involved for an attacker even if there was a substantial breakthrough against AES. If it was worth enough, there are far cheaper and easier ways to get access than breaking the crypto: https://xkcd.com/538/

Modern symmetric crypto is secure enough: any problems you hear about are not in the algorithms. Cracking crypto as seen in movies is a complete fiction, it doesn't work like that.

I suggest reading some introductory texts on cryptography to fill knowledge gaps.


Thank you. i will learn more about it.


Bing is going to do the same.


sad to see people are genuinely thrilled to gift it to their loved ones.


They are talking about a different product


cool. e2e encryption would be great..


End to end encryption is already fully designed and partially implemented. I just had a baby and have no time to do it recently: https://github.com/binwiederhier/ntfy/issues/69


If I run ntfy behind NGINX reverse proxy which is on https, isn't that E2E encrypted due to https?


No, because your Nginx server decrypts that TLS connection so can access the plaintext data. This is typically called encrypted-in-transit.

E2EE means that it's always encrypted from the sending device to the receiving device and nothing in the middle (including the service operator) can read it.


E2E implies that the data itself gets encrypted by the sender and is only decrypted by the receiver. With https, the "pipe" is encrypted, but the data is not and the server will get the plain-text.


will check. congratulations.


depends on the speedQ


Whats wrong with promoting own drug by providing incentives?


I do bot think it is wrong, as long as the dr. tells me, when he gives me the medication, that he is being paid for that by the producer.


Yeah, what's wrong with Purdue Pharma providing incentives to doctors to prescribe OxyContin?

A little opioid epidemic never hurt nobody.


Veering away from Dolo 650 to the topic of opioids.

The pain of pain relief.

Are the deaths form Oxytocin classed as Iatrogenic, that is caused by medical care, since it over comes the “Just say No mindset?”

The damage is huge, to the people set up with it but to the overall reputation of medicine in the USA being so deeply co-opted by the company.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: