{"id":12888,"date":"2023-08-03T21:11:41","date_gmt":"2023-08-03T21:11:41","guid":{"rendered":"https:\/\/bigjimindustries.com\/wordpress\/?p=12888"},"modified":"2023-08-12T21:13:57","modified_gmt":"2023-08-12T21:13:57","slug":"cult-of-the-dead-cow-now","status":"publish","type":"post","link":"https:\/\/bigjimindustries.com\/wordpress\/2023\/08\/03\/cult-of-the-dead-cow-now\/","title":{"rendered":"Cult of the Dead Cow Now"},"content":{"rendered":"\n<p><em><a href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/08\/02\/encryption-dead-cow-cult-apps-def-con\/\" data-type=\"link\" data-id=\"https:\/\/www.washingtonpost.com\/technology\/2023\/08\/02\/encryption-dead-cow-cult-apps-def-con\/\" target=\"_blank\" rel=\"noreferrer noopener\">from The Washington Post<\/a><\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Hacking group plans system to encrypt social media and other apps<\/h1>\n\n\n\n<p>Story by Joseph Menn<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><a href=\"https:\/\/www.msn.com\/en-us\/news\/technology\/hacking-group-plans-system-to-encrypt-social-media-and-other-apps\/ar-AA1eGsls?fullscreen=true#image=1\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/AA1eGuXO.img?w=768&amp;h=512&amp;m=6\" alt=\"Hacking group plans system to encrypt social media and other apps\" title=\"Hacking group plans system to encrypt social media and other apps\"\/><\/a><figcaption class=\"wp-element-caption\">Hacking group plans system to encrypt social media and other apps \u00a9\u00a0Tom Brenner\/For the Washington Post<\/figcaption><\/figure>\n\n\n\n<p>SAN FRANCISCO \u2014 Once known for distributing hacking tools and shaming software companies into improving their security, a famed group of technology activists is now working to develop a system that will allow the creation of messaging and social networking apps that won\u2019t keep hold of users\u2019 personal data.<\/p>\n\n\n\n<p>The group, Cult of the Dead Cow, has developed a coding framework that can be used by app developers who are willing to embrace strong encryption and forsake revenue from advertising that is targeted to individuals based on detailed profiles gleaned from the data most apps now routinely collect.<\/p>\n\n\n\n<p>The team is building on the work of such free products as Signal, which offers strong encryption for text messages and voice calls, and Tor, which offers anonymous web surfing by routing traffic through a series of servers to disguise the location of the person conducting the search.<\/p>\n\n\n\n<p>The latest effort, to be detailed at the massive annual Def Con hacking conference in Las Vegas next week, seeks to provide a foundation for messaging, file sharing and even social networking apps without harvesting any data, all secured by the kind of end-to-end encryption that makes interception hard even for governments.<\/p>\n\n\n\n<p>[ <a href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/08\/02\/encryption-dead-cow-cult-apps-def-con\/\" data-type=\"link\" data-id=\"https:\/\/www.washingtonpost.com\/technology\/2023\/08\/02\/encryption-dead-cow-cult-apps-def-con\/\" target=\"_blank\" rel=\"noreferrer noopener\">click to continue reading at WaPo<\/a> ]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>from The Washington Post Hacking group plans system to encrypt social media and other apps Story by Joseph Menn SAN FRANCISCO \u2014 Once known for distributing hacking tools and shaming software companies into improving their security, a famed group of technology activists is now working to develop a system that will allow the creation of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-12888","post","type-post","status-publish","format-standard","hentry","category-culture-art"],"_links":{"self":[{"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/posts\/12888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/comments?post=12888"}],"version-history":[{"count":0,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/posts\/12888\/revisions"}],"wp:attachment":[{"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/media?parent=12888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/categories?post=12888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/tags?post=12888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}