
“Developers of the Cryptocat application for encrypting communications of activists and journalists have apologized for a critical programming flaw that made it trivial for third parties to decipher group chats. The precise amount of time the vulnerability was active is in dispute, with Cryptocat developers putting it at seven months and a security researcher saying it was closer to 19 months. As a result, activists, journalists, or others who relied on Cryptocat to protect their group chats from government or industry snoops got little more protection than is typically available in standard chat programs.”
Related posts:
How Prosecutors Hijacked Grand Juries
The Turing Phone Is Built to Be Unhackable and Unbreakable
Ohio Lawsuit Seeks To Use Court Precedent To Shut Down Speed Cameras
Will The US Really Condemn Terrorism in Syria?
12 Medical marijuana miracles you should know about
Is Actor Johnny Revilla Stateless?
ACLU Appeals Ruling Allowing Feds to Stay Mum on Drone Targeted Killings
Louisiana Supermarket Forced to Increase Milk Price
20 Signs That The Next Great Economic Depression Has Already Started In Europe
As Sanctions Hit Iran's Most Vulnerable, the Man Who Dared to Feed Sanction-Starved Iraq Remains in ...
Dead Letter Office: Even U.S. Government Doesn’t Use the U.S. Postal Service
America’s Race to the Bottom
Bitcoin takes off — on the ground in Berlin
How one guy's $24 investment in bitcoins turned into an $886,000 payday
Texas Town Charging Reporters $79,000 for Emails About Cop Abuse