“Developers of the Cryptocat application for encrypting communications of activists and journalists have apologized for a critical programming flaw that made it trivial for third parties to decipher group chats. The precise amount of time the vulnerability was active is in dispute, with Cryptocat developers putting it at seven months and a security researcher saying it was closer to 19 months. As a result, activists, journalists, or others who relied on Cryptocat to protect their group chats from government or industry snoops got little more protection than is typically available in standard chat programs.”
Related posts:
Ohio Supreme Court Takes Up Photo Enforcement Kangaroo Courts
Rite Aid joins promotion effort for Obamacare
Man With Down Syndrome Killed By Police Over $11 Movie Ticket
Give a Drunk (or Anyone) a Free Ride Home, Face $500 Fine
Security Theater Marches On With TSA "Freeze Drills"
Marijuana ad pulled from jumbotron at NASCAR Brickyard 400
FBI and Tsarneav: What Did They Know and When Did They Know it?
Whap! Pow! Fans Boot Defense Contractor Out of Marvel Comics
Former Visa Exec Joins BitPay as Chief Compliance Officer
Senator calls for Burger King boycott over tax inversion move to Canada
Should Cities Be in the Business of Issuing Debit Cards? [2013]
Cops Barge Into Home, Take Baby After Parents Seek 2nd Medical Opinion
420,000 People Say Adiós to Spain
Samsung data center fire causes outage, errors on smart TVs, phones
Peter Schiff Goes to Puerto Rico