Published on: 2025-06-07 10:18:23
Elon Musk's X social media platform is rolling out a new version of its direct messaging feature that the platform owner said had a "whole new architecture," but as with many a Muskian proclamation, there's reason to doubt what's been said. Dubbed "XChat" (not to be confused with the venerable Linux/Windows IRC app of the same name), Musk informally announced the feature on Sunday, a few days after the company formerly known as Twitter paused encryption on messaging to make "some improvements."
Keywords: encrypted encryption musk platform xchat
Find related items on AmazonPublished on: 2025-06-08 14:40:55
Elon Musk announced on Sunday that starting soon, you will be able to chat with your friends, family, and war collaborators on X, the everything app. Now, you might be thinking, “I could already do that, Twitter has had direct messages since basically forever.” And you would be right. But you see, this is XChat, Musk’s long-promised “secure” messaging service—though there are some questions as to just how secure it is. Per Musk, XChat (which it appears will simply replace the existing Messages
Keywords: encryption messages musk users xchat
Find related items on AmazonPublished on: 2025-06-11 04:30:40
Elon Musk on Sunday announced that a new version of X’s Direct Messaging (DM) feature, XChat, was rolling out with support for features like vanishing messages, encryption, and the ability to share files, alongside its audio and video calling support. The new features aren’t yet broadly available, as XChat only recently started beta testing among a select group of users. However, Musk said that the X team expects to bring XChat to all users sometime this week, unless they encounter scaling issu
Keywords: bitcoin encryption musk users xchat
Find related items on AmazonPublished on: 2025-06-16 08:13:16
In Brief Social network X said on Thursday that it is pausing its encrypted DMs feature as it works to make some improvements. In a post on X, the company’s engineering account said users will be able to access their existing encrypted messages, but they won’t be able to send new ones. It did not mention when the feature will be available again. After Elon Musk bought Twitter, he announced ambitious plans to overhaul direct messages and compete with privacy-focused messaging service Signal.
Keywords: able available company encrypted feature
Find related items on AmazonPublished on: 2025-06-16 15:57:50
X users can no longer send encrypted messages on the platform. The company said in an update that it's "pausing" the feature "while we work on making some improvements." Users will still be able to view previously-sent encrypted chats, but won't be able to send any new ones. Up to now, encrypted DMs have been available only on messages between verified users who are mutual or who have previously accepted DMs from each other. Screenshots of the feature from X's help center labeled it as "early a
Keywords: company encrypted feature messages xchat
Find related items on AmazonPublished on: 2025-07-01 00:48:54
Microsoft is updating Windows 11 with a set of new encryption algorithms that can withstand future attacks from quantum computers in an attempt to jump-start what’s likely to be the most formidable and important technology transition in modern history. Computers that are based on the physics of quantum mechanics don’t yet exist outside of sophisticated labs, but it’s well-established science that they eventually will. Instead of processing data in the binary state of zeros and ones, quantum com
Keywords: computers encryption microsoft quantum symcrypt
Find related items on AmazonPublished on: 2025-07-04 08:59:43
Let’s Encrypt will no longer include the “TLS Client Authentication” Extended Key Usage (EKU) in our certificates beginning in 2026. Most users who use Let’s Encrypt to secure websites won’t be affected and won’t need to take any action. However, if you use Let’s Encrypt certificates as client certificates to authenticate to a server, this change may impact you. To minimize disruption, Let’s Encrypt will roll this change out in multiple stages, using ACME Profiles: Today : Let’s Encrypt alread
Keywords: authentication client encrypt let tls
Find related items on AmazonPublished on: 2025-07-17 12:15:55
In Brief A Florida bill, which would have required social media companies to provide an encryption backdoor for allowing police to access user accounts and private messages, has failed to pass into law. The Social Media Use by Minors bill was “indefinitely postponed” and “withdrawn from consideration” in the Florida House of Representatives earlier this week. Lawmakers in the Florida Senate had already voted to advance the legislation, but a bill requires both legislative chambers to pass befo
Keywords: encryption florida law media social
Find related items on AmazonPublished on: 2025-07-20 20:46:52
I am fascinated by the world of possibilities that Cloud Computing enables people and organizations to achieve. When it comes to security, tools and frameworks such as the Shared Responsibility Model make following good security practices easier than ever. I am equally fascinated by new attack vectors that Cloud Computing enables bad actors to achieve, though. Not that recently ago, Halcyon put up a really interesting article about a concerning new ransomware campaign targeting Amazon S3 bucket
Keywords: attack aws bucket encryption s3
Find related items on AmazonPublished on: 2025-08-11 00:00:00
Google announced at the beginning of April that it is launching a streamlined tool that will allow business users to easily send “end-to-end encrypted” emails—an effort to address the longstanding challenge of adding additional security protections to email messages. The feature is currently in beta for enterprise users to try out within their own organization. It will then expand to allow Google Workspace users to send end-to-end encrypted emails to any Gmail user. By the end of the year, the f
Keywords: email encrypted end google users
Find related items on AmazonPublished on: 2025-08-28 14:23:30
*Authors in alphabetical order – all contributed equally Abstract Censors worldwide have long censored unencrypted HTTP traffic. In this blog post, we show that a specific HTTP version—unencrypted HTTP/2—is unaffected by censorship in China and Iran. We access otherwise censored websites in both countries over unencrypted HTTP/2. Despite no web browser implementing unencrypted HTTP/2, we detect that up to 6.28% of websites support unencrypted HTTP/2 traffic. To aid the community and ease futur
Keywords: censorship http support unencrypted upgrade
Find related items on AmazonPublished on: 2025-09-06 19:09:58
Unmasking EncryptHub: Help from ChatGPT & OPSEC blunders Research & Threat Intel Written By KrakenLabs Threat Intelligence Team, Outpost24 This is the second part of Outpost24’s KrakenLabs investigation into EncryptHub, an up-and-coming cybercriminal who has been gaining popularity in recent months and is heavily expanding and evolving operations at the time of writing. We’ve already published one article explaining EncryptHub’s campaigns and TPPs, infrastructure, infection methods, and target
Keywords: 2025 chatgpt encrypthub security used
Find related items on AmazonPublished on: 2025-09-12 08:16:49
When Google announced Tuesday that end-to-end encrypted messages were coming to Gmail for business users, some people balked, noting it wasn’t true E2EE as the term is known in privacy and security circles. Others wondered precisely how it works under the hood. Here’s a description of what the new service does and doesn’t do, as well as some of the basic security that underpins it. When Google uses the term E2EE in this context, it means that an email is encrypted inside Chrome, Firefox, or jus
Keywords: alice certificate encrypted means mime
Find related items on AmazonPublished on: 2025-09-13 04:16:49
When Google announced Tuesday that end-to-end encrypted messages were coming to Gmail for business users, some people balked, noting it wasn’t true E2EE as the term is known in privacy and security circles. Others wondered precisely how it works under the hood. Here’s a description of what the new service does and doesn’t do, as well as some of the basic security that underpins it. When Google uses the term E2EE in this context, it means that an email is encrypted inside Chrome, Firefox, or jus
Keywords: alice certificate encrypted means mime
Find related items on AmazonPublished on: 2025-09-16 15:16:00
What just happened? Google is celebrating Gmail's 21st birthday by introducing new encryption features for enterprise users. The company's latest security system aims to simplify encryption options for businesses of all sizes while providing IT departments with the tools to maintain information integrity. Other updates from this week improved Google Chrome's encryption and allowed Google Fi subscribers to send encrypted RCS messages to iPhones. Starting today, IT departments participating in Go
Keywords: encryption gmail google messages security
Find related items on AmazonPublished on: 2025-09-16 20:16:00
What just happened? Google is celebrating Gmail's 21st birthday by introducing new encryption features for enterprise users. The company's latest security system aims to simplify encryption options for businesses of all sizes while providing IT departments with the tools to maintain information integrity. Other updates from this week improved Google Chrome's encryption and allowed Google Fi subscribers to send encrypted RCS messages to iPhones. Starting today, IT departments participating in Go
Keywords: encryption gmail google messages security
Find related items on AmazonPublished on: 2025-09-18 16:40:48
Signal / Elyse Betters Picaro / ZDNET Privacy is no longer just a buzzword -- it's entrenched in the ethos of society. But when it comes to getting serious about privacy, the big question is whether consumers are ready to switch from what they currently use to a more private option. And, boy, are there options. Pick up a stone and toss it in a pond filled with apps and services, and you will almost certainly hit one that promises privacy, security, and (sometimes) anonymity for your communicat
Keywords: app email encryption signal use
Find related items on AmazonPublished on: 2025-09-19 04:00:14
Pavlo Gonchar/SOPA Images/LightRocket via Getty Images Strong encryption is the foundation of just about every security and privacy-related feature in the modern computing landscape. Your smartphone is encrypted by default, so its contents are only available when you unlock it with biometrics or a PIN. Your Windows PC is encrypted with BitLocker, and your MacBook is encrypted with FileVault. Also: How I got 15GB of Gmail storage for free - and without losing any files Every webpage you visit
Keywords: email encrypted gmail google recipient
Find related items on AmazonPublished on: 2025-09-19 04:00:00
Google is updating Gmail to allow enterprise users to send encrypted messages to any inbox in just a few clicks. Google says it’s developed a new encryption model that, unlike the current encryption feature on Gmail, doesn’t require senders or recipients to use custom software or exchange encryption certificates. The feature is rolling out in beta starting today, and will initially be available for Google enterprise users to send encrypted emails to other Gmail users within the same organizatio
Keywords: emails encryption gmail google users
Find related items on AmazonPublished on: 2025-09-21 18:05:00
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Last August, the National Institute of Standards and Technology (NIST) released the first three “post-quantum encryption standards” designed to withstand an attack from a quantum computer. For years, cryptography experts have worried that the advent of quantum computing could spell doom for traditional encryption methods. With the technology now firmly on the horizon, t
Keywords: computing encryption quantum technology use
Find related items on AmazonPublished on: 2025-09-22 20:00:00
is a reviewer with 10 years of experience writing about consumer tech. She has a special interest in mobile photography and telecom. Previously, she worked at DPReview. If you hadn’t heard of Signal before this week, chances are you’re well aware of it now. The messaging app was thrust into the news on Monday when The Atlantic’s editor-in-chief, Jeffrey Goldberg, was mistakenly added to a group chat involving top military officials planning an airstrike. Even though it entered the discourse for
Keywords: encryption end information messages signal
Find related items on AmazonPublished on: 2025-09-29 14:51:32
A threat actor known as EncryptHub has been linked to Windows zero-day attacks exploiting a Microsoft Management Console vulnerability patched this month. Uncovered by Trend Micro staff researcher Aliakbar Zahravi, this security feature bypass (dubbed 'MSC EvilTwin' and now tracked as CVE-2025-26633) resides in how MSC files are handled on vulnerable devices. Attackers can leverage the vulnerability to evade Windows file reputation protections and execute code because the user is not warned be
Keywords: attacks encrypthub files msc vulnerability
Find related items on AmazonPublished on: 2025-09-29 19:51:32
A threat actor known as EncryptHub has been linked to Windows zero-day attacks exploiting a Microsoft Management Console vulnerability patched this month. Uncovered by Trend Micro staff researcher Aliakbar Zahravi, this security feature bypass (dubbed 'MSC EvilTwin' and now tracked as CVE-2025-26633) resides in how MSC files are handled on vulnerable devices. Attackers can leverage the vulnerability to evade Windows file reputation protections and execute code because the user is not warned be
Keywords: attacks encrypthub files msc vulnerability
Find related items on AmazonPublished on: 2025-09-30 02:45:01
Internet discussions about end-to-end encryption are plagued by misunderstandings, misinformation, and some people totally missing the point. Of course, people being wrong on the Internet isn’t exactly news. XKCD: Duty Calls “What do you want me to do? LEAVE? Then they’ll keep being wrong!” Yesterday, a story in The Atlantic alleged that the Trump Administration accidentally added their editor, Jeffrey Goldberg, to a Signal group chat discussing a military action in Yemen. This was quickl
Keywords: app encryption end security signal
Find related items on AmazonPublished on: 2025-10-01 15:43:53
A new multi-platform ransomware-as-a-service (RaaS) operation named VanHelsing has emerged, targeting Windows, Linux, BSD, ARM, and ESXi systems. VanHelsing was first promoted on underground cybercrime platforms on March 7, offering experienced affiliates a free pass to join while mandating a deposit of $5,000 from less experienced threat actors. The new ransomware operation was first documented by CYFIRMA late last week, while Check Point Research performed a more in-depth analysis published
Keywords: check encryption file point vanhelsing
Find related items on AmazonPublished on: 2025-10-03 06:35:11
In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking. Despite heavy pressure from the Interior Ministry, lawmakers voted Thursday night (article in French) to strike down a provision that would have forced messaging platforms like Signal and WhatsApp to allow hidden access to private co
Keywords: encryption french private provision rights
Find related items on AmazonPublished on: 2025-10-03 11:35:11
In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking. Despite heavy pressure from the Interior Ministry, lawmakers voted Thursday night (article in French) to strike down a provision that would have forced messaging platforms like Signal and WhatsApp to allow hidden access to private co
Keywords: encryption french private provision rights
Find related items on AmazonPublished on: 2025-10-11 12:48:09
Yesterday, Apple announced that it will be supporting RCS Universal Profile 3.0 in “future software updates.” While this does have one large benefit of bringing end-to-end encryption to iPhone users using RCS, it has a number of other benefits that aren’t yet being mentioned. When Apple introduced RCS messaging to iPhone as part of iOS 18, it supported version 2.4. This still introduced a number of quality of life improvements for texting Android users, such as higher quality images, read recei
Keywords: apple encryption end rcs version
Find related items on AmazonPublished on: 2025-10-13 11:16:26
Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to retrieve the decryption key and unlock files for free. Nugroho developed the decryptor after being asked for help from a friend, deeming the encrypted system solvable within a week, based on how Akira generates encryption keys using timestamps. The project ended up taking three weeks due to unforeseen complexities, and the researcher spent $1,200 on GPU resources
Keywords: encrypted encryption files key keys
Find related items on AmazonPublished on: 2025-10-14 00:48:09
Yesterday, Apple announced that it will be supporting RCS Universal Profile 3.0 in “future software updates.” While this does have one large benefit of bringing end-to-end encryption to iPhone users using RCS, it has a number of other benefits that aren’t yet being mentioned. When Apple introduced RCS messaging to iPhone as part of iOS 18, it supported version 2.4. This still introduced a number of quality of life improvements for texting Android users, such as higher quality images, read recei
Keywords: apple encryption end rcs version
Find related items on AmazonGo K’awiil is a project by nerdhub.co that curates technology news from a variety of trusted sources. We built this site because, although news aggregation is incredibly useful, many platforms are cluttered with intrusive ads and heavy JavaScript that can make mobile browsing a hassle. By hand-selecting our favorite tech news outlets, we’ve created a cleaner, more mobile-friendly experience.
Your privacy is important to us. Go K’awiil does not use analytics tools such as Facebook Pixel or Google Analytics. The only tracking occurs through affiliate links to amazon.com, which are tagged with our Amazon affiliate code, helping us earn a small commission.
We are not currently offering ad space. However, if you’re interested in advertising with us, please get in touch at [email protected] and we’ll be happy to review your submission.