Skype to Support End-to-End Encryption

Looks like Microsoft tries to give more privacy for its users
22 August 2018   199

End-to-end encryption will work for all users of the latest version of Skype installed on devices based on Windows, iOS, macOS, Android and Linux. The option is not enabled by default, it needs to be activated in each new chat.


  • To start an encrypted chat, you need to select a user from the contact list and click "Start a private conversation". The feature works if both parties have the latest version of Skype installed.
  • All calls, messages and files are encrypted before the end of the conversation.
  • End-to-end encryption works only in one conversation and only on the device where it is launched. When you move from smartphone to computer, for example, you will need to start a new chat room to ensure privacy. All previous correspondence will remain on the phone.

Microsoft has already reported on 256-bit AES encryption for Skype. Company started considering end-to-end encryption in the beginning of 2018. On January 12, Microsoft announced a partnership with Open Whisper Systems to create Skype chats protected by end-to-end encryption based on Signal's open source protocol.

Cloudflare to Develop IPFS Gateway

According to the developers, new gateway will allow to create P2P based websites
20 September 2018   80

Cloudflare told about the IPFS gateway, which will allow creating sites based on P2P network. The company said that access to content will be done without having to install special software on the devices.

As a technology feature, Cloudflare experts note decentralization. Using a standard network scheme with servers involves physical storage of data in one place. Hacking the server or damage to communications as a result of an emergency (for example, a natural disaster) will lead to inaccessibility of information or its loss. The same is threatened with information if the server owner has decided to refuse it.

Cloudflare Network
Cloudflare Network

The IPFS gateway combines computers, on each of which some information is stored, to the worldwide network. Therefore, the inaccessibility of one computer does not mean that the content can not be viewed or downloaded. Therefore, the key differences are two:

  1. With IPFS, anyone can freely post information instead of storing it on remote servers and paying for their services.
  2. Requests for access to data are carried out using cryptographic hashing, rather than by IP address. The query data is converted to a series of letters and numbers, by which the system finds the required files. For example, the query for any information will not like "get information that is located at IP address", but the kind "get information with hash sum QmXnnyufdzAWL5CqZ2RnSNgPbvCc1ALT73s6epPrRnZ1Xy". This hash sum is part of the desired file and is on several computers.

The system automatically determines the authenticity of the file. If we take as an example a query with a hash sum QmXnnyufdzAWL5CqZ2RnSNgPbvCc1ALT73s6epPrRnZ1Xy, then when receiving the information it should remain the same. If the hash value differs, then the file has been changed. In other words, the hash-sum can be represented as a unique fingerprint:

IPFS Security
IPFS Security

Supporters of decentralization are also in a number of other companies. Mozilla employees believe that consumers should not be tied to a particular product, brand or platform. In early August 2018, developers published a version of the IoT gateway Things Gateway 0.5. In it, they realized the possibility of loading third-party icons and an interface for complex devices.