Australian government tries to block Signal services because Signal doesn't want to share user data with Australian government. Signal says that it is not possible by design because:
"By design, Signal does not have a record of your contacts, social graph, conversation list, location, user avatar, user profile name, group memberships, group titles, or group avatars. The end-to-end encrypted contents of every message and voice/video call are protected by keys that are entirely inaccessible to us..."
Australian government insist on it because they think that some Signal users can be a threat to the Australian national security.
We will see who will win this battle.
For more news and the article:
https://signal.org/blog/setback-in-the-outback/
The purpose of this blog is to share some useful information about information security.
Monday, February 11, 2019
Wednesday, January 16, 2019
IPSec Security Associations (SAs)
You can find a short description of Security Associations (SAs) in IPSec:
SAs are a set of parameters which are required to establish a secure session between two peers.
There are three unique parameter of an SA:
1) Destination IP address (192.168.61.61)
2) Security protocol identifier (ESP)
3) Security parameter index (SPI) (0x631F1A43)
SAs are a set of parameters which are required to establish a secure session between two peers.
There are three unique parameter of an SA:
1) Destination IP address (192.168.61.61)
2) Security protocol identifier (ESP)
3) Security parameter index (SPI) (0x631F1A43)
Labels:
ESP,
IPSec,
SA,
SAs,
Security Associations,
Security parameter index,
SPI,
VPN
Subscribe to:
Posts (Atom)