Australian government tries to block Signal services because Signal doesn't want to share user data with Australian government. Signal says that it is not possible by design because:
"By design, Signal does not have a record of your contacts, social graph, conversation list, location, user avatar, user profile name, group memberships, group titles, or group avatars. The end-to-end encrypted contents of every message and voice/video call are protected by keys that are entirely inaccessible to us..."
Australian government insist on it because they think that some Signal users can be a threat to the Australian national security.
We will see who will win this battle.
For more news and the article:
https://signal.org/blog/setback-in-the-outback/
The purpose of this blog is to share some useful information about information security. The languages used in this blog are Turkish and English. Bu günlüğün temel amacı bilgi güvenliği ile ilgili faydalı bilgileri paylaşmaktır. Günlüğün dili Türkçe ve İngilizce'dir.
Monday, February 11, 2019
Wednesday, January 16, 2019
IPSec Security Associations (SAs)
You can find a short description of Security Associations (SAs) in IPSec:
SAs are a set of parameters which are required to establish a secure session between two peers.
There are three unique parameter of an SA:
1) Destination IP address (192.168.61.61)
2) Security protocol identifier (ESP)
3) Security parameter index (SPI) (0x631F1A43)
SAs are a set of parameters which are required to establish a secure session between two peers.
There are three unique parameter of an SA:
1) Destination IP address (192.168.61.61)
2) Security protocol identifier (ESP)
3) Security parameter index (SPI) (0x631F1A43)
Labels:
ESP,
IPSec,
SA,
SAs,
Security Associations,
Security parameter index,
SPI,
VPN
Subscribe to:
Posts (Atom)