<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://articles.59.ca/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>The Call of the Open Sidewalk - em</title>
        <description>From a place slightly to the side of the more popular path</description>
        <link>https://articles.59.ca/</link>
        <lastBuildDate>Tue, 14 Apr 2026 23:17:27 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://articles.59.ca/lib/exe/fetch.php?media=wiki:logo.png</url>
            <title>The Call of the Open Sidewalk</title>
            <link>https://articles.59.ca/</link>
        </image>
        <item>
            <title>2048 Bit RSA and the Year 2030</title>
            <link>https://articles.59.ca/doku.php?id=em:20482030</link>
            <description>2048 Bit RSA and the Year 2030

Update: NIST released a draft that modified their recommendations (Oct 2024). RSA 2048 is to be only  considered “deprecated” after 2030. The draft states:

	&quot;Currently, a 112-bit security strength for the classical digital signature and key-establishment algorithms does not appear to be in imminent danger of becoming insecure in the near future, so this approach should allow an orderly transition to quantum-resistant algorithms without unnecessary effort for the …</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 22 Nov 2024 23:01:44 +0000</pubDate>
        </item>
        <item>
            <title>Email is Reasonably Anonymous</title>
            <link>https://articles.59.ca/doku.php?id=em:anonemail</link>
            <description>Email is Reasonably Anonymous

It is often heard that email leaks lots of meta data. Back in the day email used to be sent unencrypted over the network. An entity with access to that network traffic could easily determine where the email was coming from, where it was going to and the email addresses involved.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 22 Sep 2021 14:20:43 +0000</pubDate>
        </item>
        <item>
            <title>Message Burning in Encrypted Messaging</title>
            <link>https://articles.59.ca/doku.php?id=em:burn</link>
            <description>Message Burning in Encrypted Messaging

A message is “burnt” when an old message becomes entirely inaccessible to anyone. The term works for almost all cultures; the idea of destroying information by setting fire to the paper substrate that holds it is fairly much universal.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 02 Dec 2021 11:37:09 +0000</pubDate>
        </item>
        <item>
            <title>Encrypted Email is More Secure than Encrypted Instant Messaging</title>
            <link>https://articles.59.ca/doku.php?id=em:emailvsim</link>
            <description>Encrypted Email is More Secure than Encrypted Instant Messaging

In general the point I am attempting here is:

End to end encryption is more secure when used offline in a safe environment.

An end to end encryption system requires a critical secret to be effective. This secret has to be available to the user but not to anyone else. Loss of the secret usually means exposure of the encrypted messages.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 22 Jan 2021 17:23:41 +0000</pubDate>
        </item>
        <item>
            <title>Encrypted Messaging</title>
            <link>https://articles.59.ca/doku.php?id=em:index</link>
            <description>Encrypted Messaging

Encrypted Messaging RSS Feed

Discussion of various topics related to encrypted messaging in general...

	*  Why Johnny Can&#039;t Encrypt: A Brief Discussion
	*  Message Burning in Encrypted Messaging
	*  Encrypted Email is More Secure than Encrypted Instant Messaging
	*  Email is Reasonably Anonymous
	*  End to End Encrypted Messaging in the News: An Editorial Usability Case Study

Editorial

	*  2048 Bit RSA and the Year 2030</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 14 Apr 2025 21:02:15 +0000</pubDate>
        </item>
        <item>
            <title>End to End Encrypted Messaging in the News: An Editorial Usability Case Study</title>
            <link>https://articles.59.ca/doku.php?id=em:sg</link>
            <description>End to End Encrypted Messaging in the News: An Editorial Usability Case Study

Recently (2025 March) a reporter was added to a Signal Messenger group intended for members of the United States of America (USA) government, apparently by accident. So this is a really good time to talk about identity in end to end encrypted (E2EE) messaging with this event as the practical example. This event became hugely political and politics in the USA are well covered around the world right now so most people h…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 15 Apr 2025 22:11:39 +0000</pubDate>
        </item>
        <item>
            <title>Why Johnny Can&#039;t Encrypt: A Brief Discussion</title>
            <link>https://articles.59.ca/doku.php?id=em:wjce</link>
            <description>Why Johnny Can&#039;t Encrypt: A Brief Discussion

In 1999, Alma Whitten and J. D. Tygar released a paper called “Why Johnny Can&#039;t Encrypt”(WJCE). It is about the usability of software that performs a security function. The important point made is that the effective use of such software can require some amount of fundamental understanding of the security system employed. A well designed graphical user interface might not be enough.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 21 Jul 2025 12:32:57 +0000</pubDate>
        </item>
    </channel>
</rss>
