Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Tech»Hacking Group Cult of the Dead Cow Develops Veilid, an End-to-End Encryption System for Social Media and Messaging Apps

    Hacking Group Cult of the Dead Cow Develops Veilid, an End-to-End Encryption System for Social Media and Messaging Apps

    By NotesleuNo Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    San Francisco, – The renowned technology activist group, Cult of the Dead Cow (cDc), formerly known for distributing hacking tools and advocating for improved security measures, has shifted its focus towards the development of a groundbreaking system. Veilid, pronounced “vay-lid,” is a coding framework designed to enable app developers to create messaging and social networking applications that prioritize user privacy by avoiding the retention of personal data.

    Veilid utilizes strong end-to-end encryption, akin to platforms like Signal for text messages and voice calls, and Tor for anonymous web browsing. The new system aims to provide a solid foundation for messaging, file sharing, and social networking applications without data harvesting, making interception of user information difficult, even for governments.

    The developers of Veilid plan to present the project at the prestigious Def Con hacking conference in Las Vegas next week. The system will foster encrypted content transfer between applications using the Veilid protocol. Adopting a decentralized “peer-to-peer” network model, similar to BitTorrent, where data is shared among devices rather than from a central server, Veilid is expected to become faster and more efficient as more devices join the network.

    While developers may charge for Veilid-compatible apps or implement advertising, the potential revenue streams are constrained by the inability to collect detailed user information, a practice that has been central to targeted advertising and product marketing.

    Although the team behind Veilid has not released detailed documentation explaining the design choices, and an initial messaging app that works without requiring a phone number is still in development, the project gains momentum in a climate of discontent among social network and chat users who are increasingly critical of platforms like Twitter and Facebook. Moreover, Veilid aligns with the resistance against governmental efforts, such as Britain’s Online Safety Bill, to undermine strong encryption by demanding content disclosure or user identities.

    Prominent civil rights activists, as well as supporters of abortion rights, have also expressed concern over law enforcement agencies’ use of text messages and Facebook Messenger to investigate abortion-related cases in states with restricted access to the procedure.

    Cindy Cohn, the executive director of the nonprofit Electronic Frontier Foundation, praised the development of an all-encompassing end-to-end encryption framework, stating, “We can move past the surveillance business model.”

    The FBI declined to comment on the matter, though law enforcement agencies often express concerns that end-to-end encryption hampers their ability to detect criminal plots and gather evidence.

    Veilid marks a significant release from Cult of the Dead Cow, the most enduring and influential U.S. hacking group, known for coining the term “hacktivism” by merging hacking and activism. Emerging from humble beginnings on pre-web bulletin boards in the 1980s, the group now comprises some of the most prominent figures in the field of cybersecurity. Notably, some of its members were among the first to publicly expose security vulnerabilities in widely used software and coordinate with vendors to patch the identified flaws.

    As the development of Veilid continues to unfold, it promises to revolutionize the landscape of digital communication, championing user privacy and challenging conventional surveillance practices.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 56
    Featured
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleElon Musk’s Ambitious Vision for ‘Everything App’ Takes Inspiration from China’s WeChat
    Next Article Microsoft Intensifies Commitment to Generative AI with Copilot Pricing and New AI Skills

    Related Posts

    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Tech December 26, 2025

    Google Introduces New Features Empowering Users to Manage Online Information

    December 26, 2025
    Tech December 26, 2025

    “I Had a Dream” and Generative AI Jailbreaks

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.