156
submitted 3 days ago* (last edited 3 days ago) by collar@lemmy.world to c/privacy@lemmy.ml

Happy to see a privacy-focused carrier, and it has better policies than any other carrier out there. But founder is formerly from Palantir and there’s a lot of VC money behind it (not inherently a problem, just flagging).

Thoughts?

you are viewing a single comment's thread
view the rest of the comments
[-] gravitywell@sh.itjust.works 12 points 2 days ago

Because they literally operated it as a honeypot and gave police full access to chats while advertising to criminals that it was safe.

EncroChat first came to the attention of the media when it was revealed that high-profile criminals Mark Fellows and Steven Boyle had been using the encrypted devices to communicate during the May 2018 gangland murder of John Kinsella in Rainhill, England.[16][9][17] The service resurfaced in the media during the summer of 2020 after law enforcement agencies announced that they had infiltrated the encrypted network and investigative journalist Joseph Cox, who had been reviewing EncroChat for months, published an exposé in Vice Motherboard

[-] ivn@jlai.lu 2 points 2 days ago

Where did you read that they gave police full access? I thought they were hacked.

[-] gravitywell@sh.itjust.works 10 points 2 days ago* (last edited 2 days ago)

That's even worse then because they didn't even have a secure network from start. Be it willful ignorance or intentional assistance, its still a honeypot. This was a huge "I told you so" by a lot of the dark net community when it happened, a lot of people called it WAY ahead of time.

Encrochat isn't the only example, so i may have conflated it with one of these other Honeypot operations: ANOM, Phantom Secure , Ghost , SkyECC

You might be able to see a pattern here. People who actually want security and anonymity know that you can't trust those things over to a corporation or a bunch of tech broligarchs, they will either betray you intentionally or due to their incompetence.

[-] ivn@jlai.lu 5 points 2 days ago

I don't see how being hacked make it "still a honeypot".

[-] gravitywell@sh.itjust.works 1 points 2 days ago* (last edited 2 days ago)

because it was being used to attract criminals into thinking it was a safe and legitimate service, while under theee surface it was relaying all the messages to law enforcement.

[-] ivn@jlai.lu 3 points 2 days ago

Yes but

  1. as far as we know they had no idea that it was hacked, so I don't see how you can get a "vibe" if they are blind to it
  2. the criminals were already using it when LE discovered it and then hacked into it
[-] gravitywell@sh.itjust.works 2 points 2 days ago* (last edited 2 days ago)

I guess we have different definitions of what a honeypot is then. I dont think it has to start as a honeypot to qualify as one once law enforcement is involved.

There are countless examples of this kind of infiltration on other services. you can call it something else but either way i think youd have to be a fool to trust an operation like that to be in any way secure from monitoring by law enforcement.

this post was submitted on 02 Oct 2025
156 points (94.3% liked)

Privacy

42293 readers
1179 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS