255
you are viewing a single comment's thread
view the rest of the comments
[-] jeena@jemmy.jeena.net 134 points 9 months ago

I don't understand why the article writes that iMessage is the only way for encrypted messaging between Android and iOS. I can thing of several off the top of my head:

  • Matrix
  • Signal
  • WhatsApp
  • Facebook Messanger (very soon)
  • Threema
  • Telegram
  • Viber
  • Line
  • Skype

And there are surly more ...

[-] eager_eagle@lemmy.world 56 points 9 months ago* (last edited 9 months ago)

cause of lazy iOS users that can't be bothered to use anything else

[-] possiblylinux127@lemmy.zip 31 points 9 months ago* (last edited 9 months ago)

Most of those are proprietary. My list:

  • Matrix
  • Session
  • Signal and signal clients
  • Simplex Chat
  • Jami
  • Briar (android only)
  • Nextcloud talk (needs nextcloud)
  • probably a lot more
[-] vrighter@discuss.tchncs.de 9 points 9 months ago

telegram is not encrypted by default, and does its best to make you forget to enable it for each individual contact. if you want to do a group chat, you're out of luck.

Telegram is only (partially) secure for pedantic power users, which most people aren't.

[-] notenoughbutter@lemmy.ml -2 points 9 months ago

telegram is encrypted, but not end to end encrypted by default

[-] vrighter@discuss.tchncs.de 9 points 9 months ago* (last edited 9 months ago)

so, relative to pretty much all other messaging services, it might as well not be.

You're saying "by default not everyone can read your messages, only you, the recipient, telegram themselves and anyone who they might decide to share them with, with neither your consent, nor knowledge"

When compared to "nobody except you and the recipient" that becomes effectively equivalent to "nothing".

also, not end-to-end ever when it comes to group chats

[-] Liquid_Fire@lemmy.world 1 points 9 months ago

Almost all services in that list are closed source, so even if they use end-to-end encryption nothing stops the client from sending all your messages to anyone they like after decrypting (in fact some of them already have it as a built-in feature in the form of backups).

[-] vrighter@discuss.tchncs.de 3 points 9 months ago

that would be very quickly caught by a network sniffer, because it would have to be sent from your own device. Otherwise they'd just be sharing the undecryptable ciphertext you sent to their servers

[-] Liquid_Fire@lemmy.world 1 points 9 months ago

Just encrypt it before sending it to their servers. How would you tell that apart from any other traffic it sends? (E.g. to check for new messages, to update who of your contacts is online, etc)

[-] vrighter@discuss.tchncs.de 2 points 9 months ago* (last edited 9 months ago)

what does that have to do with anything? if you have to encrypt your messages manually yourself, that kind of proves the point that the service itself is not secure. And it'll still show up on a network sniffer that they're sending it to two places

[-] Liquid_Fire@lemmy.world 1 points 9 months ago* (last edited 9 months ago)

Ok, let me break it down because clearly I didn't explain it well.

What is supposed to happen, scenario 1: the client encrypts your messages with the public key of the recipient, sends it to the servers of WhatsApp (or whatever service) along with some encrypted metadata indicating the recipient, which then forward the message to the recipient.

What could happen, scenario 2: the client does the same, but also encrypts another copy of your message with a public key that belongs to WhatsApp, and send both versions to the WhatsApp servers. They decrypt and keep the second version while forwarding the first one to the recipient.

Or, scenario 3: they just never bother with end-to-end encryption, and always encrypt it with the WhatsApp key, still sending it to their servers which then reencrypt with the recipient's key before forwarding.

In all cases, messages are sent only to the WhatsApp servers, not two places. The only visible difference is in scenario 2 where the communication is larger. You can't inspect the metadata of the message with your network sniffer, because it is also encrypted, so there's no way to rule out scenario 3.

If the protocol is designed to be transparent by not encrypting the entire payload sent to the servers, and you have access to the recipient's private key (those are big ifs) then you could show that there is indeed an end-to-end encrypted message in there. But this is true for how many of these proprietary services? Maybe for WhatsApp.

[-] soulfirethewolf@lemdro.id 5 points 9 months ago

Technically, yes, this is a solution.

Socially, no. This is not a solution. People are just too lazy.

[-] jeena@jemmy.jeena.net 4 points 9 months ago

I assume that if people are too lazy to switch to a solution which works for every one then they are not very interested in talking to you anyway.

[-] Mongostein@lemmy.ca 3 points 9 months ago* (last edited 9 months ago)

Except it’s not a solution that works for everyone. It’s 9 solutions. If it were one it would be a lot easier.

7 once you take out the ones owned by Facebook.

this post was submitted on 10 Dec 2023
255 points (96.0% liked)

Android

17353 readers
498 users here now

The new home of /r/Android on Lemmy and the Fediverse!

Android news, reviews, tips, and discussions about rooting, tutorials, and apps.

🔗Universal Link: !android@lemdro.id


💡Content Philosophy:

Content which benefits the community (news, rumours, and discussions) is generally allowed and is valued over content which benefits only the individual (technical questions, help buying/selling, rants, self-promotion, etc.) which will be removed if it's in violation of the rules.


Support, technical, or app related questions belong in: !askandroid@lemdro.id

For fresh communities, lemmy apps, and instance updates: !lemdroid@lemdro.id

💬Matrix Chat

💬Telegram channels / chats

📰Our communities below


Rules

  1. Stay on topic: All posts should be related to the Android OS or ecosystem.

  2. No support questions, recommendation requests, rants, or bug reports: Posts must benefit the community rather than the individual. Please post to !askandroid@lemdro.id.

  3. Describe images/videos, no memes: Please include a text description when sharing images or videos. Post memes to !androidmemes@lemdro.id.

  4. No self-promotion spam: Active community members can post their apps if they answer any questions in the comments. Please do not post links to your own website, YouTube, blog content, or communities.

  5. No reposts or rehosted content: Share only the original source of an article, unless it's not available in English or requires logging in (like Twitter). Avoid reposting the same topic from other sources.

  6. No editorializing titles: You can add the author or website's name if helpful, but keep article titles unchanged.

  7. No piracy or unverified APKs: Do not share links or direct people to pirated content or unverified APKs, which may contain malicious code.

  8. No unauthorized polls, bots, or giveaways: Do not create polls, use bots, or organize giveaways without first contacting mods for approval.

  9. No offensive or low-effort content: Don't post offensive or unhelpful content. Keep it civil and friendly!

  10. No affiliate links: Posting affiliate links is not allowed.

Quick Links

Our Communities

Lemmy App List

Chat and More


founded 1 year ago
MODERATORS