312
submitted 1 year ago* (last edited 1 year ago) by maegul@lemmy.ml to c/fediverse@lemmy.ml

URL seems to be wrong ... here's the correct URL

cross-posted from: https://merv.news/post/82405

It will be open source, end to end encrypted using Signal’s double ratchet encryption protocol, and he plans to make it easy for fediverse platforms to integrate it. The beta will release later this month.

He’s also the creator of https://fedidb.org btw

top 23 comments
sorted by: hot top controversial new old
[-] min_fapper@iusearchlinux.fyi 29 points 1 year ago

What's wrong with just using matrix?

[-] maegul@lemmy.ml 18 points 1 year ago

Dunno TBH. It is apparently using the signal protocol, so there's that, and it's being spun out of pixelfed's own IM/DM feature, which is generally all over the place across the fediverse, so it all kinda makes sense I guess.

[-] min_fapper@iusearchlinux.fyi 4 points 1 year ago

That doesn't mean anything. For example, WhatsApp is "using the signal protocol" but is very much a walled garden.

[-] maegul@lemmy.ml 15 points 1 year ago

Sure ... it seems they were making a DM app for their platform and realised that it could be good as a standalone app.

Part of the picture for them is that pixelfed has started to experiment with transferable IDs or authentication, so that you can signup to pixelfed straight with a pre-existing mastodon account. It seems that want the same for this app. So the idea, I'm guessing, would be that if you want to start DMing with someone you know over the fediverse, you can go straight to this app, sign in straight away with your fediverse credentials, get your usual alias and find your friends with their same aliases. If true, I'd imagine that'd make it easier to sort side-load the app with any particular instance.

[-] featured@lemmy.ml 11 points 1 year ago

If you care about privacy and security, matrix has some glaring flaws. The biggest IMO is not currently encrypting metadata, so who you talk to and when is plaintext. The signal protocol encrypts everything, including the meta data.

[-] johntash@eviltoast.org 5 points 1 year ago

How does the server know who to deliver a message to if the metadata is encrypted?

[-] pkulak@beehaw.org 3 points 1 year ago

I care about privacy and security so much that I don’t let a third-party own my chats, encrypted or not. I’m fine with unencrypted metadata on my server that’s in my own home.

[-] lps@masto.1146.nohost.me 1 points 1 year ago

@featured
Better yet, check out simplex chat https://simplex.chat/
It's the best of all...user friendly as well:)

@min_fapper

[-] imattau@dcentralisedmedia.com 1 points 1 year ago

@lps

And it appears to have support on @yunohost - So self hosting should be easy 👍
@featured @min_fapper

[-] Dr_Evil@sh.itjust.works 1 points 1 year ago

Isn't this largely mitigated by running your own homeserver?

[-] thomcat@midwest.social 1 points 1 year ago

That's just privacy, not security.

[-] silverbax@lemmy.world 17 points 1 year ago* (last edited 1 year ago)

I like Daniel's constant work to improve/add features to PixelFed, but he also tends to rush stuff out and then have to fix it later. So personally, I would wait until he's had time to figure out any flaws and bugs.

[-] ComfortablyGlum@sh.itjust.works 5 points 1 year ago

Because I have no knowledge or understanding of programing, can someone please eli5 how an open source program can remain encrypted and secure? Is it just a matter of good faith that jerks won't mess with it or does the encryption programming itself have protections?

[-] TheLordlessBard@sh.itjust.works 13 points 1 year ago

From my understanding, open source encryption is actually better for privacy than closed source, since then you can have external auditors. Basically, encryption is doing a TON of math involving prime numbers, so even if you know the algorithms used, you still won't be able to figure out what the secret (or password) is without using inordinate amounts of computing power.

For more reading, check out Kerkchoff's Principle

[-] ken27238@lemmy.ml 3 points 1 year ago

without using inordinate amounts of computing power.

which is one of the big things behind quantum computing. we will (will, not might) get to a point where QCs can do the math to crack RSA/other large prime-based encryption standards.

[-] scott@lem.free.as 3 points 1 year ago

That's why you add a post-quantum (AKA symmetric) password too.

[-] ken27238@lemmy.ml 1 points 1 year ago

But be careful there have been a few “quantum safe” encryption algorithms proven to not break quantum safe.

[-] ComfortablyGlum@sh.itjust.works 2 points 1 year ago

Thank you. This is helpful!

[-] 2ez@lemmy.beyondcombustion.net 9 points 1 year ago* (last edited 1 year ago)

The encryption software implements math that is designed to be the protection (encryption algorithm). That math is agreed upon by experts, and it gets implemented by software.

Encryption algorithms usually come with an estimated expiration. That is because computer processors become more powerful. Breaking encryption comes down to being able to solve the encryption algorithm quickly. Some algorithms are designed with specific features with certain types of processor architecture in mind, such as to effect the problem solving efficiency.

Encrypted chat messaging services need to upgrade their algorithms over time as processors get more powerful.

Depending on the type of algorithm used, your chat history could be at risk in the future; that is, if someone were to archive those messages and wait for a time when processors can solve the algorithm quickly. Alternatively, the problem solving could be distributed among many powerful computers to increase the number of attempts per second.

However, algorithms such as Signal's add a few more protective layers in the algorithm. The open-source software should be audited, and should have reproducible builds. What that means, is that the app binary that is distributed (such as from an app store) should match exactly one you build from the source code following the instructions.

To summarize many layers of math, and processes (such as validating someone's safety number, and pin numbers on Signal) were designed to protect the data it is encrypting, and who it is communicating that data with.

You cannot trust a vendor on their word, for example, WhatsApp also claims to implement Signal's encryption algorithm, but their source code is not open, so we don't know exactly what is in the binary. We can reverse engineer the binary, and make inferences, but governments and some private organizations love trying to backdoor encryption.

[-] matt@lemmy.world 4 points 1 year ago* (last edited 1 year ago)

Not sure how I feel about this being a standalone app, it already feels like there's so many vying for attention, with IRC, XMPP and Matrix being federated already. While Signal exists, I'm not sure how I feel about it being a walled garden despite being open source.

I do love the idea of it hopefully being added to Fediverse platforms though - even though it makes sense to use an actual messaging app for messaging, it's user expectation that you can just message people on any platform you're on easily, it's something Mastodon desperately needs.

Edit: Really though, what I want to see is an interoperable protocol being picked (Signal is actually one of them, FWIW, the Foundation just doesn't federate with its flagship app due to "user experience and innovation" per Moxie), and then people make their platforms on that, just like how ActivityPub has become the standard for interoperable social media.

[-] OneRedFox@beehaw.org 3 points 1 year ago

Sounds interesting. I'll be sure to keep an eye on how it plays out.

load more comments
view more: next ›
this post was submitted on 05 Aug 2023
312 points (98.4% liked)

Fediverse

17669 readers
3 users here now

A community dedicated to fediverse news and discussion.

Fediverse is a portmanteau of "federation" and "universe".

Getting started on Fediverse;

founded 4 years ago
MODERATORS