27
submitted 2 weeks ago* (last edited 2 weeks ago) by Kualk@lemm.ee to c/privacy@lemmy.ml

I don’t want to see PGP rejection based on usability. So, to level the field at user level we take Delta Chat, which uses PGP. If I understand that correctly.

I have no knowledge of telegram security at all.

top 22 comments
sorted by: hot top controversial new old
[-] SnotFlickerman@lemmy.blahaj.zone 30 points 2 weeks ago* (last edited 2 weeks ago)

Beyond the fact that security on Telegram is a joke (E2EE not enabled by default, only available in 1-to-1 chats, groups chats are all unencrypted, homespun encryption algo), they have never had a full, independent audit of their encryption standard.

It looks like there are a handful of papers that looked at parts of the earlier standard Telegram used (MTProto 1), but nothing on the current version (MTProto 2).

https://courses.csail.mit.edu/6.857/2017/project/19.pdf

https://eprint.iacr.org/2015/1177.pdf

https://eprint.iacr.org/2015/1177.pdf

Anyway, long story short, Delta Chat has had independent audits several times. I'd say that says it all, really.

https://delta.chat/en/help#security-audits

(Also, thanks for introducing me to Delta Chat, was unaware of the project up to now. Neat stuff.)

[-] BearOfaTime@lemm.ee 3 points 2 weeks ago

Agreed.

No audit...then we don't know.

Have you seen an audit for SwissCows' Teleguard?

I've been testing it for a few days now, after a comment about it here.

They claim to not store your chats, they're deleted after delivery. To sync a new device requires an encrypted backup from an existing device.

I've tested this by restoring a backup from yesterday to sync a new device, and it only has data from yesterday.

That said, I really don't know how trustworthy they are.

[-] SnotFlickerman@lemmy.blahaj.zone 5 points 2 weeks ago

Nice, I hadn't heard of them until now, either.

I'm just excited that end-to-end-encrypted services have become in such high demand that we're seeing lots of different implementations.

It took a while, but it looks like Veilid finally has a basic chat built in their protocol as well. It says it's secure, but I can't find any info on its particulars.

https://gitlab.com/veilid/veilidchat

[-] Upstream7564@discuss.tchncs.de 1 points 1 week ago

They CEO made an direct attack against Signal, spreading misinformation to promote Teleguard. I think that says it all.

[-] BearOfaTime@lemm.ee 0 points 1 week ago* (last edited 1 week ago)

Meh. I only read a translated version, so it's hard to tell nuance.

But nothing in there is inaccurate. Maybe overstated.

Personally Signal seems trustworthy, but... I have some ambivalence, given their bullshit reasons for dropping SMS support. They claimed it cost them engineering, which is at best wrong, at worst a flat out lie. Signal has nothing to do with how SMS is managed - it merely hands the message to Android's SMS system. It's trivial. So why would they drop support and use that lie?

When I'm being misled, I start to look at everything else as having a bit more validity.

Plus UI/UX on signal sucks. It's no better than the lamest SMS app. Hell, old SMS apps are better. And no multi-device sync. They claim it can't be done and maintain encryption. Right. Clients just need to use the same encryption key...like Telegram does, and now Teleguard - and they're claiming full e2e at all times.

[-] Upstream7564@discuss.tchncs.de 1 points 1 week ago

But nothing in there is inaccurate. Maybe overstated.

Do your homework.. 🙄

Seriously, fact check before you comment something which is not true. I will reply later wth a longer response when I got time to :)

[-] TCB13@lemmy.world -1 points 1 week ago

While I don't disagree with you, I don't believe that if MTProto 2 was breakable govts would be putting the shit show they're putting right now.

[-] pupbiru@aussie.zone 2 points 1 week ago

breakable for the NSA doesn’t mean the police have access

also the current issue is with moderation: telegram is refusing to take down CSAM channels etc

[-] TCB13@lemmy.world 2 points 1 week ago

And what about signal? If some gov founds a group chat they don’t like, will they take it down? How will they even know if all the contente is encrypted?

CSAM? More like copyright infringement. CSAM is the usual cheap excuse to shut down everything because of the obvious social implications.

[-] pupbiru@aussie.zone 2 points 1 week ago

if a govt seizes a device and discovers channel IDs to be taken down, i’m sure than signal would do so - there have been no arrest warrants, after all… however, the problem is also significantly smaller for signal because signal can’t have enormous broadcast groups

it’s kinda irrelevant what it is - you have to comply with police orders to moderate your platform… if this were musk and x lemmy would be cheering on the arrest! no matter who you are, you ~~don’t~~ shouldn’t get to just break the law

and you’re right CSAM is frequently used as an excuse, and no i don’t have evidence - that would require actually looking for said content, which i have no inclination to do. the only information i have is that multiple independent news outlets have referenced telegram for years - not proof, but a more convincing argument than simply denial - because let’s not kid ourselves, unless you’ve gone looking for that content, you’ve got no proof against it either (and even if you didn’t find it, that’s no guarantee either - it’s unlikely easy to find)

[-] TCB13@lemmy.world 1 points 1 week ago* (last edited 1 week ago)

you have to comply with police orders to moderate your platform…

Your points are fair however, where does it stop? If the police says "make it all plaintext" then what happens? It is a police request after all.

This thing where chat platforms and others "need" to comply with police / govt orders and remove content is very tricky... should platforms really censor everything the govts ask for? What if it is a group chat about a corrupt political party in power (with proof)? The govt will say it is CSAM, them Signal will shut it down and our democracies are gone.

To make it really clear: I'm not for breaking the law, and I don't think that content should be on such platforms. The problem is that once you start removing that content the precedent will be abused to remove other actually important stuff because "it is CSAM" and the E2EE doesn't have ways to check if is is really CSAM nor should it be the judge of the content.

[-] pupbiru@aussie.zone 1 points 1 week ago

this is the slippery slope fallacy… “where does it stop” is not a valid argument to not start

[-] KLISHDFSDF@lemmy.ml 1 points 1 week ago

while true, that doesn't mean that it isn't compromised but not hackable yet, or that a weakness won't be found in the future. I would heed the advice of those in the field of cryptography and stay away from Telegram and MProto

[-] Rose@lemmy.zip 12 points 2 weeks ago

I've never seen anyone use Telegram's e2ee. Not even by the users outside the legal realm, to put it mildly. Not only is it opt-in but it also works in the mobile app only.

[-] BearOfaTime@lemm.ee 2 points 2 weeks ago
[-] Rose@lemmy.zip 10 points 2 weeks ago

So how do you start or join a secret chat on Windows?

[-] unknowing8343@discuss.tchncs.de 6 points 1 week ago

Custom third-party clients. It's a mess.

[-] rottingleaf@lemmy.world 8 points 1 week ago

Telegram is not private. That makes the comparison to be infinity in favor of DeltaChat.

[-] dsilverz@thelemmy.club 4 points 1 week ago

Regarding privacy, PGP is far better than out-of-the-shelf IM-embedded encryption, if used correctly. Alice uses Bob's public key to send him a message, and he uses his private key to read it. He uses Alice's public key to send her a message, and she uses her private key to read it. No one can eavesdrop, neither governments, nor corporations, nor crackers, no one except for Alice and Bob. I don't get why someone would complain about "usability", for me, it's perfectly usable. Commercially available "E2EEs" (even Telegram's) aren't trustworthy, as the company can easily embed a third-party public key (owned by themselves) so they can read the supposedly "end-to-end encrypted" messages, like a "master key" for anyone's mailboxes, just like PGP itself has the possibility to encipher the message to multiple recipients (e.g. if Alice needs to send a message to both Bob and Charlie, she uses both Bob's and Charlie's public keys; Bob can use his own private key (he won't need Charlie's private key) to read, while Charlie can use his own private key to do the same).

[-] possiblylinux127@lemmy.zip 4 points 1 week ago

If you have to choose go for PGP. However, there are much better options

[-] Kualk@lemm.ee 1 points 1 week ago

Whatever are those options?

[-] possiblylinux127@lemmy.zip 1 points 1 week ago

Simplex Chat and other encrypted messagers

this post was submitted on 02 Sep 2024
27 points (90.9% liked)

Privacy

31219 readers
856 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS