[-] CaptainAlchemy@lemmy.one 5 points 1 year ago* (last edited 1 year ago)

A prime one is that the entity that you (have no choice but to) trust today will eventually turn against you at some point down the road.

  • How does that change with federation, you always trust someone. Why should I trust the shady person running software on their basement, even if you self host, you are trusting the developers not to ship bad or poorly written code.

using a 3rd party client is against Signal's ToS

As far as it being against signals tos, molly exists and had not received any problems from the signal foundation to my knowledge, discord has the same clause and they don't seem to give a rats ass. Sure they could enforce it but they don't, and personally with how matrix clients are handled they have mixed security, fluffychat has security issues ranging from outdated SDK versions to quite literally ddosing homeservers because of a non-existent rate limit.

pushing controversial features like crypto payments

The crypto stuff wasn't great but you know what's cool? You don't have to use it. Simple as that. You don't have to engage with it and you and I both know that. It's buried in settings and you have to find it yourself.

Signal is an entity that's incorporated in a jurisdiction and might be compelled by law or to degrade its encryption to comply with the local regulator.

  • I've always used integrity as a metric as to how trustworthy a service is, and in terms of signals e2ee, they've never lied about it, it's been proven in court multiple times not having any data on their users, no government can compel anyone or any company for things they don't have. Signal had everything to lose by lying about their encryption and nothing to gain, so why would they? Why would any company take a huge chance at a death blow just because? Signal is a non profit so they don't have any incentive to degrade it, they would be dead tomorrow if they got caught.

Using a centralized service like Signal makes you an easily identifiable/prime target in such a scenario.

Signal is not an anonymity tool, and has never been advertised as such, if you need anonymity, signal is not a good choice. You can make it more anonymous by using a burner phone but that's a different topic.

No matter what Signal says, nobody but themselves can verify what code runs on their servers

  • You can't really confirm what any software can or cannot do, even if it runs on your system. Open source software is bound to the same principals of code, it will do exactly what you tell it to do, even if it is not intended (a 0-day, bug, etc.). Thousands of people constantly are monitoring the Linux kernel and it is still found to have tons of 0 days baked in due to it running a fuck ton on ring zero. You can't just inspect code and know exactly what it's doing, unless it's a hello world program it gets quite complicated. Verified safety numbers also make sure that no man-in-the-middle attacks can take place, making conversations even more trustworthy and still not trusting any server.

As far as I understand the American law, any agency could tap into that, either directly, or via Amazon on which the whole thing is running.

If everything is encrypted, what could Amazon tap? You do realize sealed sender and PFS take away any trust from the server correct? It's all encrypted, your aren't trusting the server at all, it's completely trust-less, and unless you think Amazon or governments can at this very moment tap any encrypted data and decrypt it, I would recommend taking a walk outside and realize that no one, NO ONE can decrypt current encrypted standards.

Unless you can point me to a reputable article showing in great detail that signal is lying about their e2ee claims then I'll rest my case. Signal has been proven time and time again to not have any data on their users except the minimum required for the service to work, that's called integrity.

Also there will always be someone you trust on the internet, nothing will change that unless we completely rethink how the internet works.

Edit: added quotes Edit 2: added extra info

[-] CaptainAlchemy@lemmy.one 5 points 1 year ago

Wdym anti features? The only thing fdroid does is take the developer APK, sign it themselves and release it. If any anti features exist (I assume you're talking about the anti features tab in the fdroid app) it won't make any difference where you obtain it as fdroid doesn't do code checks. They only check to make sure it's under a open source licence. Fdroid adds no protection to any apps and you trust them to ship clean packages. If you get packages from the developer and they sign it and it happens to be malicious it's only one app instead of all your apps you have from fdroid. You trust them a lot and I'd recommend reading this if anyone is interested. https://privsec.dev/posts/android/f-droid-security-issues/

[-] CaptainAlchemy@lemmy.one 7 points 1 year ago

The main issue with encrypting the database using Molly's setup is you'll miss notifications and calls until you unlock, this might be able to be fixed using a different database encryption setup but as it stands it would be inconvenient for many.

[-] CaptainAlchemy@lemmy.one 16 points 1 year ago

Signal on the Google play store isn't FOSS but it facilitates the delivery of notifications to the user. The protocol itself is open source and notifications are handled securely even with Google play services on the phone. If you want a FOSS version, use the APK on their website, it has an auto updater.

[-] CaptainAlchemy@lemmy.one 13 points 1 year ago

Molly is only available on Android, as far as differences it is a hardened fork of signal with an encrypted database, what that means in practice is even if someone was actively probing your phone to try to gain access to messages they wouldn't be able to due to the encryption. It's very useful if you are an active target or you don't trust your phone os to play nice. I personally use it myself and really like it but in general it's not terribly different.

[-] CaptainAlchemy@lemmy.one 39 points 1 year ago

I don't see an issue as signal is designed not to trust the server. Signal also uses sealed sender and Perfect Forward Secrecy, which is something almost all e2ee messengers lack. What it means in practice is signal leaks very little if any metadata, if you leak metadata you give away details about who your talking to and for how long, etc. Examples might include talking with a suicide hotline, or a doctor, maybe a customer service agent at a company and for how long. Those details will give a lot away about you, even if the messages or calls themselves are encrypted. Matrix is not recommended for communication because it fails to properly hide metadata and actively trusts the servers. When you make a call on signal, as long as both users have "Always Relay Calls" set to disabled, your calls will be peer to peer instead of trusting a central server to facilitate the connection and trusting a middle man. What this means is since the connection is peer to peer you can leak your IP address to the user you're talking to, however a VPN fixes this issue.

[-] CaptainAlchemy@lemmy.one 44 points 1 year ago

Once again, I'm still trying to figure out how apple users can defend this. Yes, Google maps had this feature, but everytime I talk to apple users I'm always told they got their phone because "it just works!". But then I learn that features I consider basic at best are completely missing. If my iphone should "just work" I expect the features I want to exist without another app installation. Things on iphone only seem to work if you don't know anything better.

[-] CaptainAlchemy@lemmy.one 15 points 1 year ago

I hate to say this, but this is a blessing in full view. If people want the "freedom" to not take a vaccine because "risks, 5G mind control, whatever" then let's let them. Life is full of risks and they need a wakeup call.

[-] CaptainAlchemy@lemmy.one 11 points 1 year ago

I feel like Google has two departments internally, a security research and implementation team and a Google ads team. One of them betters security for all android users and another gets bad press for making bad decisions with YouTube, chrome, or other Google services. I'd love to know how the culture is at Google. It's not like security conflicts with Google data collection practices but I still find out interesting to think about nonetheless

[-] CaptainAlchemy@lemmy.one 6 points 1 year ago

Samsung in terms of security, privacy and hardware is a total mess. I would avoid Samsung products at all costs.

[-] CaptainAlchemy@lemmy.one 12 points 1 year ago

Printers print very small dots on the sheet of paper you print so it canbe identified. https://en.wikipedia.org/wiki/Machine_Identification_Code

[-] CaptainAlchemy@lemmy.one 6 points 1 year ago

This makes me wanna get my Sony DSLR and start taking photography lessons again, this is awesome!

1
submitted 1 year ago by CaptainAlchemy@lemmy.one to c/memes@lemmy.ml

view more: next ›

CaptainAlchemy

joined 1 year ago