OneMeaningManyNames

Full time smug prick

  • 5 Posts
  • 61 Comments
Joined åtta månader sedan
cake
Cake day: 2 juli 2024

help-circle
  • There is a conceptual distinction: Encryption in transit vs. encryption at rest. You may send the packets encrypted to the server, but if they are not encrypted on the server’s file system, anyone can read them.

    The real question is, why do you think governments make such a big fuss about citizens having access to military grade encryption?

    There have been audits of e2ee implementations, and the algorithms used also have some objective properties. I don’t think that I have ever heard in cryptography discussions that backdoors are so widespread that the discussion is moot. I have only heard, time and time again, the opposite.

    Even Apple, in this very occasion, opted to ditch the service rather than backdoor it, and in fact takes the UK to court over this. I think that the opinion that this is all for show is a tad wild, and not very well supported in this occasion.

    Like every cryptology book starts with the adage “There is cryptography that prevents your little sister from reading your mail, and cryptography that prevents the government from reading your mail, and we will talk about the latter.”

    https://blog.cryptographyengineering.com/2025/02/23/three-questions-about-apple-encryption-and-the-u-k/

    On the other hand, not all implementations are created equal. Telegram was recently under fire, and there is a lot of variance in e2ee implementations in XMPP clients, IIRC.




  • This is some Gestapo/Stasi shit.

    Like, all queer persons must go beyond Signal/Tor level.

    This extends to the physical world: Plan ahead for escape routes and survival networks.

    I will come back with this angle but, REMEMBER those mfers who always said “the NSA does not target you, so asking about anything more than Signal is paranoid/futile if ever the NSA targets you”?

    REMEMBER that we said that some people have advanced threat models by default? Eg feminist activists, activists in third countries, queer people?

    WHO is paranoid now, that being queer, pro-Palestine, and/or climate activists can have you on the watchlist?

    This development only proves my previous points that the hordes of sock-puppets spamming the Privacy forum are fucking spooks. Pooping the conversation about advanced privacy and anonymity should qualify for permabans, IMHO.













  • Lavabit

    Connection to Edward Snowden

    Lavabit received media attention in July 2013 when it was revealed that Edward Snowden was using the Lavabit email address Ed_Snowden@lavabit.com to invite human rights lawyers and activists to a press conference during his confinement at Sheremetyevo International Airport in Moscow.[16] The day after Snowden revealed his identity, the United States federal government served a court order, dated June 10, 2013, and issued under 18 USC 2703(d), a 1994 amendment of the Stored Communications Act, asking for metadata on a customer who was unnamed. Kevin Poulsen of Wired wrote that “the timing and circumstances suggest” that Snowden was this customer.[17] In July 2013 the federal government obtained a search warrant demanding that Lavabit give away the private SSL keys to its service, affecting all Lavabit users.[18] A 2016 redaction error confirmed that Edward Snowden was the target.[2]

    source

    But what is the status now? Also, I think in the years to come the jurisdiction will also play a role. If the service is in the soil of a country that can subpoeana the encryption keys, then nobody is really safe.