• 0 Posts
  • 14 Comments
Joined 16 days ago
cake
Cake day: February 10th, 2025

help-circle



  • I am pretty sure that if asked, the serverside protections can be circumvented

    No, they literally cannot. The entire protocol is open sourced and has been audited many times over.

    One of the fundamental things you assume when designing a cryptosystem is that the communication link between two parties is monitored. The server mostly exists as a tool to frustrate efforts by attackers that have network dominance (i.e. secret police in oppressive regimes) by not allowing signals intelligence to extract a social graph. All this hypothetical attacker can see is that everyone talks to a server so they can’t know which two people are communicating.

    The previous iteration, TextSecure, used SMS. Your cellular provider could easily know WHO you were talking to and WHEN each message was sent. So SMS was replaced with a server and the protocol was amended so that even the server has no way of gaining access to that information.

    The sealed sender feature is something that the client does. It was best effort because, at the time, they still supported older clients and needed backwards compatibility. This is no longer the case.



  • He had been unwell, according to two prisoners at Auburn and another person who reviewed information about Mr. Grant’s health. That person said Mr. Grant had had several strokes: At least five were documented, including at least one in the past few weeks.

    I don’t think the strike caused this man to have 5 strokes.

    Also, as a general rule, anytime a headline uses ‘after’ or ‘as/amid’ to create a link between two events. Your media literacy should be sounding alarm bells that the link is manufactured for some reason.





  • History isn’t stored on the server so it can’t be automatically populated on a new device. That is a feature. The alternative, storing the messages on the server or having the means for one device to clone all of its messages to another device, would be insecure.

    A 30 character long password is required in order to have enough bits of entropy so that the backed up messages are actually secure.

    Grandma isn’t moving her data to a new PC without assistance, the person that is assisting her should be competent enough to operate Signal.



  • For stuff like Twitter-likes and TikTok-likes I want an algorithm.

    Until recommendation algorithms are transparent and auditable, choosing to use a private service with a recommendation algorithm is giving some random social media owner the control of the attention of millions of people.

    Curate your own feed, subscribe to people that you find interesting, go and find content through your social contacts.

    Don’t fall into the trap of letting someone (ex: Elon Musk) choose 95% of what you see and hear.

    Algorithmic recommendations CAN be good. But when they’re privately owned and closed to public inspection, then there is no guarantee that they’re working in your best interest.