• Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      7
      ·
      5 hours ago

      I think the point is not that Telegram (the company) sucks, it is that Telegram (the app) sucks. A proper messenger like Signal leaves the provider with no information to hand over.

      Many people still seem to be under the false impression that Telegram is private, so it’s worth spreading around.

    • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
      link
      fedilink
      arrow-up
      15
      arrow-down
      2
      ·
      13 hours ago

      I don’t really have any special hate for Telegram myself, and I never saw it as a secure communication platform. I have more problem with Signal because people treat it like it’s paragon of privacy and security.

      • Imnebuddy@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 hours ago

        Many Signal alternatives also have security issues of their own, often making them less secure than Signal. This includes Matrix and XMPP. In the blog post regarding XMPP+OMEMO, the author replies to a question about which would be better than Signal, Matrix, and XMPP with this suggestion:

        Anyone who cares about metadata resistance should look at Cwtch, Ricochet, or any other Tor-based solution. Not a mobile app. Not XMPP. Not Matrix.

        In regards to Ricochet, not having a mobile app version makes it difficult to recommend to less tech savvy people.

        • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
          link
          fedilink
          arrow-up
          7
          ·
          4 hours ago

          Sure, every platform has its own set of problems, and it’s fine to make an informed decision that you’re willing to accept the deficiencies of a particular platform you’re using. The issue I have is with people pretending that Signal doesn’t have the problems that it has as we can see happening in this very thread.

          • Imnebuddy@lemmy.ml
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            3 hours ago

            I’m with you there. This wasn’t meant as an argument against your statement. I brought up the issues regarding Matrix and XMPP as they are often recommended as alternatives to Signal, and after learning about this blog in a previous conversation I had about this topic, I thought it would be a good resource to bring up so people can be informed about those platforms and some alternatives that may be better than Signal while being metadata resistant.

      • Corgana@startrek.website
        link
        fedilink
        arrow-up
        7
        arrow-down
        2
        ·
        13 hours ago

        I’d be curious to hear your criticisms of Signal! While I haven’t seen anyone describing it as a “paragon of privacy and security” I do think it is a highly accessible SMS replacement that is also open source, end-to-end encrypted, and operated by a nonprofit.

        • Dessalines@lemmy.ml
          link
          fedilink
          arrow-up
          17
          arrow-down
          3
          ·
          12 hours ago

          I wrote a longer one here: https://dessalines.github.io/essays/why_not_signal.html

          The short version is, that it’s a centralized, US hosted service. All of those are subject to National Security Letters, and so are inherently compromised. Even if we accept that the message content is secure, then signal’s reliance on phone numbers (and in the US, a phone number is connected to your real identity and even current address), means that the US government has social connection graphs: everyone who uses signal, who they talk to, and when.

          • livestreamedcollapse@lemmy.ml
            link
            fedilink
            arrow-up
            3
            ·
            edit-2
            8 hours ago

            Building on this, I’d be curious to hear your thoughts on GrapheneOS as a whole. The OS recently bundled a new app “store”/repository, "Accrescent”, along with the usual basic apps like a calculator & camera. On Accrescent, the hardened fork of Signal, Molly, is offered on there. I’ve alsoheard one of the Graphene devs has voiced some chuddy politics.

            I’ve still installed & use Molly to chat with my closest friends who I was able to get off of big tech platforms previously used for our group chats, but I have been aware of the RFA/Signal connection for several years (your blog post really ties it together) & I do try to remind these friends about it. Really we just use Signal to shitpost and organize hangouts, so I’m not yet locking myself in a bunker over using it for those purposes, but all this has got me considering building a server & hosting a different secure chat service on it.

            I learned about possible Unit 8200 connections with the Matrix protocol within the past year or two, but don’t recall exactly what that entails. I haven’t heard much about Briar, but it being android only would make it a harder sell for getting people to switch over to it, so I suppose that leaves simpleX to proselytize.

            • Dessalines@lemmy.ml
              link
              fedilink
              arrow-up
              7
              ·
              5 hours ago

              I don’t know enough about grapeneOS to comment on it.

              Any signal app forks still have to use signals main servers, so they still got your phone number and identity.

              Matrix was originally funded by an Israeli company until it spun off, but unlike signal, it’s entirely open source, self-hostable, and can be run in a private manner. Phone numbers and identifiers are not required, so even if you connect to a malicious server, the most they get is your matrix id, and things you’ve explicitly leaked about your identity.

              The most we could say is that specific servers are compromised, but its also possible to host it outside a five-eyes country, unlike signal.

          • Ulrich@feddit.org
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            6
            ·
            edit-2
            3 hours ago

            Man I don’t even have the time to break down all these very clearly wrong insinuations. There’s no reason to believe Signal collects metadata, and every reason to believe they don’t. They’ve been served subpoenas and they shared them, as well as their responses, publicly, and the only thing they included was when the last time the user connected to their server.

            Edit: tl;dr this person believes that Signal is inherently insecure because they use servers and require a phone number, despite the fact that there is zero information connected to your phone number.

            • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
              link
              fedilink
              arrow-up
              8
              arrow-down
              1
              ·
              4 hours ago

              Security cannot be based on trust. Period. If an actor is in a position to collect data then it must be assumed that they do so. You either do not understand the subject you’re opining on, or you’re intentionally spreading misinformation here.

              • Ulrich@feddit.org
                link
                fedilink
                English
                arrow-up
                3
                arrow-down
                7
                ·
                4 hours ago

                It is not based on trust. It’s called “zero knowledge encryption” for a reason. You don’t have to trust them, because you give them nothing to trust them with.

                • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
                  link
                  fedilink
                  arrow-up
                  7
                  arrow-down
                  1
                  ·
                  4 hours ago

                  Except that it is based on trust because you have to use your phone number to create the account, and you have to trust the company operating the server in regards on how that information is used. What part of this are you struggling to understand specifically?

              • Kairos@lemmy.today
                link
                fedilink
                arrow-up
                2
                arrow-down
                4
                ·
                7 hours ago

                Signal does not know who talks to whom. It’s kind of the main thing about the double ratchet.

                • davel [he/him]@lemmy.ml
                  link
                  fedilink
                  English
                  arrow-up
                  5
                  arrow-down
                  2
                  ·
                  5 hours ago

                  Unless you compiled the app yourself from source code that you understand, you don’t really know what the app might be saying to Signal’s servers. Almost everyone just trusts that the pre-compiled app supplied by Apple or Google aren’t compromised. But we know from history that Big Tech and the military-intelligence-industrial complex are in bed with each other.

        • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
          link
          fedilink
          arrow-up
          11
          arrow-down
          1
          ·
          13 hours ago

          The most obvious one that has been explained to death here is that Signal collects vast amounts of metadata. It’s also a centralized service that’s operated in the US, and it doesn’t even make reproducible builds for the Android client.

          • Corgana@startrek.website
            link
            fedilink
            arrow-up
            3
            arrow-down
            1
            ·
            12 hours ago

            Where did you read that they are collecting vast amounts of metadata? Not challenging your claim just that I have been trying to find more info and came up empty. Signal says “we don’t collect analytics or telemetry data” but that’s about it.

            • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
              link
              fedilink
              arrow-up
              11
              arrow-down
              1
              ·
              12 hours ago

              You need a phone number to sign up. Phone numbers are metadata that uniquely identifies people, and this data constitutes a network of connections. If this metadata is shared with the government, then it can be trivially correlated with all the other information collected about people.

              • Ulrich@feddit.org
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                4
                ·
                edit-2
                4 hours ago

                I agree it’s a problem, but not for any of the reasons you listed. A phone number is not metadata, it’s just data. In order to request information associated with your phone number, they would have to know it already, because there’s no other identifier. In order to be metadata, there would have to be other information connected to that data, which there isn’t (in Signal), other than the date you signed up and the last time you connected to their server. They don’t know who you talk to or when, thus no network connections.

                • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
                  link
                  fedilink
                  arrow-up
                  5
                  ·
                  4 hours ago

                  Phone numbers are metadata, and the fact that you don’t even understand this shows that you have no business making uninformed comments on this subject. Metadata is understood to be data that’s associated with messages being sent, but isn’t the content of the messages themselves.

                  In order to be metadata, there would have to be other information connected to that data, which there isn’t (in Signal), other than the last time you connected to their server. They don’t know who you talk to or when, thus no network connections.

                  One has to be an incredibly gullible individual to actually believe this. You have no way to audit the server, and security cannot be based on trust. If a company has a way to store and use the information it collects it has to be assumed that it is doing so. Signal is very obviously in a position to do this. Once the phone number is collected, it’s associated with your account. Any time you send a message through signal to another account that’s a connection in the graph of your social network.

                  Anybody with a functioning brain can understand that this graph is highly valuable to intelligence agencies in the US. If they have a person of interest and they know their identity, they can trivially use the metadata collected by Signal to see whom this person wants to have private conversations with.

                  Ignorant people such as yourself confidently speaking on subjects they don’t understand present a public danger to society.

              • Corgana@startrek.website
                link
                fedilink
                arrow-up
                2
                arrow-down
                2
                ·
                edit-2
                10 hours ago

                In my book a phone number is not “vast amounts of metadata” but I see your point. Again, I have never seen someone describing Signal as a “paragon of privacy and security” 9usually it’s presented as an improvement over SMS) but if they do I will put on my Trilby and correct them.

                • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
                  link
                  fedilink
                  arrow-up
                  9
                  arrow-down
                  1
                  ·
                  10 hours ago

                  It’s the volumes of phone numbers collected collectively that constitute vast amounts of metadata. Meanwhile, I’ve seen plenty of people advocate using Signal as the best option for privacy. And any time there is a criticism of Signal then then brigades of people inexplicably appear to vigorously defend it.

    • shortwavesurfer@lemmy.zip
      link
      fedilink
      arrow-up
      28
      arrow-down
      1
      ·
      19 hours ago

      What seems crazy to me is how many people they managed to convince that they were private when they most definitely are not.

      • sunzu2@thebrainbin.org
        link
        fedilink
        arrow-up
        2
        arrow-down
        4
        ·
        16 hours ago

        Any criminal with half a brain knew what’s up

        Brain dead normies lapring edge lord on there were just useful idiots for their handlers

        • sudoer777@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          2 hours ago

          It doesn’t have to be “real weird shit” though for it to be a problem, coordinating about protests or other political activism on Signal is sketchy because of the phone number requirement, and just having your phone number be associated with another suspect phone number from inferred conversations is enough to potentially get you in trouble. Or if some national anti-abortion or anti-LGBTQ law happens and they put serious effort into enforcing it, activity on Signal, which is not anonymous, could be used against you and people you had conversations with. Yet I’ve seen multiple groups who shouldn’t be using Signal use it anyway and people thinking they’re anonymous on the platform because it keeps getting recommended. SimpleX and Cwtch have weaknesses also, but both of them take anonymity more seriously than Signal does.

      • Imnebuddy@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        2 hours ago

        https://lemmy.ml/comment/15999861

        In the blog posts I read where the author, a security engineer, audited and/or reported vulnerabilities with two E2EE chat protocols commonly recommended as Signal alternatives–Matrix and XMPP–both had implemented half-baked solutions or refused to solve the issue at all in some regards, and both had evangelists that gave dismissive responses. The XMPP chud dev gave a laughably childish response, and the Matrix dev even admitted the team being aware of the olm vulnerability and deliberately refused to fix it for years. Not that Signal cultists are any better and not negating the legitimate security and trust issues with the Signal platform, but Signal is still a decent platform for most people’s threat model, though it would be nice if there was an alternative that could compete with Signal to recommend to most people instead. If you care about metadata resistance and your threat model involves high stakes if your assets are compromised, the blog author suggests Tor-based solutions such as Cwtch and Ricochet Refresh.

      • Claudia@lemmy.blahaj.zone
        link
        fedilink
        arrow-up
        3
        arrow-down
        1
        ·
        4 hours ago

        This better not be a “computers received pentagon funding when the first Vaccum tubes were being made”.

        Signal is an excellent choice. Literally forces cops to get a warrant for your phone and hope you didnt purge your messages after a few days.

        If you want anonymity on top of that than simplex

      • Ulrich@feddit.org
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        6
        ·
        5 hours ago

        I would encourage you to think critically about the nonsense being shared here. Do some research and read about people who actually know things about security and you’ll find a common pattern: basically all of them hold Signal up as a gold standard in privacy and security.

      • markinov@lemmygrad.ml
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        edit-2
        11 hours ago

        Depends on your threat model. Signal is fine if you just want to communicate with average joe. If you want something more anonymous look into secureX,

      • Corgana@startrek.website
        link
        fedilink
        arrow-up
        8
        arrow-down
        1
        ·
        edit-2
        12 hours ago

        Signal is an excellent alternative if you’re looking for an E2E encrypted SMS replacement your grandmother can use.

  • Mohamad20ZX@lemmy.one
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    16 hours ago

    Welp then I think we have to sue them to oblivion S/ But really can’t blame most people whose Are Accustomed to using TeleGram And WhatsUp

  • Emberleaf@lemmy.ml
    link
    fedilink
    arrow-up
    8
    arrow-down
    23
    ·
    18 hours ago

    This is a difficult topic for me. On the one hand, I believe everyone has a right to privacy and we need to fight for that right. On the other hand, I’m enough of an adult to understand that law enforcement needs to be able to effectively investigate criminal activity. There has to be a middle ground there, somewhere. I just don’t know where that is.

    • gubblebumbum@lemm.ee
      link
      fedilink
      English
      arrow-up
      26
      arrow-down
      1
      ·
      18 hours ago

      If they actually wanted to do something about child abuse they’d go after the conserative scum who have historically supported it and still do. Its the ones that vote for far right parties, are anti higher-ed, pro homeschooling, anti secularism, pro religious indoctrination, anti feminist, anti age of consent laws, anti sex ed, anti criminalisation of marital rape, anti combating domestic violence, pro child marriages etc instead they are constantly trying to attack human’s right to privacy which only exist on paper.

      • Emberleaf@lemmy.ml
        link
        fedilink
        arrow-up
        1
        arrow-down
        13
        ·
        18 hours ago

        But isn’t advocating for the privacy of criminals the same as advocating for the crime, itself? Sure, let’s go after the politicians…but are you REALLY okay with letting child molesters, etc. hide their activities from law enforcement online? Like I said, there has to be a middle ground. We just need to find it.

        • stink@lemmygrad.ml
          link
          fedilink
          English
          arrow-up
          17
          ·
          17 hours ago

          The moment you dissolve rights to privacy for X scenario, you open dissolution for Y and Z as well

        • root@lemm.ee
          link
          fedilink
          arrow-up
          4
          ·
          13 hours ago

          “Child molesters etc” have been online since the internet has existed and very little is done about it. They have also been active offline and very little is done about that too. If they wanted to go after them they would. They don’t, because it is not in their interest to. The threats they will go after are people they disagree with and who their higher ups want targeted. You are always in more danger from authorities than “bad guys” are.

    • catloaf@lemm.ee
      link
      fedilink
      English
      arrow-up
      5
      ·
      15 hours ago

      It’s the warrant process and true encryption. If the cops think you’ve done something bad, they go and get a warrant. The provider turns over what they have, which should just be account info and metadata. Then the cops do good old fashioned police work and get a warrant for your personal stuff which they’ll seize and analyze.

    • far_university190@feddit.org
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      16 hours ago

      There exist no middle ground.

      If able to invade privacy of child abuser, able to invade privacy of any person. Then your “privacy” only is trust in authority to not abuse that not actually have privacy.

      How that end you can see in china.