Comment by codethief
1 year ago
Interesting, I feared Sealed Sender might be susceptible to statistical analysis (hence my phrasing "reduce it a bit") but it's worse than I expected ("Signal could link sealed sender users in as few as 5 message"). Thanks for the link!
As for TOR, that wouldn't really help much, would it, given that the described attack is at the application level of Signal. Or are you talking about not using Signal altogether?
Yeah, I used TOR as a general example. Briar uses TOR for example to hide the connections between users.
Some other options
https://cwtch.im/ (has better UX and security than Briar) https://onionshare.org/ chat feature
Also https://github.com/maqp/tfc by yours truly if you need hardware-enforced endpoint security for your keys.