Comment by rainonmoon
21 hours ago
Absolutely nothing in this article is related to feds using conversation metadata to map participants, so, no they weren’t.
21 hours ago
Absolutely nothing in this article is related to feds using conversation metadata to map participants, so, no they weren’t.
If you follow the X chatter on this, some folks got into the groups and tracked all the numbers, their contributions, and when they went "on shift" or "off".
I don't really think Signal tech has anything to do with this.
Yeah. It's notable they didn't crack the crypto. In the 90s when I was a young cypherpunk, I had this idea that when strong crypto was ubiquitous, certainly people would be smart enough to understand its role was only to force bad guys to attack the "higher levels" like attacking human expectations of privacy on a public channel. It was probably unrealistic to assume everyone would automatically understand subtle details of technology.
As a reminder... if you don't know all the people in your encrypted group chat, you could be talking to the man.
That’s really interesting extra context, thanks!
[flagged]
My Session and Briar chats don't give out the phone numbers of other users.
Yes, but they have their own weaknesses. For instance, Briar exposes your Bluetooth MAC, and there's a bunch of nasty Bluetooth vulns waiting to be exploited. You can't ever perfectly solve for both security and usability, you can only make tradeoffs.
1 reply →
Neither does Signal.
2 replies →
[flagged]
We don't do the "duct-tape an insult to the end to drive your point harder" gimmick here. It will lead to loss of your account.
whoa, losing access to a throwaway account created for specifically posting trolling comments? i'm sure they're shaking in their boots at the prospect
1 reply →
[flagged]