7 points

Trust leads to the dark side

permalink
report
reply
7 points

Fine, go verify it

permalink
report
parent
reply
4 points

Sadly, Im not qualified to do that. It’s still my messenger of choice.

permalink
report
parent
reply
3 points

Then not to be aggressive about it, but go get qualified or stop spreading FUD honestly…

permalink
report
parent
reply

Cant server isnt foss they could be doing anything with metadata.

permalink
report
parent
reply
4 points

It is, but open source servers never matter anyways

permalink
report
parent
reply
3 points

I thought it was open source.

https://github.com/signalapp/Signal-Server

This doesn’t prevent them from running different software or logging requests, but we have unsealed court orders, which is better than most other services that could receive them.

permalink
report
parent
reply
2 points

The server is Foss. However, that means nothing as you still be using it. Best to not trust it and use ee2e which is what Signal does.

Signal is really a fancy version of SMS and MMS. It does require a phone number but contacts don’t need that you contact you. There are better options from a anonymity perspective but they aren’t as user friendly and popular.

permalink
report
parent
reply
4 points

I convinced my non-tech nerd partner to switch to Matrix and it’s been working suprisingly well for us.

permalink
report
reply
5 points

Is that (non)-(tech nerd) or (non-tech) (nerd) partner?

permalink
report
parent
reply
6 points

she’s not a tech nerd

permalink
report
parent
reply
5 points

Aha, thanks, just wondering. English isn’t my first language.

permalink
report
parent
reply
4 points

Imo, I think Signal is a good “normie-oriented secure messenger”, but I think Simplex is more worthy of focus.

permalink
report
reply
7 points

Agreed. The thing with Signal is that it has a longer history and a lower barrier to entry.

permalink
report
parent
reply
3 points

The only one I trust is Briar.

permalink
report
reply
4 points
*

Not a bad choice. Briar has usability limitations but in terms of democracy it is a powerful tool.

permalink
report
parent
reply
2 points

I’d also recommend taking a look at Threema.

I think their product direction is a bit better. Particularly as Signal still shows a message that they don’t back sync messages before you paired devices “for your security” … Threema also doesn’t back sync messages in their beta multi device setup, but that seems to be more less of a product stance and more of a “we just don’t do it yet.”

Threema is definitely missing some features like emoji reactions, stories, and a builtin cryptocurrency (which depending on your stances might be pros or cons).

Both apps have definitely gotten better over the years; I think Threema’s multi device support has really drained resources on their side so there hasn’t been as much outward feature work. I’m hoping it won’t be terribly long until that changes.

permalink
report
reply
5 points

Why would they need crypto dawg

permalink
report
parent
reply
2 points

IMO, they wouldn’t

permalink
report
parent
reply
2 points
*

While it isn’t necessarily an argument against Threema’s security, I think it’s important to consider that Threema is owned by a privately held company [1[2]] — Signal is owned by a non profit [3].

References
  1. “Threema”. Threema GmbH. Accessed: 2024-12-09T02:40Z. https://threema.ch/en/secure-messenger.

  2. “GmbH”. Wikipedia. Published: 2024-09-27T06:24Z. Accessed: 2024-12-09T02:44Z. https://en.wikipedia.org/wiki/GmbH.
  3. “Signal Foundation”. Signal Foundation. Accessed: 2024-12-09T02:45Z. https://signalfoundation.org/.

    Signal Foundation formed in 2018 to support Signal Messenger which originated in 2012. Through the Foundation, we have been able to support Signal’s growth and ongoing operations as well as investigate the future of private communication.

permalink
report
parent
reply
2 points

I almost think that’s a pro. I don’t understand how signal intends to pay for servers forever with voluntary donations. Though I’d be fine if they set up a mandatory annual fee.

Signal is far more polished IMO but both are great.

permalink
report
parent
reply
1 point

I almost think that’s a pro. I don’t understand how signal intends to pay for servers forever with voluntary donations.

In the same vein, a privately owned service, to me, is rather suspect if it is free of cost — the money’s gotta come from somewhere.

permalink
report
parent
reply
1 point

I don’t understand how signal intends to pay for servers forever with voluntary donations.

I think donations can be sustainable if the service in question is handled correctly. Imo, federation/decentralization would improve this, as it wouldn’t place the cost burden on a single entity.

permalink
report
parent
reply
0 points

If you’re seriously concerned about privacy and security I wouldn’t look at Threema. They severely mishandled vulnerabilities by insulting the security researchers, then introduced a new protocol they built with the advice given to them for free from the SAME researchers before that, and yet it still doesn’t support critical features like full forward secrecy. If all you want primarily is the best security out there Signal is and will be the best for a long time to come by the looks of it.

permalink
report
parent
reply
3 points

I think that’s a characterization of what happened but not necessarily a good representation of what actually happened.

Yes, some researchers in Zurich found vulnerabilities. Yes they down played them … because you still couldn’t read anything. They were also already working on a new protocol before those researches wrote their paper and yes I’m sure they made some tweaks based on their findings.

This is their response; I’d hardly call it “insulting” https://threema.ch/en/blog/posts/news-alleged-weaknesses-statement

You could say the same thing about Signal’s response to their “desktop security scandal” earlier this year (of which Threema wasn’t vulnerable and Signal repeatedly refused to acknowledge as a problem).

yet it still doesn’t support critical features like full forward secrecy

They do support PFS (perfect forward secrecy) though their new multi-device solution doesn’t yet support it.

https://threema.ch/en/blog/posts/ibex

This is the same protocol they were already working on when the “researches they insulted” released their research finding issues with the old protocol.

Threema is also far more active with third-party audits than any other group: https://threema.ch/en/faq/code_audit

They severely mishandled vulnerabilities by insulting the security researchers, then introduced a new protocol they built with the advice given to them for free from the SAME researchers before that, and yet it still doesn’t support critical features like full forward secrecy.

IMO this entire sentence is just wrong.

permalink
report
parent
reply
1 point

As you said, if PFS can be disabled by enabling a feature on the receiving end it’s by security practices not enabled, in the industry that’s called a downgrade attack and considered very bad practice.

The blog post you linked, is the publicly revised version after they were called out by well known cryptographers for their handling. This was their original response to the researchers, again after the researchers disclosed the vulnerabilities to them and actively helped designing the new protocol, not just giving inspiration. This was their initial tweet: „There’s a new paper on Threema’s old communication protocol. Apparently, today’s academia forces researchers and even students to hopelessly oversell their findings“ which is long deleted, but I did read it while it was still up back then. I can’t find a screenshot or anything at the moment, so if you want to call me a liar, go ahead but if you search for that quote you will find many citations.

Also, they claimed „old protocol“ but Ibex was still months from being deployed widespread, so that’s another big downplay.

You mention Signals Desktop app issue, Threema claimed the attacks were unrealistic because they require significant computing power or social engineering, both things that are definitely a risk if you’re trying to protect yourself from bigger intelligence efforts. The issue with Signal Desktop however, required full file system access to your device at which point, there is nothing stopping the attacker from simply using a key logger, capturing your screen, etc.

This is why no big security researchers called out Signal but many shunned Threema. At the end I don’t have a horse in the race for either of them, but I think those are facts people need when making a decision with their private information.

permalink
report
parent
reply
1 point
*

Perfect Forward Secrecy has been around since version 5.0 (as an opt in beta feature) and enabled by default since 5.1.

https://threema.ch/en/blog/posts/security-proof-ibex


Here is the original statement you’re referring to:

https://threema.ch/en/blog/posts/news-alleged-weaknesses-statement

I don’t see any insults and the vulnerabilities were patched.

I agree that they downplayed it a bit, but back then they were still a for profit company. Now they are non-profit and it is in their interest to handle such cases in a way that is more aligned with their customers instead of their profits.

permalink
report
parent
reply
-1 points

I’m copying my other response since you both had the same issue with my statements:

As you said, if PFS can be disabled by enabling a feature on the receiving end it’s by security practices not enabled, in the industry that’s called a downgrade attack and considered very bad practice.

The blog post you linked, is the publicly revised version after they were called out by well known cryptographers for their handling. This was their original response to the researchers, again after the researchers disclosed the vulnerabilities to them and actively helped designing the new protocol, not just giving inspiration. This was their initial tweet: „There’s a new paper on Threema’s old communication protocol. Apparently, today’s academia forces researchers and even students to hopelessly oversell their findings“ which is long deleted, but I did read it while it was still up back then. I can’t find a screenshot or anything at the moment, so if you want to call me a liar, go ahead but if you search for that quote you will find many citations.

Also, they claimed „old protocol“ but Ibex was still months from being deployed widespread, so that’s another big downplay.

You mention Signals Desktop app issue, Threema claimed the attacks were unrealistic because they require significant computing power or social engineering, both things that are definitely a risk if you’re trying to protect yourself from bigger intelligence efforts. The issue with Signal Desktop however, required full file system access to your device at which point, there is nothing stopping the attacker from simply using a key logger, capturing your screen, etc.

This is why no big security researchers called out Signal but many shunned Threema. At the end I don’t have a horse in the race for either of them, but I think those are facts people need when making a decision with their private information.

permalink
report
parent
reply

Privacy

!privacy@lemmy.world

Create post

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

Community stats

  • 1.4K

    Monthly active users

  • 230

    Posts

  • 1.2K

    Comments

Community moderators