add to the fact that #kyc was involved, due to the fact you have to give #pii information to signal (phone number) to signal, that puts peersonell in danger.
also, i highly doubt it was on classified military phones, as i think you can't have signal on classified mobile devices.
especially since i see signal noware on the nsa commercial solutions for classified list. in fact, the NSA *requires* everything to be controlled. signal does not operate a private network on the premus that you can connect to a VPN server directly controlled by signal. yes, it operates tls/srtp which is a layer, but the NSA mobile capability package (yes i read the complex termonology i almost fell asleep doing so) requires 2layers inteernally, a VPN client to initiate an encrypted connection, and another VPN or tls/srtp for the outer layer. signal only has one of these layers. and even then, even if signal is encrypted, signal has information such as your phone number, the time you sent certain messages, the usernames of the users on signal, and that alone puts people in danger
@liahaberman i can respect the work you've done on this. that said, i have to laugh too. you're asking a team to improve #privacy for a product that has consistantly violated privacy several times on severAl months. if you are using #facebook / #meta you should know this is going to happen. you should *expect* this. as one of my friends @kkarhan says, #kyc is the elicit activity, and facebook asks for a lot of kyc.
also, this is evident by the amount of #gdpr violations in the #eu meta has received. don't get me wrong, i'm absolutely not discrediting you, i'm glad you got this out. i'm just saying you're shouting at a wall. meta has consistantly violating privacy and #cybersecurity in some cases, and will continue to do so.
so as much as i agree, meta is simply going to laugh in your face rather than do you any good

@adisonverlice even if an #MVNO isn't demanding any #KYC whatsoever (i.e. #prepaid are offered OTC in most juristictions) it's NOT "#Anonymous" but merely #pseudonymous as it's trivial for governments to utilize existing and mandtory "#LawfulInterception" appliances to create that #PII chain.

#PhoneNumber <=> #ICCID (#SIMcard) <=> #IMSI (SIM profile) <=> #IMEI (Phone/...).

So if #Anonymity is important, NONE of these details have to be linked somehow even circumstantial.

  • Bought/paid for the phone/SIM/ a single top-up with ec/CC/PayPal/SEPA/… = busted due to circumstantial connection.

  • Use the SIM in any device? Consider them circumstantially connected forever: #ICCID <=> #IMEI.

  • Same applies to #eSIM|s: #EID <=> #ICCID <=> #IMEI.

Add to the fact that most places have #CCTV, and assume that they'll keep recordings for the maximum permissible duration if not longer and oftentimes even use questionable cloud services and you get the picture.

  • I.e. in Germany the maximum permissible storage duration is 72 hours (if nothing hapoens that warrants a longer storage i.e. burglary/theft/robbery/arson/...) so anonymous top-ups would necessitate paying cash at a place one's not been known at (i.e. some kiosk) and waiting at least >72 hours (and checking on the purchase location) before redeeming the top-up code (i.e. dialing *104*1234567890123456# )...

So any #privacy-based service should never ever & under no circumstances demand a Phone Number!

  • Instead any privacy-focussed service should use #OnionServices, host their own #OnionService or at least #DontBlockTor and allow users to use it via @torproject / #Tor to use and signup. (But don't forget circumstantial connections there either!)

  • Also the less details they want or store and the least traffic they generate the harder it is to correlate traffic & users.

ok...so we have to talk about this.
https://m.youtube.com/watch?v=1MoYHJaKsZE&pp=0gcJCa0JAYcqIYzv
first off, encrypted messengers, like whatssapp, *require* #kyc in order for you to sign up.
that is also baught by law enforcement. ayour contence, granted, are encrypted, but sometimes metadata is even more important. as #nsa director michael haden once said: "we kill based on metadata".
should tell ya something. even if some providers, such as mint mobile in the US, don't require direct identification via a government ID, it is still kyc eitherway. and as @kkarhan once said, KYC is the elicit activity.
second, privacy and security settings? lol don't make me laugh. you don't actually know what the client is collecting when you use it. it's offen not open source, and offen still is able to gather data on you in other ways.
or it could just saay off, but actually be on.
the only way to *truely* regane privacy would be to use #selfhosted applications and open source apps.
#surveillance #tor #whatsapp #signal #privacy #cybersecurity
Universal surveillance is here—how do we fight back? | Eliza Orlins | TEDxHCCS Youth

YouTube

Home sweet home: denied entry to two night buses in a row, because

1 The #HSL android app is broken yet again ("failed to purchase ticket" after the mobilepay dialogue)
2 The new ticket machines do not accept cash
3 The bus drivers do not accept cash and just angrily repeat "go, go" pointing at the door

#Finland #PublicTransport #MassTransit #Cash #KYC #AML

@BingsPingsDings @DeltaWye @abel pretty shure that already exists.

Another day, another victory for the valiant grunts of the anti-fraud solutions frontline

#Banks #Payments #PaymentProcessors #AML #KYC #Tax #incompetence #tor

I'm going to be brutally honest with you. I'm not really empathetic towards the users of the T. app. Yeah your privacy was violated I get it. But you also violated the privacy of other men. If you wanted to see If the man you had a crush on was bad or had any reputation, you should have got to know him. And maybe do your own research. Not use some stupid application. When I meet a woman for the 1st time and they want to have some kind of relationship with me I have to get to know them 1st. Usually over the course of a couple of weeks. Maybe a month or more. I don't I don't use some stupid application. Especially 1 that requires #kyc .
There was 1 video, I have to find it, Were someone a woman ironically thought women had no standards. As much as I disagree with that, There there are those women who don't have standards ones who just sit on their ass While using apps like the T. app And expect payment or something. Also keep in mind that men literally work at the T. app. The CEO was Sean cook, who is a man. You're trying to protect yourselves From men, yet you got a man running the app PL how you can't do your research. It's absolutely hilarious. Now this doesn't affect me in any type of way. So don't worry I'm not affected by it. I just find it funny is all. I find it funny that you think an app which requires KYC Is somehow #anonymus .
I believe if you think A man is cheating on you you should probably just walk away. Or if you think he's going to cheat on you then leave him alone and walk away. That's what I did with my woman Because I thought she was cheating on me. I said nope, we're through. Now given she was at my house when the affair occurred and it occurred on computer so I already had the red flag. But if I really thought she was cheating on me I would have just walked away. Besides there were more Intensive and illegal problems than that so that's not all that contributed to it. But hey, thanks for giving us the comedy show known as the Tea app breach. I'll have something to laugh at for the next few days
@troyhunt Funny enough, at least 1 of the women were calling it a, whisper, network to talk about bad men. And yes I'm saying this as a man. I think a real whisper network would use #tor #onion services And would not require you to use #kyc Along with only allowing you to upload text, no images, so that everyone would maintain their #privacy .
This application is not sharing information An anonymous way, so it's probably not private by any means. I think there are hotlines and other anonymous sharing applications that do a much better job than T., which quite literally and unironically spilled the tea.
I can already tell this is going to lead to enormous amounts of doxing.
@aetus @monocles well, #monoclesXhat is an #XMPP+#OMEMO #chat client.
#PII = Personally Identifyable Information
#KYC = Know Your Customer
#E2EE = End-to-End - Encryption
#SelfCustody = You (and only you) as a user hold all the keys.