Just saw someone advocating progressive movements organize on the Fediverse.

BE VERY VERY CAREFUL ABOUT SAYING STUFF LIKE THIS.

-Most fediverse tie-ins are not architected to protect you. For instance, Mastodon Direct Messages are not encrypted and admins can access them.

-Most instances are hosted by ordinary people who don't have the time, knowledge, or resources to fight subpoenas in either criminal or civil actions.

Meet here. Support each other. Cheer each other on. Show solidarity, and elevate and amplify each other.

Organize in much more restricted environments, like end-to-end encrypted messengers like Signal.

@neurovagrant no, because #Signal is a #proprietary #SingleVendor / #SingleProvider solition that is subject to #CloudAct and thus can't be secure by design.

If you really want #InfoSec, #OpSec, #ComSec & #ITsec, then #SelfHosting everything is key.

But that'll require #TechLiteracy and may not scale well...

IMHO self-hosting a #Zulip Server works good for organizational structures.

@kkarhan @neurovagrant Turn off Contact Discovery and Signal basically eliminates the need to trust the server. It doesn’t matter what the server is running because all metadata except the recipient is encrypted. Your group names, group participants, reactions, typing notifications, profile pictures, message bodies, etc. are all opaque and indistinguishable.

Matrix and XMPP spew all your metadata across all servers participating in a room, encrypting very little besides message bodies. There are some progressing XEPs to encrypt more metadata, but we shouldn’t rely on platforms like Matrix or XMPP in their current form to hide our metadata because they don’t. Participants, probable cause from linked profiles outside the conversation, timestamps, group information, etc. are all as private as your Fedi DMs.

The only thing that comes close to Signal with something like Tor would be Briar, but I don’t know how well offline messaging works on it. I can’t speak for alternatives like SimpleX since I’m not familiar.

@Seirdy @neurovagrant just use #XMPP over #Tor then...
Also it's not done with "Just use Signal" because #ITsec, #InfoSec, #OpSec & #ComSec are all interlinked.

#Signal is for gullible #TechIlliterates that are too lazy to learn despite being #TechLiterate is part of their job.

Assholes like #GlennGreenwald for example...

Signal will inevitably crash down like #EncroChat and #ANØM before...

@kkarhan @neurovagrant All of the concerns I raised were at the application protocol layer. Tor is a TCP anonymizer.

@Seirdy @neurovagrant use a client that doesn't shit itself out, like #MonoclesChat and #Gajim...

Also unless I can preproducibly built client and server myself I won't trust any app or software at all!

@kkarhan @neurovagrant Ok. Let’s say I use one of those clients. I create a room and my friends, using those clients, join it. Say we all use the same server, and the server gets compromised.

What data is at risk?

  • The name of the room
  • Members of the room
  • Timestamps of encrypted messages
  • Senders of encrypted messages
  • Group member display names
  • Group member profile pictures
  • Description of the room
  • Who sent DMs to whom
  • Most active group members
  • A given message’s sender and recipient.

The full Signal Protocol is far more than Signal’s double-ratchet encryption protocol. It prevents any of this from leaking, and assumes the server has already been compromised. All the server sees is the recipient of a message; the sender is sealed on the application protocol layer.

@Seirdy @neurovagrant You purposefully refuse to accept the core problem:

#Signal is a.#centralozed #SingleVendor / #SingleProvoder solution that is subject to #CloudAct and obviously implementing #Govware #Backdoors.

Why else are all the #tinfoilhat|ed conspiracy theorists on #Telegram and not #Signal??
https://www.youtube.com/watch?v=G1thc5DSHwA

The cost of shilling VPN companies is your reputation.

YouTube

@Seirdy @neurovagrant

And since #Signal isn't financed by it's users, it must finance itself somehow...

I.e. #PRISM membership?
https://www.youtube.com/watch?v=WVDQEoe6ZWY

This Video Is Sponsored By ███ VPN

I tried to write a more honest VPN commercial. The sponsor wasn't happy about it. • Get ██ days of ███ VPN free at ██████.com/honestThe ASA ruling I referenc...

YouTube

@Seirdy @neurovagrant because when "push comes to shove", admins held at gunpoint will integrate #Govware #Backdoors into the #centralized #SingleVendor / #SingleProvider service...

https://twitter.com/thegrugq/status/1085614812581715968

thaddeus e. grugq (@thegrugq) on X

I’m gonna tell you a secret about “logless VPNs” — they don’t exist. Noone is going to risk jail for your $5/mo https://t.co/Q2aOQJkG4g

X (formerly Twitter)
ProtonMail Sends User IP and Device Info to Swiss Authorities.

YouTube

@Seirdy @neurovagrant Case in point: every big provider will do #Govware #Backdoors because otherwise their business model would be illegal around the globe as per #Telco laws..

The only exceptions are organziation-internal & privately self-hosted systems.

Thus everythibg that is as #centralized as #Signal is inherently insecure.

Whereas I can run an #XMPP server #airgapped in a #LAN or even inside a #VPN that is only accessible via #Tor...

@kkarhan @neurovagrant Sigh. You’ve repeated yourself.

What data will a compromised signal expose?

You are the NSA and have stormed into the Signal datacenter and placed your backdoors everywhere, and can monitor all traffic. I am using a Signal client with a reproducible build signature. What do you now have on me, given the constraints imposed by my client?

@Seirdy @neurovagrant that signature is useless since I literally MITM all traffic and have literally replaced all keys.

A single update of the server have made it trivial...

IOW: You only need to hold the right people at gunpoint to do so...

And I get you €500 that they're under gag order and have integrated a #Govware #Backdoor...

@kkarhan @neurovagrant Alright, I’m going to link you the Wikipedia article for the Double Ratchet algorithm and mute this conversation since I think it’s clear you don’t understand how the modern e2ee key management algorithms work and how they differ from e.g. TLS to prevent this exact thing from happening:

https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm

Double Ratchet Algorithm - Wikipedia

@Seirdy @neurovagrant so you admit defeat amidst the fact that you refuse to acknowledge the fact that a #centralized #SingleVendor / #SingleProvider solution is impossible to secure against the will of the government it's incorporated under (as per law)...

Not Opensourcing the backend and it's APIs is literally violating #KerckhoffsPrinciple so hard it disqualifies any security claims as fanboyism!

@Seirdy @neurovagrant instead of Wikisplaining me like the ignorant #TechBro you are you could first answer me the simple question:

Why isn't #Signal #decentralized?
Why don't users hold the #PrivateKey|s??
Why can't you #SelfHost a #Server???

But that would shatter your naive worldview and expose your escalating commitment as the bad thibg it is...

https://pleroma.envs.net/objects/7bec917f-f678-4af9-b0de-fd638c407125

Kevin Karhan :verified: (@[email protected])

@[email protected] @[email protected] @[email protected] because #Signal can't be #SelfHosted (unlike #XMPP and even #Zulip) I can't recommend or use it any professional capacity because I've to comply with #GDPR & #BDSG and that includes evidently having control over data and being able to comply with #auditability and #datadeletion requests in any organization. Also #Signal does collect #PhoneNumbers and enforces #Cyberfacist embargos.

Mastodon 🐘