Downsides of Signal alternatives compared to Signal?
Downsides of Signal alternatives compared to Signal?
Signals UX is no better than SMS apps. People I’ve tried to convert all say the same thing.
But it’s still the most secure/privacy minded messenger.
xmpp has a variety of clients for desktop and mobile. You cannot dismiss them all as having worse ux than signal.
The same is true for matrix.
Dunno, it’s fine for me. As a messenging app it moslty gets out of my way and lets me communicate. It has all of the important functionality and creature comforts. Also, it already has some bloat (stories, whatever that crypto payment thing was/is). And the UI / UX is perfectly fine as is.
Although, as a dev myself, I hate UX work, it’s just boring and unfulfilling. I get why UX is often an afterthought. First it has to be functional, anything beyond that is secondary.
Dunno, it’s fine for me. As a messenging app it moslty gets out of my way and lets me communicate. It has all of the important functionality and creature comforts. Also, it already has some bloat (stories, whatever that crypto payment thing was/is). And the UI / UX is perfectly fine as is.
Although, as a dev myself, I hate UX work, it’s just boring and unfulfilling. I get why UX is often an afterthought. First it has to be functional, anything beyond that is secondary.
That’s a good question. I wonder if there are available user numbers for them.
I imagine it’s regional and depends on what communities you are in. SimpleX chat seems pretty popular these days in privacy circles but I could see something like Briar being useful if traditional networks weren’t reliably available for example.
The major one that concerns me is who is behind them. Even if we trust that their encryption is not backdoored, there is a lot of information that can be gathered just from the frequency of messages and who they are between.
If it came out that a three letter agency was running one of these networks, it would not suprise me at all.
Yeah but you cant really obfuscate your message destination and timing without using onion routing, and really thats just making it more expensive to compromise and run. That said other things here do make it seem like a honeypot…
Its fully open source though, even the server. Might not be that hard to fork it and let people host their own servers.
Onion routing isnt a foolproof answer either, if the three letter agency runs the entry/exit nodes. There are lots of rumors of tor being compromised.
I wasnt clear in my original comment, but I do trust Signal mostly (naively?), its the other Signal forks/clones that i do not trust at all. So if someone forked Signal and made it self-hostable, that would be interesting, but near impossible for me to trust.
Being open source doesnt mean its not backdoored, see xz. ;)
Lots of rumors, very little evidence.
There’s a lot of really bad stuff on Tor. Like, really bad; probably worse than you’re imagining. Things that make the old rotten.com stuff look like a child’s birthday party. If Tor was actually compromised, the people creating and uploading that stuff would be grabbed quickly. Instead, LEAs have to cooperate globally and run long-con sting operations in order to identify people in order to bust them. Most of the time, they’re busting people that use Tor due to social engineering or one kind or another, and the remaining times it’s because someone fucked up configuration on a site.
If everyone gets busted all at once (2022-2024 market takedowns is as close to that as it could come IMO) then everyone immediately stops using tor and starts using i2p or freenet or whatever system they may not have broken yet. That’s baaahd for business, said the wolf in sheep’s clothing.
Although they did run a cp site for months before shutting it down, so they’re clearly not opposed to the long-game, especially if it involves national security (it does.)
Freenet was never really anonymous; there have definitely been busts from Freenet. IIRC it’s distributed, but not anonymized; I haven’t really done anything with it in ten years or so. i2p is probably pretty solid, but it’s often very difficult to use. I’ve tried it, and most of the time couldn’t make configurations work. Or else the eep sites I was trying to reach were offline. IDK.
I dunno; given that Tor was originally designed to be extremely difficult to track, and was designed by spooks, it’s plausible that they aren’t able to crack their own security. If they controlled enough of the network, they could, in theory, track individual users. But it would be extremely resource intensive, and they would already have to be targeting you.
IIRC, the case you’re talking about involved social engineering to gain admin privileges, then illegally hacking computers through malicious javascript to leak their real IP. IIRC a huge number of the cases ended up getting thrown out because there was no way they could legally do what they did, and the convictions they did get were ones that they would have been able to get without the illegal hacking. That was, what, something like ten years ago? Around the time that The Silk Road got taken down? (That was taken down because the site owner used the same username both on the Silk Road and on a clearnet site; he essentially doxxed himself.)
Oh, yeah, I’ve been seeing that a lot of it has been really dragging for, like, the last year or so.
Yes, if a state-level actor is able to get control of all the nodes, then everyone is pretty much fucked. I suppose that, with enough nodes, you could make that kind of attack really, really hard. I’m also guessing that Monero transactions are taking a really long time right now to go through? I saw that the Finnish (?) gov’t claimed to have ‘broken’ Monero, but they’re not giving any technical information about their claims, and most current speculation is that they busted the guy doing other shit that they were able to trace link to Monero transactions. (I don’t really keep up with Monero; last I knew, there wasn’t a good wallet that didn’t require downloading the whole blockchain, and my home internet is slooooooooooooow.)
It’s not even a matter of gaining control of nodes, they can simply blackhole your access to good nodes so you end up with nodes controlled by them. Easy but loud, although it seems to be what’s going on in a number of cases, and not many people are talking about it. Tor used to alert you to this, but now it’s quietly tucked away into a log file. There are other vulnerabilities present in tor and the tor project devs don’t seem particularly interested in them, with the DoS attacks requiring the community itself to step in with hacky solutions. I’m of the mind (never would have found myself saying this) that the tor project at large is compromised.
Monero is currently being hit by a (likely) black marble attack which is why it’s so slow. They’re basically flooding transactions (1/3 to 2/3 of all transactions able to be processed at any given time) so that the anonymity that makes monero work is severely degraded. Whether it breaks past transactions remains to be seen, but it absolutely weakens the anonymity of transactions done during (possibly shortly before and after) the attacks.
I feel like a lot of the military probably uses Facebook messenger because of the convenience.
I imagine everyone is creating groupchats and assuming other people use Facebook just like pretty much every other job.
Totally but people do get careless. We’ve seen it a few times with the war in the Ukraine. /r/VolunteersForUkraine is a good example of that.
I imagine it could be difficult stressing the importance of it to loved ones.
What’s your use case? Likeminded techie friends? Family members?
Signal works well as an alternative to the likes of Telegram and WhatsApp, even if it still requires a phone number and is centralised. Far easier to explain to the family instead of “oh well you can sign up on this website or this website or that website”.
Granted, if you want to host a small Matrix server just for the family, then go for it.
Downsides of Signal alternatives compared to Signal?
I guess that anything out there performs better and faster syncs than Signal… so much for the great Signal.
Signal’s mission and sole focus is private communication. For years, Signal has kept your messages private, your profile information (like your name and profile photo) private, your contacts private, and your groups private – among much else. Now we’re taking that one step further, by making your...
Let’s not forget that for those looking for alternatives, a key feature of signal is/was its SMS integration.
I use silence, a fork of signal.
I’ve had good fortune converting some family and friends to use XMPP.
People always mention fragmentation, and while there is some truth to it, it can be massively minimised by choosing blessed clients and servers for them to use.
In my case, I run my own server, and thoroughly test the clients (especially the onboarding flow) that I expect them to use, so that any question they have, I can help them out with quickly. Since we’re all on identically configured servers, it minimises one whole class of incompatibilities.
There is still unfortunately a bit of a usability gap compared to Signal - particularly on the iOS clients. But they have come a long way and are consistently improving.