The entire reason SCIFs exist is because encryption technology alone cannot satisfy every threat model.
(If you're doing military stuff, regardless of which side you're on, preventing leaks is literally a life or death matter.)
@soatok Fuck them, where's my invite?!
(had to)
well I'm not the editor of the Atlantic but I kinda want those recommendations
@m @soatok @silvermoon82 Very true, this has always been the biggest problem with crypto software. If you use it wrong, it breaks in ways you can't identify.
Bruce Schneier said, "The difference between attack and defense is you can tell when an attack fails"
@segfox @silvermoon82 @soatok Jokes aside, there is a secure communication product which name I won't mention because of my deep respect for its founder. It offers secure voice and text communication, including group voice and group text.
At some point I realised that the company can totally take over someone's account (they could change their password) and register an additional device in their name. The additional device would be automatically added to all of their E2EE chats and groups (i.e. all crypto secrets would be shared with the additional device).
The user won't know about it until their password won't work next time they try to add a device. There was no notification (at that time) that a new device was added to the account, and no notification in any of the chats or groups that a new device has been added.
The company dismissed my concerns at the time. I threatened to go public with this information, at which point they promised to add the proper notifications (and they did).