Turns out that when using end to end encryption it’s very important to know who is the end

@maldr0id reminds me of people who wondered how scammers got their credit card ...

Bu bu but it had a padlock in browser .....

@maldr0id the Internet is a series of tubes. https://youtu.be/_cZC67wXUTs
Series of Tubes Music Video

YouTube

@maldr0id

OMG I tried to explain this to a bank once who couldn't understand why I didn't think their app was very safe and they seemed to believe mere encryption would save us all from hacked devices.

@maldr0id
"this is the end, my friend.. the end.."

@maldr0id

Bell end to bell end encryption.

@maldr0id And also who controls group membership, see Matrix.
@maldr0id I give it one day till the journalist is jailed for hacking and espionage.
@maldr0id and people wonder why I go on about obscure cryptography like channel binding... it does nothing except make sure your endpoints aren't changing lol

https://csb.stevekerrison.com/post/2022-01-channel-binding/
Channel Binding: Should you be using it? {CSB}

TLS doesn't prevent MITM attacks from phishing sites. Channel binding can help with this, sometimes.

Steve's {C}yber {S}ecurity {B}log
@maldr0id Some might describe some "ends" as "bell ends".
@maldr0id “wait… who invited Mallory?!”
@maldr0id seems like one of the ends was literally in Russia which seems even more problematic than the editor of the Atlantic
@maldr0id "You might be having a private conversation with satan"
@maldr0id good remark for all the "secure your data by using a VPN" services.

@maldr0id it's called #InfoSec, #ComSec & #OpSec.

  • Without it #ITsec is nonexistant.

Not to mention people got jailed for far less shite!