X launches E2E encrypted Chat
X launches E2E encrypted Chat
I’m not the one who you asked, but I’d still give some feedback of my own. Musk as a person is a difficult character. I would even go as far as calling him narcissistic.
I generally can’t trust someone who seems to put himself first at everything to handle anything related to security when the role allows him to exploit it for his own gains. And I do not trust someone who supports political groups known for trying to oppress minorities to defend actual rights for free speech.
That a business has to comply with local laws to operate in a country? You need a source for that?
That they challenge them in court whenever they can? Sure:
x.com/globalaffairs/status/1920426409358455081
X received an order to restrict access in Türkiye to the account of the now-detained Mayor of Istanbul. While we have followed Türkiye’s order regarding the account, we strongly disagree with the order and are challenging the order in court. In the spirit of full transparency, we
When has X under Musk had anything happen to doubt their encryption?
Musk routinely hires young unqualified technicians, and abused, laid off, or otherwise alienated much of the top talent at Twitter, in the name of cost savings.
There’s plenty of other stories out there of Musk’s ego interfering with his staff’s ability to do their jobs properly.
Most recently, the new DOGE has suffered substantial security lapses, associated with under-hiring and under-provisioning against cyber security threats, under Musk’s leadership.
Even before Twitter was aquired, Twitter had an embarrassing memorable history with public figures suffering from security incidents caused by Twitter’s own staff, training, technology or processes. This was arguably not a huge problem for an almost fully public messaging platform, but could be disasterous for anyone relying on this new E2EE solution, if it is incorrectly implemented.
The talent needed to correctly implement secure end to end encryption is rare, on a good day, for a good employer with a strong history of loyalty to their staff. X arguably has little to none of that going for it, today.
There’s very little reason to assume that X, under Musk’s current leadership, has correctly securely implemented end-to-end encryption, and there are reasonable reasons for people to fear that E2EE developed at X may have serious security flaws.
Most recently, the new DOGE has suffered substantial security lapses,
Did they? What? The made up ones where people claimed that DOGE gave russian hackers access to databases despite DOGE never even requesting access to their systems?
Even before Twitter was aquired, Twitter had an embarrassing memorable history with public figures suffering from security incidents caused by Twitter’s own staff, training, technology or processes.
Funny that you say this after you said this:
Musk routinely hires young unqualified technicians, and abused, laid off, or otherwise alienated much of the top talent at Twitter, in the name of cost savings.
So twitters staff, training, technology and processes were the source of these embarrassing incidents…but then Musk shouldn’t have gotten rid of them?
but could be disasterous for anyone relying on this new E2EE solution, if it is incorrectly implemented.
And there’s nothing to say that it is incorrectly implemented other than hopes and dreams by people who want it to be.
The talent needed to correctly implement secure end to end encryption is rare, on a good day, for a good employer with a strong history of loyalty to their staff.
Absolutely not true lol. Secure end to end encryption is a solved problem. It’s not hard to implement.
It’s not hard to implement.
Oh sweet summer child.
zdnet.com/…/twitter-rolls-out-encryption-for-dire…
Twitter rolls out encryption for direct messages but with key limitations
Both the sender and recipient must be verified, while group conversations and attached media aren’t supported by the encryption.
For an existing chat, tap the Info icon. If the option is available, you’ll see a button for Start an encrypted message that you can just click. For a new chat, turn on the switch to enable encrypted mode. Write your message, and then send it.
So what is the difference between what they’re rolling out and what they added in 2023? Support for more users, maybe? Support for non-verified users?
EDIT: Apparently it had been disabled earlier this week?
theverge.com/…/xs-encrypted-dms-are-being-put-on-…
This article implies that it was to address some of the limitations in the 2023 feature, though isn’t explicit about what is being addressed:
According to the document, encrypted DMs are only available if you are a verified user (somebody who pays for Twitter Blue), a verified organization (an organization that pays $1,000 per month), or an affiliate of a verified organization (which costs $50 per month per person). Both the sender and recipient must be on the latest version of the Twitter app (on mobile and web). And an encrypted DM recipient must follow the sender, have sent a message to the sender in the past, or accept a DM request from the sender at some point.
With recent advances, there is nothing released online that can be believed. A. I fakes are everywhere and in everything
So I wouldn’t trust them even then.
You’re not as smart as you think.
everything can be spoofed. Hell your comment could be.
Network traffic is faked all the time
csoonline.com/…/what-is-fake-network-traffic-and-…
Hell that article is a year old, so your info is a bit dated.
You have a good evening
I’m confused about this conversation. Are you the idiot here, or do you think I am?
Your AI generated article doesn’t have any actual information, doesn’t deal with MITM attacks, and has zero context about how anything it mentions could be used to attack what we’re discussing here.
Unless you have a quantum responder in the chain, there isn’t a currently known way to fake an exchange of keys to infiltrate secure channels secured by keys.
Not only would this destroy the currently existing Internet, you’d be seeing floods of information exfilateates for sale on the black market.
Not only have you not contributed to this conversation, you’ve proven to be absolutely ignorant about the topic, and you are awarded no points.
God have mercy on your soul.
Youngster, your not an idiot.
You just proved my point
See you don’t agree with an article. You think it’s a. I generated. Fine
Prove it beyond a shadow of a doubt. You can’t. …
Your simply not looking at it from a vriepoirnt of having watched this outcome be developed intentionally by controlling men
It is what it is. No amount of name calling, or wishful thinking on your part.
You are making statements that unfortunately have been proven incorrect in the real world.
It’s faked all the time because THERES MONRY IN IT.
If there’s money in it, it is happening. No amount of pretending that a quantum computer( Which isn’t available so is a non factor in reality, so I’ll ignore the irrelevant argument. ) is the only way to fake traffic.
And on to your argument. You’ve proven nothing. Your comment has nothing of substance in it, and what is was Trumpian in focus and meaning.
I truly wish you a good day. I’m too tired of overly confident tech bros to continue this.
The question is whether this actually is E2EE, as it’s easy to fake by using a man in the middle attack and hard to prove. The only real way to prove it for sure is to run a third party security audit, like Signal does.
Taking down the old system doesn’t inspire confidence either, as this downtime could easily been used to interrupt old conversations in order to implement a way to decrypt the messages on the servers before passing it on to the actual recipient, as all keys would have to be re-issued.
Let’s collect past security audits here: Formal audits Year Auditor(s) Sponsor App/Component Published Link Last update / extended 2013 iSEC Partners (NCC Group) Open Technology Fund RedPhone and TextSecure ❌ Blog post 2014 Frosch et al. German Ministry of Research and Education TextSecure Protocol ✅ PDF 2016 Schröder et al. Internet Society Key fingerprint verification ✅ PDF 2016 Cohn-Gordon et al. Various research grants Signal Protocol ...
Without the weights or promotion criterion.
Oh so you’ve seen the weights and promotion criterion and know what musk is changing and when? Cause if you don’t, you’re just spreading conspiracy theories.
Thanks for the rule breaking insult though.
I guess it can be done relatively securely using both the password and the code to derive the encryption key while not storing it on the servers (while 2fa isn’t of any help here given it’s kinda random with shared seed). I, however, doubt it’s done that way: 1st of all, decryption should then only be possible after one enters their account password for the second time, as well as the conversation password (since the password shouldn’t be stored in plaintext after you’ve entered it), and, secondly, that’ll basically drop the chat history as soon as one changes the password, which is neither convenient nor mentioned.
Then, if it works how I assume it does, i.e. the actual encryption key is stored on the sitter’s servers and only retrieved once you enter the encryption password, then they can decrypt your messages (either by immediately using that if the password just tells 'em who they should give the key to, or by bruteforcing the password if it decrypts/derives the actual key), which defeats the whole point of e2ee.
They specifically say they can not decrypt your messages.
Why does everyone in here think that E2E encryption is some insanely hard new thing? It’s been “solved” for years lol. It’s not hard to do.
Because cryptography is hard, especially when you’re trying to do it in a user-friendly manner, with syncing encrypted conversations between devices and whatnot. Like, it’s kinda the whole reason why the classic reply to “how do I make my own encryption algorithm” is “don’t”.
Also, with proprietary platforms you can’t make sure stuff’s encrypted the way they say it is
there’s no way for anyone, including X, to read your messages.
That defeats the purpose of a messaging platform.
I know what they meant, but the phrasing is so, so stupid. Anyone who is considering this platform, should think twice before doing so. If they get the phrasing of such a simple sentiment this, incoherently wrong, what does their code look like and what do the encryption protocols look like? If I’d have to guess… AI slop.