• kittenzrulz123@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    8 hours ago

    Fundamentally the biggest security vulnerability in every peice of software is the end user. It does not matter how intelligently the software is designed, no amount of preparation can handle the users. That is not to say Signal has no security vulnerabilities but almost nothing can stop someone from inviting a random reporter (if they explicitly invited them). Furthermore I have a conspiracy theory of sorts, I dont think it was a mistake. I think Trumps own administration is trying to backstab him. Maybe they had ideas of becoming more powerful, maybe they thought Trump woupd reduce their power, but I feel that the amount of government leaks and just how complicated they are would suggest infighting.

  • SavageCoconut@lemmy.world
    link
    fedilink
    English
    arrow-up
    49
    arrow-down
    3
    ·
    13 hours ago

    TLDR: some government/military official added a reporter to a Signal group were some high profile people were discussing and sharing war plans. The app’s encryption is perfectly fine. It’s just clickbait.

    • Cocodapuf@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      34 minutes ago

      What about it is clickbait? That title is really upfront about signal’s encryption being fine.

    • Screen_Shatter@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      58 minutes ago

      Its not click bait, its a great layman’s terms explanation of the app and what it does. This is the kind of article I would send to my parents who are basically tech illiterate when this topic inevitably arises. It also clarifies points that were poorly reported by other outlets, which is necessary to call out, especially in our current informational climate.

    • gjoel@programming.dev
      link
      fedilink
      English
      arrow-up
      10
      ·
      21 hours ago

      I usually use Genocide Palestine. It’s actively developed and supported on all major platforms, in pretty much all countries.

    • Deceptichum@quokk.au
      link
      fedilink
      English
      arrow-up
      36
      arrow-down
      2
      ·
      1 day ago

      Have you tried iWar by Apple? I find the mind-mapping tool really helpful for collaborating where to strike next.

        • njordomir@lemmy.world
          link
          fedilink
          English
          arrow-up
          12
          ·
          1 day ago

          Also, if you want to have more than one war at a time you’ll need to purchase add on slots for $4.99ea.

      • RageAgainstTheRich@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        1 day ago

        You can even try out their new AI feature. After 3 strikes, it learns who you like to strike the most and will give suggestions containing the most packed areas with as many children as possible. It also has in-app quests to complete such as wiping out a whole family in 1 strike.

        It rewards you with points you can spend in the store to buy skins and other cosmetics for your missiles.

        If you signup with your nintendo friend code, you can unlock the banzai bill skin.

    • oppy1984@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      ·
      21 hours ago

      Battle plans you use Signal, war plans your going to want Threema, Session, or SimpleX.

  • CobraChicken3000@lemmy.ca
    link
    fedilink
    English
    arrow-up
    32
    ·
    1 day ago

    Very informative article. By most measures, it is pretty terrific at encrypting messages and protecting your privacy, just not when it’s wielded by idiots.

  • SmoothLiquidation@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    ·
    1 day ago

    I understand how the public key encryption works when you are messaging person to person. Does anyone know how it works with group chats?

    • Zak@lemmy.world
      link
      fedilink
      English
      arrow-up
      38
      ·
      1 day ago

      Each participant is sent a separate copy of each message encrypted with their own key.

      • wewbull@feddit.uk
        link
        fedilink
        English
        arrow-up
        3
        ·
        14 hours ago

        This is one way that signal differs from WhatsApp e2e in groups. In WhatsApp the server replicates the message out to all clients. It can’t read the message but it knows the recipient list. In Signal your phone sends the message several times, so only members of the group know who is in the group.

        • Natanael@infosec.pub
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 hours ago

          The encryption still works roughly the same, the difference is mostly visible metadata.

          Multiple bundles of encrypted message + decryption key & recipient tag for 1 person, or one bundle of the encrypted message and then keys for multiple people & recipients which the server can separate out when relaying the message

          (message keys are encrypted to each recipient’s keypair*)

          *simplified because I can’t be bothered to explain how deniability is implemented. Just look up the Signal protocol’s ratchet

    • wewbull@feddit.uk
      link
      fedilink
      English
      arrow-up
      6
      ·
      14 hours ago

      Absolutely right. Messages of the type they sent should never be on a public network whether they are encrypted or not.

      • Natanael@infosec.pub
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        5 hours ago

        The military does tons of stuff over public networks, the key is using vetted hardware and their own VPN and communication tools which allows complete control over recipients.

        No random unaudited consumer devices which might have various exploits known to outsiders, which might fall into the hands of spies, and which DEFINITELY does not have any active security monitoring.

    • kn33@lemmy.world
      link
      fedilink
      English
      arrow-up
      43
      arrow-down
      2
      ·
      1 day ago

      Signal is gaining the network effect. Session is not. Don’t let perfect be the enemy of good enough.

      • nyamlae@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        9 hours ago

        To be fair, variety makes groups more resilient. If Signal were to ever become compromised somehow, people who use other apps like Session will be okay.

        It’s not a zero-sum game, either – people can use Signal and other apps.

    • rottingleaf@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      21 hours ago

      I think there was an article recently about Session devs, first, having their protocol derived from Signal’s, second, not knowing what they were doing with that, which would discredit it pretty hard.

      Also everything is traceable, it’s a question of effort and who you piss off.

      • Amoxtli@thelemmy.club
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        9 hours ago

        You don’t know what you are talking about. Just because Session is a fork of Signal doesn’t mean it isn’t better. Session adds identity protection and it is decentralized. There is no personal information needed to create accounts; no phone number or email required. There is no metadata storage. Had the Trump cabinet used Session instead of Signal, there would be no evidence to the identities of the individuals messaging each other. Signal requires a phone number to have an account which traces to an identity and metadata that logs time and date. The leaked war plans were not from encryption failing, but traceable identities by an insider.