Maybe the difference is that the signal developers aren’t rich people flying around the EU on private jets? Maybe there’s no value in targeting the signal devs because they can’t legally be expected to moderate chats they literally can not access? Maybe it’s not worth backdooring because it’s open source?

nitrolife
link
fedilink
-1
edit-2
4M

Maybe the difference is that the signal developers aren’t rich people flying around the EU on private jets?

Telegram is not first durov project. Durov create VK. That is number one Russian facebook.

Maybe there’s no value in targeting the signal device because they can’t legally be expected to moderate cats they literally can not access?

Can them connect any number of users in chat? That mean that them have access in any chat. And them should follow all USA laws of course.

Maybe it’s not worth backdooring because it’s open source?

Telegram open source too. And have many open client apps. For example clients without AD API support. How much custom client apps have signal?

kali
link
fedilink
24M

Telegram’s servers are not open source. Telegram’s client is. If you make a back door in a messaging software, you’d want to do it server-side which means the users can’t tell if it’s backdoored as Telegram’s server’s source code is not available.

Alternatively; Signal’s server code is open source, so if they put a back door in it they’d either have to lie to their users, or publish the back door in their code.

nitrolife
link
fedilink
1
edit-2
4M

Telegrams servers are not open source. Telegram client is. If you make a back door in a messaging software, you’d want to do it server-side which means the users can’t tell if it’s backdoored as Telegram’s server’s source code is not available.

That’s why cryptography don’t trust ANY server side. For example signal server software can be don’t same as github signal server software. And that’s why alice and bob in crypto chats can check keys after handshake through server. But in signal you crypto for chat rooms with multiple clients. Can you check how much client in you chat? I don’t find how. In telegram you always know that 1to1chat only 1to1.

Alternatively; Signal’s server code is open source, so if they put a backdoor in it they’d either have to lie to their users, or publish the back door in their code.

And what problem with that?

P.S. For example system of technical means to ensure the functions of operational investigative measures installed an all mobile operators anywhere. But someone tell you something about that? No. Because that a law, not backdor.

kali
link
fedilink
14M

But in signal you crypto for chat rooms with multiple clients

Signal doesn’t backfill your messages though, it just sends the new messages to both devices. I don’t see how this makes it less secure than Telegram.

nitrolife
link
fedilink
1
edit-2
4M

I don’t see how this makes it less secure than Telegram.

Telegram less secure than signal in normal chats. Key saved on server side and, technically, anyone can read all messages. That’s argument was used when men says that telegram don’t secure some time ago.

But what kind of secure you expect? Random admin in your internet provider can’t read telegram and signal messages anyway. Messengers developers can’t read signal messages in base case, but can read telegram public chats. That’s true.

But what happened if we go to next level and check telegram 1 to 1 crypto chats vs signal chats. Signal chats can read messenger developers with basic hack (add one more person in chat and collect messages on disk). Or can read FBI by law. That mean in signal, as in telegram public, all work on trust, not in cryptography. Telegram 1to1 chats only 1to1. No one can’t access to that (without change keys). And for best secure rekeing happens every 100 messages or 1 week. And one more, you can register telegram account without number and hide your IP with mtproto-proxy. That’s why Durov arrested in frist place. And after that men tell that signal more secure then telegram… An what place?

@balsoft@lemmy.ml
link
fedilink
1
edit-2
4M

Signal chats can read messenger developers with basic hack (add one more person in chat and collect messages on disk)

How exactly do you think that would work? To add a new recipient the client needs to explicitly encrypt messages with a key available to that recipient. What command in the Signal protocol would trigger that action without first establishing trust in the recipient? (FYI when adding a new device, there is a key-exchange and verification process, which requires access to some other device with keys already on it).

Create a post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

much thanks to @gary_host_laptop for the logo design :)

  • 0 users online
  • 57 users / day
  • 383 users / week
  • 1.5K users / month
  • 5.7K users / 6 months
  • 1 subscriber
  • 3.12K Posts
  • 78K Comments
  • Modlog