• 0 Posts
  • 9 Comments
Joined 2Y ago
cake
Cake day: Jul 01, 2023

help-circle
rss

Just one of the many perks of a stable monogamous relationship.


A website set up by an unknown Dane

The website, called Fight Chat Control, was set up by Joachim, a 30-year-old software engineer living in Aalborg, Denmark.

Does anyone fucking proof-read anything any more? Or does unknown just mean ‘not famous’ these days? FML.


Right. Exactly my point? Phone numbers are not, like, the only way to identify a user. You have to know who they are. You posted an xkcd but failed to derive the conclusion that if a user is ‘compromised’ and they know who they’re talking to, then so are the people they’re talking to, regardless of whether phone numbers are involved. There’s no practical way to mitigate against that, it becomes a paranoid’s nightmare.


Ok but a messaging app that doesn’t let you know who a message is from is completely pointless? I feel like you’re not really addressing this issue here


No the most important thing a chat app needs to do is send messages between the intended recipients making them unavailable to anyone else. Signal does this. You’re worried about ppl receiving messages and knowing who they’re from. Generally knowing where a message is from is considered a feature – if you want anonymous broadcast, pick a different technology that’s geared towards that


If your threat model is deanonymisation of chat users via phone numbers after one chat is fully compromised, then yeah I guess you need to register the accounts with relatively ‘untracable’ phone numbers (ie unregistered or incorrectly registered burner sims), but that’s not my threat model. I’m more concerned about server-side broad-spectrum government surveillance than I am about targeted device seizures. And of course there are mitigations even with data access on device seizure, provided you’re unwilling to provide device passwords. But, like, if you’re cooperating to the point of providing passwords you’re probably sharing what you know about other users identities anyway, so it’s a very niche case this applies to.


Does it really? Iirc, you can determine: when the account was made, and when the last message was sent. This doesn’t sound ‘highly vulnerable’ to me… Doesn’t permit inspection of metadata e.g. contacts, so as vulnerabilities go it’s pretty weak sauce


What are you referring to? I’ve read many security breakdowns of signal and nobody who knows what they’re talking about has ever mentioned a back door