this post was submitted on 28 Jul 2024
259 points (100.0% liked)

Technology

70199 readers
4213 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 80 points 9 months ago* (last edited 9 months ago)

Stop promoting "just trust me bro software" in the same title.

Anti-libre software, WhatsApp, bans us from proving its E2EE claims, any claims. It bans us from forking its source code, removing backdoors. It fails to include a libre software license text file, like AGPL, so they control it, not us. WhatsApp, anti-libre software, is a scam.

[–] [email protected] 40 points 9 months ago (6 children)

Wonder how they'd manage that as they both are E2EE.

[–] [email protected] 54 points 9 months ago (2 children)

A French and Dutch Joint Investigation Team (JIT) harvested more than 115 million supposedly encrypted messages from an estimated 60,000 users of EncroChat phones after infecting the handsets with a software “implant”.

Looks like they just hack the phone

[–] [email protected] 27 points 9 months ago* (last edited 9 months ago) (1 children)

https://en.m.wikipedia.org/wiki/EncroChat

So this sounds like the ANOM phone story with extra steps?

I get that they can "access" messages, but the headline feels misleading if it requires full access to the device.

It's not that they're breaking encryption or reading messages in transit, it's more like they're installing malware on specific devices so that they can look at your screen?

[–] [email protected] 2 points 9 months ago

Because truth is more complex and does nor drive clicks. so far every time we see signal in a headline like this, it will generally be "cops had physically access" "no password" or "password leaked"

ie something that encryption is not designed to defend against.

[–] [email protected] 3 points 9 months ago (1 children)

How does one get an "implant" onto a phone?

[–] [email protected] 7 points 9 months ago

You implant it, duh.

[–] [email protected] 23 points 9 months ago (1 children)

Apparently what happened is that French police installed some of malware on the phones to read the messages, and this was now decided to be legal in the UK.

[–] [email protected] 17 points 9 months ago (2 children)

Damn, we'll need those linux phones working soon.

[–] [email protected] 7 points 9 months ago (1 children)

Then they enforce the chipmakers to put backdoors in the chips themselves

[–] [email protected] 7 points 9 months ago (1 children)

I'd wager they already have

[–] [email protected] 4 points 9 months ago

For x86 platforms it’s called Intel ME and AMD PSP.

[–] [email protected] 2 points 9 months ago (2 children)
[–] [email protected] 4 points 9 months ago (1 children)

You'd have enough control over the software that you can ensure nothing like this happens

[–] [email protected] 6 points 9 months ago

The basic security stuff exists on Android and iOS as well, namely full disk encryption. When that is defeated through a missing or bad password nothing keeps them from installing their malware with device access.

If they got in through an external security vulnerabilities in some software package the situation is also the same on either OS.

load more comments (1 replies)
[–] [email protected] 7 points 9 months ago (1 children)

Honestly mentioning Enchrochat together with other mainstream message clients is kind of misleading. The Enchrochat message client was also E2EE. However Enchrochat was also a company that sold their own mobile phones with a prorietary OS on it together with own sim cards and only those phones were able to connect to each other. And law enforcment had enough evidence that they sold those hardware in shady untracable ways similar to drugs. At that point there was no western government that didn't want to help seizing their infrastructure and taking over their update services for example.

The bigger problem however for the general public is that certain politicians want to break encryption all together by forcing companies to implement backdoors on client side. This has been an ongoing discussion for 2 years in EU parliament and it has to stop: https://www.eff.org/deeplinks/2024/06/now-eu-council-should-finally-understand-no-one-wants-chat-control

load more comments (1 replies)
[–] [email protected] 6 points 9 months ago (2 children)

With a warrant they could probably force signal/whatsapp to inject Malware into their apps to spy on users.

Don't know how possible it is with signal and their reproducible builds. They would need to add this to the source code of the app.

[–] [email protected] 2 points 9 months ago

Could they though, I thought signal would just leave the market

load more comments (1 replies)
[–] [email protected] 4 points 9 months ago (2 children)

Especially with Signal being open source. What stops the official Signal company from advertising another fork?

[–] [email protected] 4 points 9 months ago (2 children)

The server software is not open source.

[–] [email protected] 15 points 9 months ago (2 children)
[–] [email protected] 9 points 9 months ago (2 children)

There's a grain of truth in the claim: We don't know for sure if the original open source version is actually running on the server.

[–] [email protected] 11 points 9 months ago (1 children)

Isn't that true of all server side FOSS?

[–] [email protected] 5 points 9 months ago* (last edited 9 months ago) (1 children)

Yes. We just have to trust them. Or selfhost, which I'm doing with almost everything.

[–] [email protected] 4 points 9 months ago

They've said that they release the source code after it's running in production:

sorry the source for one of our services was so far behind. We often don't push source until we release things, and there were a few overlapping releases that happened in that period which made it awkward to push at any moment and put us behind. Additionally, we've seen a large increase in spam, and a reluctance to immediately publish the exact anti-spam measures we were responding with to a place where spammers could immediately see them combined with the above to cause this extreme delay.

https://github.com/signalapp/Signal-Android/issues/11101#issuecomment-815400676

[–] [email protected] 6 points 9 months ago

In that case: They started publishing code AGAIN.

The server soft has been available, then not, and apparently now again.

[–] [email protected] 4 points 9 months ago (1 children)

That'd be irrelevant, because as long as only the clients hold the keys (which we can verify, as those are not only open source but also are under our control, meaning we can check that the upstream open source version is installed and no private keys are being exchanged) there's no way anyone can read the messages, except the owner of the private key.

[–] [email protected] 2 points 9 months ago

Messages - yes, but there is also metadata. When ALL communication goes through the same servers, it becomes kind of a problem.

[–] [email protected] 2 points 9 months ago

"Gruyere Signal"

[–] [email protected] 23 points 9 months ago* (last edited 9 months ago) (1 children)

Meta has all the power here. WhatsApp is ubiquitous in the EU. If they just shut it down, so many systems would be utterly fucked. They have to walk it back.

But I'm sure they don't have the balls and don't care, they'd just point at the gov and say "they made us do it!" while collecting all your message info and exploiting it for profit.

[–] [email protected] 13 points 9 months ago (2 children)

UK... Not EU... Haven't you heard of Brexit? They wouldn't be allowed to do shit like that in the EU.

[–] [email protected] 21 points 9 months ago (3 children)

Listen. I'm American. You can't expect me to keep up with all the incredibly confusing regions and governments over there.

[–] [email protected] 13 points 9 months ago (1 children)

Upvoted you because I'm an euro and I still kinda agree with you. If Texas secedes, I have no idea what the implications are for legislation and court cases. It's like half the size of the UK by population and 3x as big by area.

Sure everyone heard of brexit, but I'm sure many outside of the EU don't know what it really is plus it took so damn long I honestly believed it might not even happen.

[–] [email protected] 3 points 9 months ago (4 children)

If Texas secedes, they can have fun on their own with their kangaroo court politics.

Truth be told, if Texas were to actually succeed in seceding, it would likely lead to a domino effect of other southern states following suit, and a royal fracturing of the US. How that plays out is anyone's guess.

load more comments (4 replies)
[–] [email protected] 4 points 9 months ago (1 children)

If we have a war, will you be able to keep up then?

[–] [email protected] 5 points 9 months ago
load more comments (1 replies)
[–] [email protected] 18 points 9 months ago (1 children)
[–] [email protected] 6 points 9 months ago (1 children)

afaik that law got snuffed out

[–] [email protected] 10 points 9 months ago

For now, maybe.

[–] [email protected] 20 points 9 months ago (2 children)

Can someone explain how this is even possible with a service like Signal? I was under the impression that encrypted messages can't be intercepted.

Extremely frustrating either way, I hate constantly having to manage different messaging services with different people and I'd really like to not have to add one more if signal becomes compromised.

[–] [email protected] 11 points 9 months ago

It’s all client side. It even mentions infected clients.

[–] [email protected] 4 points 9 months ago

Anything on the signal protocol could have an infected cilent be delivered, or backdoor server side by providing the wrong keys.

Facebook might comply. Would guess that Signal would refuse and would be hit by some absurd fee like 100mil a day for not complying and be forced to pull their services out of the UK.

load more comments
view more: next ›