this post was submitted on 23 Jun 2025
349 points (100.0% liked)

Technology

72831 readers
2798 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 53 points 3 weeks ago

Love seeing open source projects from companies that aren't specifically tech firms

[–] [email protected] 48 points 3 weeks ago (2 children)

I saw the headline and was ready to rage about why they should just use signal instead. Then I read the article and honestly this is a fucking genius use of tech

[–] [email protected] 11 points 3 weeks ago* (last edited 3 weeks ago) (3 children)

I read it and don't understand. Why is this better than Signal? Or the 500 other secure file/messaging protocols?

Jabber seemed to work perfectly for Snowden...

[–] [email protected] 48 points 3 weeks ago (2 children)

Because analysing network traffic wouldn't allow an adversary to see what you're sending with Signal, but they could still tell you're sendig a secure message.

What the Guardian is doing is hiding that secure chat traffic inside the Guardian app, so packet sniffing would only show you're accessing news.

[–] [email protected] 2 points 3 weeks ago (3 children)

analysing network traffic wouldn't allow an adversary to see what you're sending with Signal

How are they analyzing network traffic with Signal? It's encrypted. And why does it matter if they know you're sending a message? Literally everyone using Signal is sending a message.

[–] [email protected] 8 points 3 weeks ago (1 children)

Timing of messages. They can't tell what you send, but can tell when

[–] [email protected] 1 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

No they can't.

E: if someone wants to provide evidence to the contrary instead of just downvoting and moving on, please, go ahead.

[–] [email protected] 5 points 3 weeks ago (1 children)

It's called traffic analysis

[–] [email protected] 1 points 3 weeks ago (4 children)
[–] [email protected] 5 points 3 weeks ago (10 children)

Packet data has headers that can identify where it's coming from and where it's going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal's servers use (which is public information), it's trivial to know when a device is sending/receiving messages with Signal.

This is also why something like Tor manages to circumvent packet sniffing, it's impossible to know the actual destination because that's part of the encrypted payload that a different node will decrypt and forward.

load more comments (10 replies)
[–] [email protected] 3 points 3 weeks ago

I run a cryptography forum

Encryption doesn't hide data sizes unless you take extra steps

[–] [email protected] 3 points 3 weeks ago* (last edited 3 weeks ago)

How exactly do you think encryption prevents the analysis of seeing when an encrypted message is sent? It feels like you're trying to hand-waive away by saying "encryption means you're good!"

Cyber security is not my thing, but my understanding is that you'd still see network traffic - you just wouldn't know what it says.

[–] [email protected] 1 points 3 weeks ago

Here's a relevant stack exchange question. Regarding what an ISP can learn. Of note, everybody is ceding that the ISP can tell you're using signal, and they've moved on to whether or not they'd be able to fingerprint your usage patterns.

[–] [email protected] 6 points 3 weeks ago* (last edited 3 weeks ago)

How are they analyzing network traffic with Signal? It's encrypted

Not my specialty, but signals end to end encryption is akin to sealing a letter. Nobody but the sender and the recipient can open that letter.

But you still gotta send it through the mail. That's the network traffic analysis that can be used.

Here's an example of why that could be bad.

[–] [email protected] 17 points 3 weeks ago (1 children)

For one, ease of access. Say you’re trying to break a story, who are you going to message with signal? Because you’re going to need to get that contact info somehow right?

Snowden is permanently stranded in Russia. That’s not exactly a great example of an anonymous source.

[–] [email protected] 2 points 3 weeks ago

Say you’re trying to break a story, who are you going to message with signal?

...The Guardian?

Because you’re going to need to get that contact info somehow right?

Use your browser? These are strange questions.

Snowden is permanently stranded in Russia. That’s not exactly a great example of an anonymous source.

Did you notice that I used the past tense?

[–] [email protected] 2 points 3 weeks ago

Messaging protocols already resemble the frameworks that come out from time to time. And their effectiveness is due to the fact that they require a certain quota of users.

It's just a secure messaging app with a direct line to Guardian journalists. How to use 911 or special numbers when you're not feeling well.

[–] [email protected] 7 points 3 weeks ago

Yeah this is insanely good

[–] [email protected] 26 points 3 weeks ago

Similar to other apps, CoverDrop only provides limited protection on smartphones that are fully compromised by malware, e.g., Pegasus, which can record the screen content and user actions.

[–] [email protected] 11 points 3 weeks ago

The tech behind the tool conceals the fact that messaging is taking place at all. It makes the communication indistinguishable from data sent to and from the app by our millions of regular users.

Reminds me of how the Germans in WW1 knew they couldn't trust their diplomatic codes anymore so they just sent the important messages in the normal, innocuous telegraph system and diplomatic pouches. They knew that foreign intelligence would be focused on the bogus secure messages.

[–] [email protected] 7 points 3 weeks ago

Horrible name sadly

[–] [email protected] 5 points 3 weeks ago* (last edited 3 weeks ago)

If you want to blow the whistle on somebody and wonder if the Guardian is trustworthy I suggest you ask Julian Assange.

load more comments
view more: next ›