okr765
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
AprilF00lz@lemmy.ml to Privacy@lemmy.mlEnglish · 1 year ago

Downsides of Signal alternatives compared to Signal?

message-square
message-square
85
fedilink
87
message-square

Downsides of Signal alternatives compared to Signal?

AprilF00lz@lemmy.ml to Privacy@lemmy.mlEnglish · 1 year ago
message-square
85
fedilink

I’m thinking of the things listed on the Privacy Guides real-time communication section

https://www.privacyguides.org/en/real-time-communication/

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    3
    ·
    1 year ago

    https://signal.org/blog/secure-value-recovery/

    • ryannathans@aussie.zone
      link
      fedilink
      arrow-up
      4
      arrow-down
      1
      ·
      1 year ago

      master_key is never stored or sent to the SGX, only c2, the entropy bits. The user’s password is still required to generate the key.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        2
        ·
        edit-2
        1 year ago

        Brute forcing 4-6 digit pins is trivial.

        And even if the user set a actual password, it’s still very trivial

        https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/

        • ryannathans@aussie.zone
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          “Very trivial” if they set a proper password? Yet the source you provide says it’s robustly secure

          • jet@hackertalks.com
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            1 year ago

            I can’t find the phrase robustly secure in the last link:

            https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/

            Signal asks users to set a pin/password which needs to be periodically reentered. This discourages people from using high entropy passwords like BIP38.

      • Gooey0210@sh.itjust.works
        link
        fedilink
        arrow-up
        4
        arrow-down
        1
        ·
        1 year ago

        The password is literally a pin

        • ryannathans@aussie.zone
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          If you set a small pin, perhaps. Most people set a password

          • Gooey0210@sh.itjust.works
            link
            fedilink
            arrow-up
            2
            ·
            1 year ago

            Pin is the suggested option, so I really doubt “most” of the people choose password

            • ryannathans@aussie.zone
              link
              fedilink
              arrow-up
              3
              ·
              1 year ago

              Most people who care* I guess would be more apt

              • jet@hackertalks.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                1 year ago

                For the people who really care, they can disable The pin. I believe the client will generate a BIP 38 password randomly, and use that for the data encrypted in the SVR. But all the data is still uploaded to the cloud. So if there’s a problem with the SVR encoding, the BIP 38 password generation etc the data is still exploited

                Not only do you have to care, everyone you talk to has to do the same thing, because if your counterparty has their key in the cloud, the conversation is at risk.

                • ryannathans@aussie.zone
                  link
                  fedilink
                  arrow-up
                  2
                  ·
                  1 year ago

                  Regardless, the master key is never uploaded

                  • jet@hackertalks.com
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    ·
                    edit-2
                    1 year ago

                    All the bits to reconstruct the master key minus the pin code are uploaded. So it’s equivalent to uploading to the cloud The master key itself.

                    Very few people are using BIP 38 level passwords. So the vast majority of people have their key constructively uploaded fully in the cloud

    • LWD@lemm.ee
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      12 days ago

      deleted by creator

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        One nit to pick, messages have to transit through the signal network. And they could be recorded during transit. Carnivore style

        • LWD@lemm.ee
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          12 days ago

          deleted by creator

Privacy@lemmy.ml

privacy@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !privacy@lemmy.ml

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

  • Lemmy.ml libre_culture
  • Lemmy.ml privatelife
  • Lemmy.ml DeGoogle
  • Lemmy.ca privacy

much thanks to @gary_host_laptop for the logo design :)

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 381 users / day
  • 2.77K users / week
  • 5.95K users / month
  • 16.6K users / 6 months
  • 1 local subscriber
  • 39.5K subscribers
  • 2.6K Posts
  • 60.7K Comments
  • Modlog
  • mods:
  • k_o_t@lemmy.ml
  • tmpod@lemmy.pt
  • Yayannick@lemmy.ml
  • ranok@sopuli.xyz
  • BE: 0.19.9
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org