Comment on Head of the Signal app threatens to withdraw from Europe

<- View Parent
vacuumflower@lemmy.sdf.org ⁨1⁩ ⁨day⁩ ago

I don’t think you understand anything you wrote about. Signal is open source,

I don’t think you should comment on security if “open source” means anything to you in that regard. For finding backdoors binary disassembly is almost as easy or hard as looking in that “open source”. It’s very different for bugs introduced unintentionally, of course.

Also why the hell are you even saying this, have you looked at that source for long enough? If not, then what good it is for you? Magic?

I suppose you are an illustration to the joke about Raymond’s “enough eyeballs” quote, the joke is that people talking about “enough eyeballs” are not using their eyeballs for finding bugs\backdoors, they are using them and their hands for typing the “enough eyeballs” bullshit.

“Given enough good people with guns, all streets in a town are safe”. That’s how this reads for a sane person who has at least tried to question that idiotic narrative about “open source” being the magic pill.

Stallman’s ideology was completely different, sort of digital anarchism, and it has some good parts. But the “open source” thing - nah.

is publicly audited by security researchers,

Exactly, and it’s not audited by you, because you for the life of you won’t understand WTF happens there.

Yes, it’s being audited by some security researchers out there, mostly American. If you don’t see the problem you are blind.

and publishes its protocol, which has multiple implementations in other applications.

No, there are no multiple implementations of the same Signal thing. There are implementations of some mechanisms from Signal. Also have you considered that this is all fucking circus and having a steel gate in a flimsy wooden fence? Or fashion, if that’s easier to swallow.

Can you confidently describe what zero-knowledge means there, how is it achieved, why any specific part in the articles they’ve published matters? If you can’t, what’s the purpose of it being published, it’s like a schoolboy saying “but Linux is open, I can read the code and change it for my needs”, yeah lol.

Security researchers generally agree that backdoors introduce vulnerabilities that render security protocols unsound.

Do security researches have to say anything on DARPA that funds many of them? That being an American military agency.

And on how that affects what they say and what they don’t say, what they highlight and what they pretend not to notice.

In particular, with a swarm of drones in the sky at some point, do you need to read someone’s messages, or is it enough to know that said someone connected to Signal servers 3 minutes ago from a very specific location and send one of those drones. Hypothetically.

Other than create opportunities for cybercriminals to exploit, they only serve to amplify the powers of the surveillance state to invade the privacy of individuals.

Oh, the surveillance state will be fine in any case!

And cybercriminals we should all praise for showing us what the surveillance state would want to have hidden, to create the false notion of security and privacy. When cybercriminals didn’t yet lose the war to said surveillance state, every computer user knew not to store things too personal in digital form on a thing connected to the Internet. Now they expose everything, because they think if cybercriminals can no longer abuse them, neither can the surveillance state.

Do you use Facebook, with TLS till its services and nothing at all beyond that? Or Google - the same?

Now Signal gives you a feeling that at least what you say is hidden from the service. But can you verify that, maybe there’s a scientific work classified yet, possibly independently made in a few countries. This is a common thing with cryptography, scientific works on that are often state secret.

You are also using AES with NSA-provided s-boxes all the time.

I suggest you do some playing with cryptography in practice. Too few people do, while it’s very interesting and enlightening.

source
Sort:hotnewtop