It’s encrypted with a 4 digit pin so they’ll have to sped at least 316.8809e-10 years on brute-forcing it.
Comment on X is now offering me end-to-end encrypted chat — you probably shouldn't trust it yet | TechCrunch
artyom@piefed.social 3 days ago
offering me end-to-end encrypted chat
No one - not even X - can access or read your messages
This key is then stored on X’s servers
So…they’re just blatantly lying?
InnerScientist@lemmy.world 3 days ago
lando55@lemmy.zip 3 days ago
That’s why my PIN is 5 digits: 12345
adarza@lemmy.ca 3 days ago
One. Two. Three. Four. Five?
That’s amazing. I’ve got the same combination on my luggage.
scala@lemmy.ml 2 days ago
Suck. Suck. Suck. Suck!
FreedomAdvocate@lemmy.net.au 3 days ago
No - did you even read the article? An x employee confirmed that they’re using the “special” servers to store the keys that mean that they cannot see them. The author then says that the employee confirming it doesn’t mean they do, because the author doesn’t want it to be true.
Natanael@infosec.pub 3 days ago
There are hardware for that called hardware security modules, but yeah I definitely wouldn’t trust Twitter’s implementation - especially because they probably just need the auth team to tell the HSM that the user logged in when they didn’t to get that key
FreedomAdvocate@lemmy.net.au 2 days ago
So again, you think you know better than the employee simply because you want it to be done incorrectly.
Natanael@infosec.pub 2 days ago
I’ve run a cryptography forum for 10 years. I can tell snake oil from the real deal.
Musk’s Twitter doesn’t know how to do key distribution.
SaharaMaleikuhm@feddit.org 3 days ago
The Muskrat lying? No, never!
ReallyActuallyFrankenstein@lemmynsfw.com 3 days ago
Right, the have the key, and the lock, but the key isn’t in the lock, so it’s utterly impossible for them to access it.
FauxLiving@lemmy.world 3 days ago
Typical corpo doublespeak