mosiacmango

joined 1 year ago
[–] mosiacmango@lemm.ee 8 points 1 week ago* (last edited 1 week ago)

Thank you. I had trouble running down a list.

I do consider Signal to be a more trustworthy org than Google clearly, but find this quibbling about them "maybe putting a super secret backdoor in the e2ee they use to compete with iMessage" to be pretty clear FUD.

[–] mosiacmango@lemm.ee -1 points 1 week ago* (last edited 1 week ago) (3 children)

Not that I can find. Can you post Signals most recent independent audit?

Many of these orgs don't post public audits like this. Its not common, even for the open source players like Signal.

What we do have is a megacorp stating its technical implementation extremely explicitly for a well defined security protocol, for a service meant to directly compete with iMessage. If they are violating that, it opens them up to huge legal liability and reputational harm. Neither of these is worth data mining this specific service.

[–] mosiacmango@lemm.ee -4 points 1 week ago* (last edited 1 week ago) (9 children)

That's a different threat model that verges on "most astonishing corporate espinoage in human history and greatest threat to corporate personhood" possible for Google. It would require thousands if not tens of thousands of Google employees coordinating in utter secrecy to commit an unheard of crime that would be punishable by death in many circumstances.

If they have backdoored all android phones and are actively exploting them in nefarious ways not explained in their various TOS, then they are exposing themselves to ungodly amounts of legal and regulatory risks.

I expect no board of directors wants a trillion dollars of company worth to evaporate overnight, and would likely not be okay backdooring literally billions of phones from just a fiduciary standpoint.

[–] mosiacmango@lemm.ee 5 points 1 week ago* (last edited 1 week ago) (6 children)

Its a specific, technical phrase that means one thing only, and yes, googles RCS meets that standard:

https://support.google.com/messages/answer/10262381?hl=en

How end-to-end encryption works

When you use the Google Messages app to send end-to-end encrypted messages, all chats, including their text and any files or media, are encrypted as the data travels between devices. Encryption converts data into scrambled text. The unreadable text can only be decoded with a secret key.

The secret key is a number that’s:

Created on your device and the device you message. It exists only on these two devices.

Not shared with Google, anyone else, or other devices.

Generated again for each message.

Deleted from the sender's device when the encrypted message is created, and deleted from the receiver's device when the message is decrypted.

Neither Google or other third parties can read end-to-end encrypted messages because they don’t have the key.

They have more technical information here if you want to deep dive about the literal implementation.

You shouldn't trust any corporation, but needless FUD detracts from their actual issues.

[–] mosiacmango@lemm.ee 1 points 1 week ago* (last edited 1 week ago)

The messages are signed by cryptographic keys on the users phones that never leave the device. They are not decryptable in any way by google or anyone else. Thats the very nature of E2EE.

How end-to-end encryption works

When you use the Google Messages app to send end-to-end encrypted messages, all chats, including their text and any files or media, are encrypted as the data travels between devices. Encryption converts data into scrambled text. The unreadable text can only be decoded with a secret key.

The secret key is a number that’s:

Created on your device and the device you message. It exists only on these two devices.

Not shared with Google, anyone else, or other devices.

Generated again for each message.

Deleted from the sender's device when the encrypted message is created, and deleted from the receiver's device when the message is decrypted.

Neither Google or other third parties can read end-to-end encrypted messages because they don’t have the key.

They cant fuck with it, at all, by design. That's the whole point. Even if they created "archived" messages to datamine, all they would have is the noise.

[–] mosiacmango@lemm.ee 2 points 1 week ago (1 children)

This part is likely, but not what we are talking about. Who you know and how you interact with them is separate from the fact that the content of the messages is not decryptable by anyone but the participants, by design. There is no "quasi" end to end. Its an either/or situation.

[–] mosiacmango@lemm.ee -1 points 1 week ago* (last edited 1 week ago) (16 children)

Thats a different tech. End to end is cut and dry how it works. If you do anything to data mine it, it's not end to end anymore.

Only the users involved in end to end can access the data in that chat. Everyone else sees encrypted data, i.e noise. If there are any backdoors or any methods to pull data out, you can't bill it as end to end.

[–] mosiacmango@lemm.ee 34 points 1 week ago (52 children)

End to end is end to end. Its either "the devices sign the messages with keys that never leave the the device so no 3rd party can ever compromise them" or it's not.

Signal is a more trustworthy org, but google isn't going to fuck around with this service to make money. They make their money off you by keeping you in the google ecosystem and data harvesting elsewhere.

[–] mosiacmango@lemm.ee 4 points 2 weeks ago* (last edited 2 weeks ago)

That's a lot of words to say "I was wrong about windows not having built in tooling" but you did include it, so good on you.

Linux being mainly enthusiasts is a detriment, not a positive. Windows appealing to everyone is something Linux needs to work more towards, and thankfully it slowly is. Bifurcating the different use cases into "no, only enthusiasts over here in linux land and you casuals over on windows" is a problem, not the solution.

Both OSs can be used for serious or casual purposes. That should be applauded, and the better elements of both should be considered honestly. Making easily rebuffed strawmen about what Windows can or cant do isn't helpful to anyone.

[–] mosiacmango@lemm.ee 3 points 2 weeks ago* (last edited 2 weeks ago) (2 children)

Im sure there are linux users that don't ever use ssh and would look at you quizzically if you asked them about bash. The fact that linux has built more of an enthusiast community doesn't change the operating system. I would be entirely wrong if I said you had to install a tightVNC viewer/server to connect to a remote linux system, or install golang to write a simple linux script.

You should criticize Windows, as it's woefully user hostile, but do so in a reasonable way. Pretending that it doesn't have excellent built in tooling doesn't help your case.

[–] mosiacmango@lemm.ee 5 points 2 weeks ago

Unattended updates are pretty easy to setup in ubuntu, even without configuration management.

[–] mosiacmango@lemm.ee 12 points 2 weeks ago* (last edited 2 weeks ago) (4 children)

I live and work in both worlds, and neither of your examples are true.

Powershell/cmd line/wmi is pretty deep tooling at this point. Windows being object instead of text based is a different thought process, but it is deeply powerful. Simple one line powershell scripts can do a lot.

Ssh is also a built in feature now, since Windows 10. You can just enable it, but there are also tons of clients that aren't mobaxterm like putty/kitty/royal ts/etc. Its also not the primary text interface to work interactively with other windows machines, so it doesn't have the same importance in the windows world.

I much prefer linux in general, but it's best to criticize microsoft for its actual faults, not imaginary ones.

view more: ‹ prev next ›