The Guardian and Cambridge University's Department of Computer Science unveil new secure technology to protect sources
-
deleted by creator
schrieb am 24. Juni 2025, 04:52 zuletzt editiert vonIt isn't.
-
Academic paper: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-999.pdf
schrieb am 24. Juni 2025, 06:11 zuletzt editiert von -
It isn't.
schrieb am 24. Juni 2025, 06:35 zuletzt editiert vonIt's a red flag to those who think you're going to share internal info.
-
It's a red flag to those who think you're going to share internal info.
schrieb am 24. Juni 2025, 06:45 zuletzt editiert vonOr it's just a perfectly normal thing that billions of people do every day?
-
I read it and don't understand. Why is this better than Signal? Or the 500 other secure file/messaging protocols?
Jabber seemed to work perfectly for Snowden...
schrieb am 24. Juni 2025, 07:20 zuletzt editiert vonMessaging protocols already resemble the frameworks that come out from time to time. And their effectiveness is due to the fact that they require a certain quota of users.
It's just a secure messaging app with a direct line to Guardian journalists. How to use 911 or special numbers when you're not feeling well.
-
I read it and don't understand. Why is this better than Signal? Or the 500 other secure file/messaging protocols?
Jabber seemed to work perfectly for Snowden...
schrieb am 24. Juni 2025, 10:40 zuletzt editiert vonFor one, ease of access. Say you’re trying to break a story, who are you going to message with signal? Because you’re going to need to get that contact info somehow right?
Snowden is permanently stranded in Russia. That’s not exactly a great example of an anonymous source.
-
Or it's just a perfectly normal thing that billions of people do every day?
schrieb am 24. Juni 2025, 11:03 zuletzt editiert vonExcept that signal is blocked by many companies Mobile Device Management. The one that don’t can typically see who has the app installed. This provides a new clever way to maybe whistleblow
-
No they can't.
E: if someone wants to provide evidence to the contrary instead of just downvoting and moving on, please, go ahead.
schrieb am 24. Juni 2025, 13:46 zuletzt editiert vonIt's called traffic analysis
-
For one, ease of access. Say you’re trying to break a story, who are you going to message with signal? Because you’re going to need to get that contact info somehow right?
Snowden is permanently stranded in Russia. That’s not exactly a great example of an anonymous source.
schrieb am 24. Juni 2025, 14:56 zuletzt editiert vonSay you’re trying to break a story, who are you going to message with signal?
...The Guardian?
Because you’re going to need to get that contact info somehow right?
Use your browser? These are strange questions.
Snowden is permanently stranded in Russia. That’s not exactly a great example of an anonymous source.
Did you notice that I used the past tense?
-
Except that signal is blocked by many companies Mobile Device Management. The one that don’t can typically see who has the app installed. This provides a new clever way to maybe whistleblow
schrieb am 24. Juni 2025, 14:58 zuletzt editiert von ulrich@feddit.orgUse a different device? Use Molly? Use any number of other apps? What's to stop the MDM from blocking The Guardian app?
-
It's called traffic analysis
schrieb am 24. Juni 2025, 14:58 zuletzt editiert vonIt's called encryption
-
It's called encryption
schrieb am 24. Juni 2025, 15:26 zuletzt editiert vonPacket data has headers that can identify where it's coming from and where it's going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal's servers use (which is public information), it's trivial to know when a device is sending/receiving messages with Signal.
This is also why something like Tor manages to circumvent packet sniffing, it's impossible to know the actual destination because that's part of the encrypted payload that a different node will decrypt and forward.
-
It's called encryption
schrieb am 24. Juni 2025, 15:31 zuletzt editiert vonI run a cryptography forum
Encryption doesn't hide data sizes unless you take extra steps
-
I saw the headline and was ready to rage about why they should just use signal instead. Then I read the article and honestly this is a fucking genius use of tech
schrieb am 24. Juni 2025, 15:32 zuletzt editiert vonYeah this is insanely good
-
It's called encryption
schrieb am 24. Juni 2025, 15:46 zuletzt editiert von papertowels@mander.xyzHow exactly do you think encryption prevents the analysis of seeing when an encrypted message is sent? It feels like you're trying to hand-waive away by saying "encryption means you're good!"
Cyber security is not my thing, but my understanding is that you'd still see network traffic - you just wouldn't know what it says.
-
Academic paper: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-999.pdf
schrieb am 24. Juni 2025, 15:47 zuletzt editiert vonThe tech behind the tool conceals the fact that messaging is taking place at all. It makes the communication indistinguishable from data sent to and from the app by our millions of regular users.
Reminds me of how the Germans in WW1 knew they couldn't trust their diplomatic codes anymore so they just sent the important messages in the normal, innocuous telegraph system and diplomatic pouches. They knew that foreign intelligence would be focused on the bogus secure messages.
-
analysing network traffic wouldn't allow an adversary to see what you're sending with Signal
How are they analyzing network traffic with Signal? It's encrypted. And why does it matter if they know you're sending a message? Literally everyone using Signal is sending a message.
schrieb am 24. Juni 2025, 18:05 zuletzt editiert von papertowels@mander.xyzHow are they analyzing network traffic with Signal? It's encrypted
Not my specialty, but signals end to end encryption is akin to sealing a letter. Nobody but the sender and the recipient can open that letter.
But you still gotta send it through the mail. That's the network traffic analysis that can be used.
Here's an example of why that could be bad.
-
It isn't.
schrieb am 24. Juni 2025, 18:56 zuletzt editiert vonCriminalization of encryption : the 8 december case
This article was written on the basis of information related to the so-called "8 December" case (see the footnotes for a global overview of the case, we focus on the "numerical part" of it in this articleFor a summary of the 8 December affair see in particular the testimonies available in thi
La Quadrature du Net (www.laquadrature.net)
For France, Your a terroriste if you use signal
-
Criminalization of encryption : the 8 december case
This article was written on the basis of information related to the so-called "8 December" case (see the footnotes for a global overview of the case, we focus on the "numerical part" of it in this articleFor a summary of the 8 December affair see in particular the testimonies available in thi
La Quadrature du Net (www.laquadrature.net)
For France, Your a terroriste if you use signal
schrieb am 24. Juni 2025, 19:23 zuletzt editiert vonThen you're also a terrorist if you use The Guardian
️
-
It's called encryption
schrieb am 24. Juni 2025, 19:28 zuletzt editiert vonHow dumb are you? Like someone said the point is they can see the fact that you sent a secured message period. Not with the guardian app though. Pretty easy to comprehend so I am confused why you are acting so stupid.
-
-
-
Delta moves toward eliminating set prices in favor of AI that determines how much you personally will pay for a ticket
Technology64 vor 5 Tagenvor 25 Tagen1
-
-
Apple’s most sweeping software redesign disappoints mainland Chinese consumers
Technology 11. Juni 2025, 04:451
-
Tech moguls want to build a crypto paradise on a Native American reservation
Technology 10. Juni 2025, 02:121
-
The IRS Tax Filing Software TurboTax Is Trying to Kill Just Got Open Sourced
Technology 4. Juni 2025, 14:221
-
Taiwan’s chip plants run on migrant workers. Job brokers run their lives
Technology 28. Mai 2025, 11:001