Skip to content

An analysis of X(Twitter)'s new XChat features shows that X can probably decrypt users' messages, as it holds users' private keys on its servers

Technology
48 32 68
  • It's a chain of trust, you have to trust the whole chain.

    Including the entire other side of the conversation. E2EE in a group chat still exposes the group chat if one participant shares their own key (or the chats themselves) with something insecure. Obviously any participant can copy and paste things, archive/log/screenshot things. It can all be automated, too.

    Take, for example, iMessage. We have pretty good confidence that Apple can't read your chats when you have configured it correctly: E2EE, no iCloud archiving of the chats, no backups of the keys. But do you trust that the other side of the conversation has done the exact same thing correctly?

    Or take for example the stupid case of senior American military officials accidentally adding a prominent journalist to their war plans signal chat. It's not a technical failure of signal's encryption, but a mistake by one of the participants inviting the wrong person, who then published the chat to the world.

    Are you so sure Apple doesn't have your keys? How are they migrating the keys to your new device? It's all closed source

  • This post did not contain any content.

    I mean, no yes man would enforce the fascist technocrat' order of reading all those messages. You know, the same technocrat who bought Twitter with Saudi money to cripple resistance movements and steer the public toward the alt right. The one with a thing for eugenics.

  • This post did not contain any content.

    That's not what "private" means. If they have both keys, the wording "might be able to" is at best extremely misleading.

  • No it doesn’t, and I defined E2EE exactly one way. E2EE stands for “End to end encryption”, which means it’s encrypted at one end, decrypted at the other end, and not in the middle.

    It doesn’t matter if they store a copy of your message on an intermediary server, the keyword there is intermediary. They are not the recipient, so they should not have the ability to decrypt the content of the message, only the recipient should. If they are able to decrypt your message, despite not being the recipient, it’s not E2EE.

    A cloud drive is an entirely different case because the cloud drive is not an intermediary. They literally are the second E in E2EE. A cloud drive can have the ability to decrypt your data and still be E2EE because they are the recipient. You both seem to be under the impression that a cloud drive is an “intermediary” between your devices but it’s not. It’s a destination.

    To explain it a bit simpler, imagine we’re in elementary school sitting at our desks and you’re sitting two desks away from me with one person between us:

    E2EE = I encrypt my note with a simple cipher that I shared with you and only you before class. I pass my note to the kid between us to pass to you. He can’t read the note, and if he writes down a copy of my note before passing it to you it doesn’t matter because he still won’t be able to read it because he’s doesn’t have the cipher because he’s not the recipient, you are. He passes you the note and you can do whatever you want with it, including decrypting it, because you know the cipher. All the E2EE has done is ensured the kid in the middle can’t read the note. It has nothing to do with whether or not you can read the note.

    Zero Access Encryption = I encrypt my note with a cipher that only I know. The kid in the middle can’t read this note, and neither can you. Then I use E2EE to encrypt that with a different cipher, the one that you do know, and hand the note to the kid in the middle to hand to you. The kid in the middle can’t read the note, and neither can you.

    You probably didn't understand me. I'm saying that a company can just arbitrarily decide (like you did) that the server is the "end" recipient (which I disagree with). That can be done for chat messages too.

    You send the message "E2EE" to the server, to be stored there (like a file, unencrypted), so that the recipient(s) can - sometime in the future - fetch the message, which would be encrypted again, only during transport. This fully fits your definition for the cloud storage example.

    By changing the recipient "end", we can arbitrarily decode the message then.

    I would argue that the cloud provider is not the recipient of files uploaded there. In the same way a chat message meant for someone else is not meant for the server to read, even if it happens to be stored there.

  • You probably didn't understand me. I'm saying that a company can just arbitrarily decide (like you did) that the server is the "end" recipient (which I disagree with). That can be done for chat messages too.

    You send the message "E2EE" to the server, to be stored there (like a file, unencrypted), so that the recipient(s) can - sometime in the future - fetch the message, which would be encrypted again, only during transport. This fully fits your definition for the cloud storage example.

    By changing the recipient "end", we can arbitrarily decode the message then.

    I would argue that the cloud provider is not the recipient of files uploaded there. In the same way a chat message meant for someone else is not meant for the server to read, even if it happens to be stored there.

    Alternatively, we need to stop saying E2EE is safe at all, for any type of data, because or the arbitrary usage.

  • You probably didn't understand me. I'm saying that a company can just arbitrarily decide (like you did) that the server is the "end" recipient (which I disagree with). That can be done for chat messages too.

    You send the message "E2EE" to the server, to be stored there (like a file, unencrypted), so that the recipient(s) can - sometime in the future - fetch the message, which would be encrypted again, only during transport. This fully fits your definition for the cloud storage example.

    By changing the recipient "end", we can arbitrarily decode the message then.

    I would argue that the cloud provider is not the recipient of files uploaded there. In the same way a chat message meant for someone else is not meant for the server to read, even if it happens to be stored there.

    I'm saying that a company can just arbitrarily decide (like you did) that the server is the "end" recipient (which I disagree with).

    They cannot. Thats not how E2EE works. If they can arbitrarily decide that, then it isn’t E2EE.

    That can be done for chat messages too.

    It cannot, if you’re using E2EE.

    You send the message "E2EE" to the server, to be stored there (like a file, unencrypted), so that the recipient(s) can - sometime in the future - fetch the message, which would be encrypted again, only during transport.

    That’s not how E2EE works. What you are describing is encryption that is not end-to-end. E2EE was designed the solve the issue you’re describing.

    This fully fits your definition for the cloud storage example.

    It does not. Cloud storage is a product you’d use to store your data for your own use at your own discretion.

    I would argue that the cloud provider is not the recipient of files uploaded there

    It is if you uploaded files to it, like on purpose.

    You’re confusing E2EE and non E2EE encryption.

  • Alternatively, we need to stop saying E2EE is safe at all, for any type of data, because or the arbitrary usage.

    We don’t need to stop saying E2EE is safe, because it is. There is no arbitrary usage. Either it’s E2EE. If a company lies to you and tells you it’s E2EE and it’s not E2EE that’s not arbitrary usage, it’s just a lie.

  • We don’t need to stop saying E2EE is safe, because it is. There is no arbitrary usage. Either it’s E2EE. If a company lies to you and tells you it’s E2EE and it’s not E2EE that’s not arbitrary usage, it’s just a lie.

    You are obviously not interested in listening to a word I'm saying. Goodbye.

  • You are obviously not interested in listening to a word I'm saying. Goodbye.

    You’re talking about things that you don’t understand on a fundamental level. Maybe stick things you do understand?

  • Are you so sure Apple doesn't have your keys? How are they migrating the keys to your new device? It's all closed source

    The actual key management and encryption protocols are published. Each new device generates a new key and reports their public key to an Apple-maintained directory. When a client wants to send a message, it checks the directory to know which unique devices it should send the message to, and the public key for each device.

    Any newly added device doesn't have the ability to retrieve old messages. But history can be transferred from old devices if they're still working and online.

    Basically, if you've configured things for maximum security, you will lose your message history if you lose or break your only logged-in device.

    There's no real way to audit whether Apple's implementation follows the protocols they've published, but we've seen no indicators that they aren't doing what they say.

  • Are you so sure Apple doesn't have your keys? How are they migrating the keys to your new device? It's all closed source

    The actual key management and encryption protocols are published. Each new device generates a new key and reports their public key to an Apple-maintained directory. When a client wants to send a message, it checks the directory to know which unique devices it should send the message to, and the public key for each device.

    Any newly added device doesn't have the ability to retrieve old messages. But history can be transferred from old devices if they're still working and online.

    Basically, if you've configured things for maximum security, you will lose your message history if you lose or break your only logged-in device.

    There's no real way to audit whether Apple's implementation follows the protocols they've published, but we've seen no indicators that they aren't doing what they say.

  • The actual key management and encryption protocols are published. Each new device generates a new key and reports their public key to an Apple-maintained directory. When a client wants to send a message, it checks the directory to know which unique devices it should send the message to, and the public key for each device.

    Any newly added device doesn't have the ability to retrieve old messages. But history can be transferred from old devices if they're still working and online.

    Basically, if you've configured things for maximum security, you will lose your message history if you lose or break your only logged-in device.

    There's no real way to audit whether Apple's implementation follows the protocols they've published, but we've seen no indicators that they aren't doing what they say.

    That's good to know, thanks.

  • How social media became a storefront for deadly fake pills

    Technology technology
    1
    1
    15 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 90 Stimmen
    20 Beiträge
    7 Aufrufe
    W
    At least with AI it's easy to see how shitty it gets as the codebase grows working on even a toy project over a week. Then again, if you have no frame of reference maybe that doesn't feel as awful as it should.
  • 528 Stimmen
    123 Beiträge
    147 Aufrufe
    B
    I'm not saying to waste space... but when manufacturers start a pissing match among themselves and say that it's because it's what the customers want, we end up with shit. Why does anyone need a screen that curves around the edge of the phone? What purpose does this serve? Who actually asked for this? I would give up some of my screen area to have forward facing speakers. I want a thicker phone that has better battery life. I also want to be able to swap out my battery. Oh, and I don't want the entire thing encased in glass. If we're so concerned about phone size then they should stop designing them so that a case is required.
  • US immigration enforcement actions trigger social crisis

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    10 Aufrufe
    Niemand hat geantwortet
  • 64 Stimmen
    13 Beiträge
    21 Aufrufe
    semperverus@lemmy.worldS
    You want abliterated models, not distilled.
  • 104 Stimmen
    168 Beiträge
    71 Aufrufe
    smartmanapps@programming.devS
    At least that’s not how I’ve been taught in school If you had a bad teacher that doesn't mean everyone else had a bad teacher. You’re not teaching kids how to prove the quadratic formula, do you? We teach them how to do proofs, including several specific ones. No, you teach them how to use it instead. We teach them how to use everything, and how to do proofs as well. Your whole argument is just one big strawman. Again, with the order of operations Happens to be the topic of the post. It’s not a thing Yes it is! I’ve given you two examples that don’t follow any So you could not do the brackets first and still get the right answer? Nope! 2×2×(2-2)/2=0 2×2×2-2/2=7 That’s kinda random, but sure? Not random at all, given you were talking about students understanding how Maths works. 2+3×4 then it’s not an order of operation that plays the role here Yes it is! If I have 1 2-litre bottle of milk, and 4 3-litre bottles of milk, there's only 1 correct answer for how many litres of milk of have, and it ain't 20! Even elementary school kids know how to work it out just by counting up. They all derive from each other No they don't. The proof of order of operations has got nothing to do with any of the properties you mentioned. For example, commutation is used to prove identity And neither is used to prove the order of operations. 2 operators, no order followed Again with a cherry-picked example that only includes operators of the same precedence. You have no property that would allow for (2+3)×4 to be equal 2+3×4 And yet we have a proof of why 14 is the only correct answer to 2+3x4, why you have to do the multiplication first. Is that not correct? Of course it is. So what? It literally has subtraction and distribution No it didn't. It had Brackets (with subtraction inside) and Multiplication and Division. I thought you taught math, no? Yep, and I just pointed out that what you just said is wrong. 2-2(1+2) has Subtraction and Distribution. 2-2 is 2 being, hear me out, subtracted from 2 Which was done first because you had it inside Brackets, therefore not done in the Subtraction step in order of operations, but the Brackets step. Also, can you explain how is that cherry-picking? You already know - you know which operations to pick to make it look like there's no such thing as order of operations. If I tell you to look up at the sky at midnight and say "look - there's no such thing as the sun", that doesn't mean there's no such thing as the sun.
  • 1 Stimmen
    3 Beiträge
    4 Aufrufe
    B
    They’re trash because the entire rag is right-wing billionaire propaganda by design.
  • Nextcloud cries foul over Google Play Store app rejection

    Technology technology
    31
    1
    256 Stimmen
    31 Beiträge
    89 Aufrufe
    S
    I have the regular F-droid and it does automatic updates now.