Laborer3652@reddthat.com
on 28 Jul 2024 15:17
collapse
I’ve become convinced that Matrix should have been built on top of XMPP. They went out of their way to create a protocol from scratch when we already had XMPP available and well developed. This turned out to be much more difficult than they anticipated, and they’ve had to make drastic changes to the api, spec, and server over the years. Matrix will never be a stable, finished product because they aren’t even sure what that looks like. They can’t even stick with a name for crying out loud. Dendrite? Synapse? Pick one and put all your effort behind it.
The sifting sand base that Matrix is built on top of becomes really glatibg when you look at the clients and servers available for Matrix. Not one single third party app that I’m aware of implements every single feature offered by Element (the app). No other server is fully compliant with the API. And, Matrix is YET ANOTHER PROTOCOL that chat apps have to integrate with.
None of that is to mention that the VC for Matrix is about to run out. Either Riot/Matrix/Element/Whatever is going to sellout and enshittify, or they’re going to stop existing and the entire protocol will be dead in the water. XMPP doesn’t have this problem.
They should have built a beautiful XMPP app, slapped signal encryption on top, and called it a day.
Laser@feddit.org
on 28 Jul 2024 19:53
nextcollapse
we already had XMPP available and well developed.
XMPP as defined where?
For privacy, I guess OMEMO is the current gold standard regarding XMPP; however, agreeing on a feature set between clients apart from the most basic stuff wasn’t always easy (and I guess it still isn’t).
Also, I guess XML has fallen out of style for this kind of use case. Matrix is just JSON over REST, which I guess is kind of nice nowadays?
XML kind of suffers the jack of all trades curse. If you just have two sides exchanging messages using a well-defined protocol, why go for something that offers schema definition, DTD, XSL transformation? These come with costs, and if you don’t use them, why XML in the first place?
All of this combined with the fact that the communication model of XMPP and Matrix is different - XMPP closer to email where a server relays messages between clients while in Matrix, everything is a synchronized (?) room, even direct messages between two participants - would have required bending or extending the spec so much that it wouldn’t have been XMPP in the original spirit anyways. So instead, a new protocol was designed that incorporated a lot of lessons learned in the decade before it.
You’re free to continue using XMPP, after all, bridges exist.
XMPP was doing great until Google and Meta EEE’d it, but it’s still alive and well.
bamboo@lemmy.blahaj.zone
on 28 Jul 2024 15:45
collapse
They’ve said that they release the source code after it’s running in production:
sorry the source for one of our services was so far behind. We often don’t push source until we release things, and there were a few overlapping releases that happened in that period which made it awkward to push at any moment and put us behind. Additionally, we’ve seen a large increase in spam, and a reluctance to immediately publish the exact anti-spam measures we were responding with to a place where spammers could immediately see them combined with the above to cause this extreme delay.
That’d be irrelevant, because as long as only the clients hold the keys (which we can verify, as those are not only open source but also are under our control, meaning we can check that the upstream open source version is installed and no private keys are being exchanged) there’s no way anyone can read the messages, except the owner of the private key.
EngineerGaming@feddit.nl
on 28 Jul 2024 18:53
collapse
Messages - yes, but there is also metadata. When ALL communication goes through the same servers, it becomes kind of a problem.
RmDebArc_5@sh.itjust.works
on 28 Jul 2024 07:21
nextcollapse
Apparently what happened is that French police installed some of malware on the phones to read the messages, and this was now decided to be legal in the UK.
linearchaos@lemmy.world
on 28 Jul 2024 07:42
collapse
Damn, we’ll need those linux phones working soon.
smeeps@lemmy.mtate.me.uk
on 28 Jul 2024 08:25
nextcollapse
Then they enforce the chipmakers to put backdoors in the chips themselves
WhatAmLemmy@lemmy.world
on 28 Jul 2024 14:24
collapse
For x86 platforms it’s called Intel ME and AMD PSP.
bjoern_tantau@swg-empire.de
on 28 Jul 2024 09:31
collapse
What would that change?
lastweakness@lemmy.world
on 28 Jul 2024 09:40
nextcollapse
You’d have enough control over the software that you can ensure nothing like this happens
bjoern_tantau@swg-empire.de
on 28 Jul 2024 10:12
collapse
The basic security stuff exists on Android and iOS as well, namely full disk encryption. When that is defeated through a missing or bad password nothing keeps them from installing their malware with device access.
If they got in through an external security vulnerabilities in some software package the situation is also the same on either OS.
linearchaos@lemmy.world
on 28 Jul 2024 17:05
collapse
What would that change?
To be honest, it ‘could’ change everything. You don’t need to run ‘phone’ hardware. You could assemble a handled computer with a 5G modem out of consumer-available parts.
Even if we didn’t go that far, we would get our own LUKS encryption with keys we chose and if we knew we couldn’t trust the hardware, we could take precautions. They can attack apple and android easily enough because it’s just two platforms, one vulnerability in android and you’re into 50% of the population.
While we at it with wishlists, maybe we could do some hardware version of tpm/dpapi and manage to relatively safely encrypt the ram as well.
umami_wasbi@lemmy.ml
on 28 Jul 2024 07:23
nextcollapse
A French and Dutch Joint Investigation Team (JIT) harvested more than 115 million supposedly encrypted messages from an estimated 60,000 users of EncroChat phones after infecting the handsets with a software “implant”.
Looks like they just hack the phone
original_reader@lemm.ee
on 28 Jul 2024 09:22
nextcollapse
So this sounds like the ANOM phone story with extra steps?
I get that they can “access” messages, but the headline feels misleading if it requires full access to the device.
It’s not that they’re breaking encryption or reading messages in transit, it’s more like they’re installing malware on specific devices so that they can look at your screen?
Because truth is more complex and does nor drive clicks. so far every time we see signal in a headline like this, it will generally be "cops had physically access" "no password" or "password leaked"
ie something that encryption is not designed to defend against.
pwalker@discuss.tchncs.de
on 28 Jul 2024 21:11
nextcollapse
Honestly mentioning Enchrochat together with other mainstream message clients is kind of misleading. The Enchrochat message client was also E2EE. However Enchrochat was also a company that sold their own mobile phones with a prorietary OS on it together with own sim cards and only those phones were able to connect to each other. And law enforcment had enough evidence that they sold those hardware in shady untracable ways similar to drugs. At that point there was no western government that didn’t want to help seizing their infrastructure and taking over their update services for example.
The bigger problem however for the general public is that certain politicians want to break encryption all together by forcing companies to implement backdoors on client side. This has been an ongoing discussion for 2 years in EU parliament and it has to stop: eff.org/…/now-eu-council-should-finally-understan…
conciselyverbose@sh.itjust.works
on 29 Jul 2024 19:41
collapse
And law enforcment had enough evidence that they sold those hardware in shady untracable ways similar to drugs
It doesn’t matter. Using that phone or app cannot possibly be anywhere close to probable cause for a search.
FrostyPolicy@suppo.fi
on 30 Jul 2024 06:56
nextcollapse
Whatsapp uses the same protocol as signal so MITM is unlikely however there’s no way to know what happens before or after the messages are encrypted/decrypted and sent. They can do that scanning at that stage.
That is different than Signal which (unless they changed something with the profiles thing) was always P2P E2EE. You’re sending encrypted messages directly to the other persons phone, not to a server.
Sender cannot know where the recipient is and using P2P would be resource consuming on all client devices (i.e. everyone who uses Signal) so I guess the messages are routed thru Signal’s servers though messages are encrypted on device with keys that only the messaging parties know (couldn’t find an official diagram for this to confirm).
WhatsApp has MITM on the server side which is how Facebook scans your messages for targeted advert
You shouldn’t make claims like this when there is no evidence for it.
Signal which (unless they changed something with the profiles thing) was always P2P E2E
Signal has never been P2P.
autonomoususer@lemmy.world
on 28 Jul 2024 11:43
nextcollapse
Stop promoting “just trust me bro software” in the same title.
Anti-libre software, WhatsApp, bans us from proving its E2EE claims, any claims. It bans us from forking its source code, removing backdoors. It fails to include a libre software license text file, like AGPL, so they control it, not us. WhatsApp, anti-libre software, is a scam.
helenslunch@feddit.nl
on 28 Jul 2024 12:43
nextcollapse
Meta has all the power here. WhatsApp is ubiquitous in the EU. If they just shut it down, so many systems would be utterly fucked. They have to walk it back.
But I’m sure they don’t have the balls and don’t care, they’d just point at the gov and say “they made us do it!” while collecting all your message info and exploiting it for profit.
Upvoted you because I’m an euro and I still kinda agree with you. If Texas secedes, I have no idea what the implications are for legislation and court cases. It’s like half the size of the UK by population and 3x as big by area.
Sure everyone heard of brexit, but I’m sure many outside of the EU don’t know what it really is plus it took so damn long I honestly believed it might not even happen.
If Texas secedes, they can have fun on their own with their kangaroo court politics.
Truth be told, if Texas were to actually succeed in seceding, it would likely lead to a domino effect of other southern states following suit, and a royal fracturing of the US. How that plays out is anyone’s guess.
masterofn001@lemmy.ca
on 28 Jul 2024 21:35
collapse
Yeah lol Colorado is solid blue and the home of the Libertarian party so fuck off with telling us what to do. Texas cancer would only metastasize East.
sugartits@lemmy.world
on 28 Jul 2024 14:33
nextcollapse
If we have a war, will you be able to keep up then?
helenslunch@feddit.nl
on 28 Jul 2024 14:42
collapse
CircuitSpells@lemmy.world
on 28 Jul 2024 20:27
collapse
Can someone explain how this is even possible with a service like Signal? I was under the impression that encrypted messages can’t be intercepted.
Extremely frustrating either way, I hate constantly having to manage different messaging services with different people and I’d really like to not have to add one more if signal becomes compromised.
AProfessional@lemmy.world
on 28 Jul 2024 21:09
nextcollapse
It’s all client side. It even mentions infected clients.
Anything on the signal protocol could have an infected cilent be delivered, or backdoor server side by providing the wrong keys.
Facebook might comply. Would guess that Signal would refuse and would be hit by some absurd fee like 100mil a day for not complying and be forced to pull their services out of the UK.
threaded - newest
Wonder how they’d manage that as they both are E2EE.
With a warrant they could probably force signal/whatsapp to inject Malware into their apps to spy on users.
Don’t know how possible it is with signal and their reproducible builds. They would need to add this to the source code of the app.
Could they though, I thought signal would just leave the market
.
Especially with Signal being open source. What stops the official Signal company from advertising another fork?
"Gruyere Signal"
The server software is not open source.
Untrue. Stop spreading FUD:
https://github.com/signalapp/Signal-Server
There’s a grain of truth in the claim: We don’t know for sure if the original open source version is actually running on the server.
Isn’t that true of all server side FOSS?
Yes. We just have to trust them. Or selfhost, which I’m doing with almost everything.
Man Signal would be the perfect messenger if it was defederated.
Why not use eg. Matrix then?
I’ve become convinced that Matrix should have been built on top of XMPP. They went out of their way to create a protocol from scratch when we already had XMPP available and well developed. This turned out to be much more difficult than they anticipated, and they’ve had to make drastic changes to the api, spec, and server over the years. Matrix will never be a stable, finished product because they aren’t even sure what that looks like. They can’t even stick with a name for crying out loud. Dendrite? Synapse? Pick one and put all your effort behind it.
The sifting sand base that Matrix is built on top of becomes really glatibg when you look at the clients and servers available for Matrix. Not one single third party app that I’m aware of implements every single feature offered by Element (the app). No other server is fully compliant with the API. And, Matrix is YET ANOTHER PROTOCOL that chat apps have to integrate with.
None of that is to mention that the VC for Matrix is about to run out. Either Riot/Matrix/Element/Whatever is going to sellout and enshittify, or they’re going to stop existing and the entire protocol will be dead in the water. XMPP doesn’t have this problem.
They should have built a beautiful XMPP app, slapped signal encryption on top, and called it a day.
XMPP as defined where?
For privacy, I guess OMEMO is the current gold standard regarding XMPP; however, agreeing on a feature set between clients apart from the most basic stuff wasn’t always easy (and I guess it still isn’t).
Also, I guess XML has fallen out of style for this kind of use case. Matrix is just JSON over REST, which I guess is kind of nice nowadays?
XML kind of suffers the jack of all trades curse. If you just have two sides exchanging messages using a well-defined protocol, why go for something that offers schema definition, DTD, XSL transformation? These come with costs, and if you don’t use them, why XML in the first place?
All of this combined with the fact that the communication model of XMPP and Matrix is different - XMPP closer to email where a server relays messages between clients while in Matrix, everything is a synchronized (?) room, even direct messages between two participants - would have required bending or extending the spec so much that it wouldn’t have been XMPP in the original spirit anyways. So instead, a new protocol was designed that incorporated a lot of lessons learned in the decade before it.
You’re free to continue using XMPP, after all, bridges exist.
XMPP was doing great until Google and Meta EEE’d it, but it’s still alive and well.
They’ve said that they release the source code after it’s running in production:
github.com/signalapp/Signal-Android/issues/11101#…
In that case: They started publishing code AGAIN.
The server soft has been available, then not, and apparently now again.
That’d be irrelevant, because as long as only the clients hold the keys (which we can verify, as those are not only open source but also are under our control, meaning we can check that the upstream open source version is installed and no private keys are being exchanged) there’s no way anyone can read the messages, except the owner of the private key.
Messages - yes, but there is also metadata. When ALL communication goes through the same servers, it becomes kind of a problem.
Apparently what happened is that French police installed some of malware on the phones to read the messages, and this was now decided to be legal in the UK.
Damn, we’ll need those linux phones working soon.
Then they enforce the chipmakers to put backdoors in the chips themselves
I’d wager they already have
For x86 platforms it’s called Intel ME and AMD PSP.
What would that change?
You’d have enough control over the software that you can ensure nothing like this happens
The basic security stuff exists on Android and iOS as well, namely full disk encryption. When that is defeated through a missing or bad password nothing keeps them from installing their malware with device access.
If they got in through an external security vulnerabilities in some software package the situation is also the same on either OS.
To be honest, it ‘could’ change everything. You don’t need to run ‘phone’ hardware. You could assemble a handled computer with a 5G modem out of consumer-available parts.
Even if we didn’t go that far, we would get our own LUKS encryption with keys we chose and if we knew we couldn’t trust the hardware, we could take precautions. They can attack apple and android easily enough because it’s just two platforms, one vulnerability in android and you’re into 50% of the population.
While we at it with wishlists, maybe we could do some hardware version of tpm/dpapi and manage to relatively safely encrypt the ram as well.
Looks like they just hack the phone
How does one get an “implant” onto a phone?
You implant it, duh.
en.m.wikipedia.org/wiki/EncroChat
So this sounds like the ANOM phone story with extra steps?
I get that they can “access” messages, but the headline feels misleading if it requires full access to the device.
It’s not that they’re breaking encryption or reading messages in transit, it’s more like they’re installing malware on specific devices so that they can look at your screen?
Because truth is more complex and does nor drive clicks. so far every time we see signal in a headline like this, it will generally be "cops had physically access" "no password" or "password leaked"
ie something that encryption is not designed to defend against.
Honestly mentioning Enchrochat together with other mainstream message clients is kind of misleading. The Enchrochat message client was also E2EE. However Enchrochat was also a company that sold their own mobile phones with a prorietary OS on it together with own sim cards and only those phones were able to connect to each other. And law enforcment had enough evidence that they sold those hardware in shady untracable ways similar to drugs. At that point there was no western government that didn’t want to help seizing their infrastructure and taking over their update services for example.
The bigger problem however for the general public is that certain politicians want to break encryption all together by forcing companies to implement backdoors on client side. This has been an ongoing discussion for 2 years in EU parliament and it has to stop: eff.org/…/now-eu-council-should-finally-understan…
It doesn’t matter. Using that phone or app cannot possibly be anywhere close to probable cause for a search.
.
Whatsapp uses the same protocol as signal so MITM is unlikely however there’s no way to know what happens before or after the messages are encrypted/decrypted and sent. They can do that scanning at that stage.
Sender cannot know where the recipient is and using P2P would be resource consuming on all client devices (i.e. everyone who uses Signal) so I guess the messages are routed thru Signal’s servers though messages are encrypted on device with keys that only the messaging parties know (couldn’t find an official diagram for this to confirm).
You shouldn’t make claims like this when there is no evidence for it.
Signal has never been P2P.
Stop promoting “just trust me bro software” in the same title.
Anti-libre software, WhatsApp, bans us from proving its E2EE claims, any claims. It bans us from forking its source code, removing backdoors. It fails to include a libre software license text file, like AGPL, so they control it, not us. WhatsApp, anti-libre software, is a scam.
Meta has all the power here. WhatsApp is ubiquitous in the EU. If they just shut it down, so many systems would be utterly fucked. They have to walk it back.
But I’m sure they don’t have the balls and don’t care, they’d just point at the gov and say “they made us do it!” while collecting all your message info and exploiting it for profit.
UK… Not EU… Haven’t you heard of Brexit? They wouldn’t be allowed to do shit like that in the EU.
Listen. I’m American. You can’t expect me to keep up with all the incredibly confusing regions and governments over there.
Upvoted you because I’m an euro and I still kinda agree with you. If Texas secedes, I have no idea what the implications are for legislation and court cases. It’s like half the size of the UK by population and 3x as big by area.
Sure everyone heard of brexit, but I’m sure many outside of the EU don’t know what it really is plus it took so damn long I honestly believed it might not even happen.
If Texas secedes, they can have fun on their own with their kangaroo court politics.
Truth be told, if Texas were to actually succeed in seceding, it would likely lead to a domino effect of other southern states following suit, and a royal fracturing of the US. How that plays out is anyone’s guess.
Kinda like this
<img alt="" src="https://lemmy.ca/pictrs/image/d5d9eda5-3254-494c-b3fb-9d8a3fa43ac5.jpeg">
That’s not entirely accurate. No self-respecting Alaskan would be caught dead associating with a Texan.
Remember kids, the only things bigger in Texas are their stupid hats.
Holding Arizona hostage lol. Though I also feel like the major population centers of Colorado wouldn’t have that
Yeah lol Colorado is solid blue and the home of the Libertarian party so fuck off with telling us what to do. Texas cancer would only metastasize East.
If we have a war, will you be able to keep up then?
Nope.
Haha. I guess I also know only about the special children of America. Like Alabama xD
The EU is literally trying to do it right now: theverge.com/…/eu-chat-control-law-propose-scanni…
afaik that law got snuffed out
For now, maybe.
Can someone explain how this is even possible with a service like Signal? I was under the impression that encrypted messages can’t be intercepted.
Extremely frustrating either way, I hate constantly having to manage different messaging services with different people and I’d really like to not have to add one more if signal becomes compromised.
It’s all client side. It even mentions infected clients.
Anything on the signal protocol could have an infected cilent be delivered, or backdoor server side by providing the wrong keys.
Facebook might comply. Would guess that Signal would refuse and would be hit by some absurd fee like 100mil a day for not complying and be forced to pull their services out of the UK.