this post was submitted on 03 Dec 2025
45 points (100.0% liked)
technology
24116 readers
286 users here now
On the road to fully automated luxury gay space communism.
Spreading Linux propaganda since 2020
- Ways to run Microsoft/Adobe and more on Linux
- The Ultimate FOSS Guide For Android
- Great libre software on Windows
- Hey you, the lib still using Chrome. Read this post!
Rules:
- 1. Obviously abide by the sitewide code of conduct. Bigotry will be met with an immediate ban
- 2. This community is about technology. Offtopic is permitted as long as it is kept in the comment sections
- 3. Although this is not /c/libre, FOSS related posting is tolerated, and even welcome in the case of effort posts
- 4. We believe technology should be liberating. As such, avoid promoting proprietary and/or bourgeois technology
- 5. Explanatory posts to correct the potential mistakes a comrade made in a post of their own are allowed, as long as they remain respectful
- 6. No crypto (Bitcoin, NFT, etc.) speculation, unless it is purely informative and not too cringe
- 7. Absolutely no tech bro shit. If you have a good opinion of Silicon Valley billionaires please manifest yourself so we can ban you.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Not to say that decentralization solves everything, but I see all of these centralized "but we do E2EE tho" apps as deeply flawed. Especially when they require phone numbers to sign up. You are just WhatsApp without Facebook's bad reputation! Assuming they are completely above board (not intelligence ops in themselves, but subject to legal pressure), we can take their word that there are no plaintext records the government can subpoena, but as a centralized service, they construct essentially one point the government needs to watch. They can correlate when messages are going in with when messages are coming out to assemble graphs of communications networks. With subpoena power, they can trivially figure out who the individual nodes are in those graphs, who they are communicating with, what their location is (they have your phone number), and with zero-day attacks at their disposal, they can exfiltrate the plaintext from end-user devices - if the social network information doesn't provide enough insight for them to roll up troublemakers without needing to burn these.
There is an old manta among cryptographers and Free Software advocates that "there is no such thing as security through obscurity." I'm calling bullshit. While it is not a substitute for sound cryptography, the clever application of stenography goes a long way. Every day you can avoid being noticed is a day the investigation has been delayed. Every investigation which gets started late, or never starts at all, creates blind-spots to the state. Public key cryptography is a crucial tool, but there is a hyper-fixation on it while alternate methods are overlooked. Classic practices of tradecraft, like one time pads, dead drops, hiding messages inside innocuous mediums. The discipline to opt for radio silence instead of constantly dinging the "Revolution HQ" server with you E2EE messaging app as you roam from WiFi access point to WiFi access point. The pre-arrangement of signaling procedures, where an innocuous post on a mediocre blog, a classified ad with the correct words in it, or the arrangement of flower pots on a balcony can let somebody know it is time to move to phase 2, or establish a meeting in a predetermined location, or retrieve a package from a specific garbage can on the Hudson River Greenway.
These apps are actually much more secure when being used by police and state officials. In this case, they don't need to worry about investigators with subpoena power. The threat model is simplified to the cryptographic fundamentals, and the security of the devices implementing them. Foreign intelligence is still a threat, but they don't have the blanket physical access to these networks that the US security state does.
Yeah pretty much bang on, good post. I still use them but I am not actively organizing revolutionary activities so my threat model is not that stringent.