245
submitted 11 months ago by throws_lemy@lemmy.nz to c/world@lemmy.world
top 50 comments
sorted by: hot top controversial new old
[-] radix@lemmy.world 103 points 11 months ago

the entire government will be using [Olvid], the world's most secure instant messaging system," French digital minister Jean-Noël Barrot confirmed on X.

Clearly they're very discerning when it comes to their choice of communication apps. 🙄

[-] Cossty@lemmy.world 22 points 11 months ago

From their Google play store page: "Olvid is the first private instant messaging application for everyone."

[-] otter@lemmy.ca 38 points 11 months ago

https://github.com/olvid-io

At least it's open source, so we should know soon enough how it compares to Signal

[-] FuglyDuck@lemmy.world 32 points 11 months ago

the client is open source. but the server? not so much.

in any case, if security is the concern... they should probably switch to a government-built system that only runs on gooberment devices. Will it be shitty? absolutely. But data is owned by whoever has the hardware it sits on. if it's not your device its not your data.

[-] BastingChemina@slrpnk.net 10 points 11 months ago* (last edited 11 months ago)

No trust in servers Persistent security even in case of a compromised server

From Olvid website

They are advertising the fact that the security does not depend on the server.

I don't know what is worth.

Also it's developed by a French company, I think this is the main argument for the French government, they want to have options that does not rely on US companies.

[-] FuglyDuck@lemmy.world 6 points 11 months ago

Without the server-side code there’s no way to validate that. (This is the reason open source is preferred.)

It’s definitely being selected because it’s French. (And has all the buzzwords,)

[-] matter@lemmy.world 4 points 11 months ago

You've misunderstood. With the client code you can be sure that your messages are properly encrypted before leaving the device. If that's done correctly, you don't need to trust the server, because it can't read your messages just like some attacker couldn't. Signal is pretty similar, they didn't update the public server source for a few years, and even with the source, we can't know that that is what they're actually running. But with a verified build of the client code we can know that our messages are encrypted such that, even if they held on to them until quantum computers became mainstream, they'd still be properly protected.

[-] ben_dover@lemmy.world 6 points 11 months ago* (last edited 11 months ago)

the server can store metadata though. who you're texting, when, how often, etc. - and store that indefinitely. or even store the encrypted message, and when a flaw in the encryption is discovered 10 years later, they're all readable. their servers could be breached and that info could be siphoned by criminals selling it to the highest bidder.

signals blog had an interesting post about what they're doing to prevent these issues

[-] FuglyDuck@lemmy.world 1 points 11 months ago* (last edited 11 months ago)

You’ve misunderstood. With the client code you can be sure that your messages are properly encrypted before leaving the device. If that’s done correctly, you don’t need to trust the server, because it can’t read your messages just like some attacker couldn’t.

It kind of depends on how keys are handled. If the key passes through their servers at all (and it probably does,) then they have access to the keys and sufficient information to decrypt it. it's possible the app does send keys independent of their server- I don't know- but I very much doubt it. if they were capable of sending keys without a server, chances are very good they don't actually need the server for the messages themselves. (which would then ask why they do have a server.)

But with a verified build of the client code we can know that our messages are encrypted such that, even if they held on to them until quantum computers became mainstream, they’d still be properly protected.

Assuming they don't have the keys. This is not a valid assumption so far as I'm aware.

[-] matter@lemmy.world 2 points 11 months ago* (last edited 11 months ago)

It should most definitely be a valid assumption.

If the key passes through their servers at all (and it probably does,) then they have access to the keys and sufficient information to decrypt it. it's possible the app does send keys independent of their server- I don't know- but I very much doubt it.

The keys shouldn't be on or go through a server anywhere, that would be an absolute joke.

What makes you think that private keys are being sent anywhere? This app uses a slightly modified version of the Signal protocol (because of course it does), as they describe here, section 27, page 90. Only public keys should ever leave your device, otherwise no amount of showing the code would make it secure. That's the whole point.

Again, with the client code you should be able to tell that the keys are generated there and not sent anywhere.

As I said, with any app, just because they publish some server code does not mean that that's what they're running on their server - for security you have to be sure that the app is sufficiently secure on its own. Even if they were running the exact public code that "didn't save the keys" the server could harvest them from memory.

load more comments (3 replies)
[-] interceder270@lemmy.world 1 points 11 months ago

I don’t know what is worth.

Jack-shit without evidence and demonstrations.

[-] matter@lemmy.world 7 points 11 months ago

Only the client. Though that's probably enough to make sure messages leave your device suitably encrypted. Depending on the algos it could be quite vulnerable to hndl attacks, though, or (less likely) any undiscovered backdoors in the implementations. Of course, even for Signal one has to trust they're using the public server code anyway, but at least we know they're folding in a quantum-resistant algo.

[-] Natanael@slrpnk.net 4 points 11 months ago

That thing has some of the most verbose documentation I've ever seen. Stuff that should be a paragraph takes multiple pages.

[-] F4stL4ne@programming.dev 2 points 11 months ago

Why dont they use SimpleX?

[-] MCk3@lemmy.world 8 points 11 months ago

They’ve gone in on matrix pretty hard at this point

[-] jet@hackertalks.com 4 points 11 months ago

Simplex is promising, but not ready for primetime.

On my divest OS phone it doesn't even run. Just launches and dies.

Contact Discovery is still a big issue, simple x doesn't have a solution for that yet. You have to do out of band manual addition of your contacts.

[-] Cheradenine@sh.itjust.works 5 points 11 months ago

No Contact Discovery is a feature for me.

Interesting it does not work on your device, I have tried it on a few different phones and have not had any issues. My friends are of course using it as well, all on different devices.

[-] jet@hackertalks.com 1 points 11 months ago* (last edited 11 months ago)

https://github.com/simplex-chat/simplex-chat/issues/3184

Appears to be a known issue

WRT Contact Discovery, if your a large organization like... the french government, you want your people to be able to communicate with each other, so they need to solve contact discovery if you really want them to adopt and use simplex for their communication.

[-] Akasazh@feddit.nl 1 points 11 months ago
[-] F4stL4ne@programming.dev 1 points 11 months ago

It can be can be, some French person just have to fork it.

[-] cmder@lemmy.world 51 points 11 months ago

French here. It is all about the IT sovereignty (souveraineté numérique). The idea is to use French solutions in order to limit leaks if confidential information and dealing with other country without worrying about threat of limiting, stopping critical services. Also it is easier to apply EU laws like GPDR. That is why all the French private company dealing with sensitive information (military, cyber security..) are only using French solutions.

[-] XpeeN@sopuli.xyz 11 points 11 months ago

I get it, but I just don't get why wouldn't they just follow other govs' steps and just set up a matrix server instead. It's already available and proven.

[-] interceder270@lemmy.world 5 points 11 months ago

💶 Money.

French companies will now get contracts and profit off of taxpayer dollars.

load more comments (7 replies)
[-] eliasp@feddit.de 3 points 11 months ago

That's actually what they're doing. They built their own messenger based on Matrix.

load more comments (3 replies)
[-] pineapplelover@lemm.ee 26 points 11 months ago* (last edited 11 months ago)

What security vulnerabilities does Signal have? I implore them to find a more secure messenger.

Edit: Apparently they're using Olvid. Claims to be the most secure messenger. Only the clients are open source, not the server code and they're using a whole different algorithm. I seriously don't understand why they don't just partner with Signal, bet these guys don't even have Signal's level of quantum resistant encryption.

https://github.com/olvid-io

[-] seSvxR3ull7LHaEZFIjM@feddit.de 28 points 11 months ago

Olvid is French and Signal isn't.

[-] massive_bereavement@kbin.social 3 points 11 months ago* (last edited 11 months ago)

Plus for the French Government it's easier to twist arms in France than in Switzerland.

[-] dyathinkhesaurus@lemmy.world 7 points 11 months ago

Plot twist: maybe whatsapp, signal and telegram are harder to hack, maybe olvid has back doors that allows them snoop on each other 🤔

(am only half joking 😉)

[-] ANIMATEK@lemmy.world 5 points 11 months ago

I think that it has to do with GDPR. Signal has servers outside the jurisdiction of France or the EU. This app probably not.

Not that I agree though. Signal would be a better option.

[-] echodot@feddit.uk 17 points 11 months ago

It's a really big problem for ministers using private messaging services. All of this is supposed to either be public domain or secret. If it's labelled as Secret it should be officially secret, not just "we didn't tell anyone about it".

Accountability and transparency are cornerstones of democracy.

[-] Rikj000@discuss.tchncs.de 13 points 11 months ago

How about GApps tho? You know, the piece of spyware Google embeds in Android's system partition?

FYI:
Private open source alternative to it,
is MicroG

[-] jet@hackertalks.com 16 points 11 months ago

Micro g is still downloads Google proprietary blobs and runs those. So it is not open source so much as it's an open source launcher of Google's proprietary software. It's an interesting improvement, but it does not a panacea it does not fix the issues

[-] buskbrand@lemm.ee 2 points 11 months ago

Are you sure? I thought that what you describe is what packages suck as NikGapps did, while MicroG is a reimplementation of the code. It does call Google webservers, but it doesn't run Google's blobs (which is also why it's severely limited/fragile compared to packages that run them)

https://github.com/microg/GmsCore/wiki

[-] Rikj000@discuss.tchncs.de 2 points 11 months ago* (last edited 11 months ago)

You're both kinda right afaik.

MicroG reverse engineered, and re-written as much as possible from GApps libraries, from the ground up, as open source software.

These re-implementations are as light weight and privacy respecting as possible on your local device,
however the same does not count for the Google servers it communicates with (if you choose to enable them).

For SafetyNet attestation, a proprietary, isolated, DroidGuard blob is downloaded (if you choose to enable it).

load more comments (1 replies)
[-] xep@kbin.social 7 points 11 months ago

I believe microG still use Google's services, at very least it connects to supl.google.com

[-] blahsay@lemmy.world 11 points 11 months ago

What they really mean is that they're having trouble reading the messages on signal so please stop

[-] DragonTypeWyvern@literature.cafe 3 points 11 months ago

I mean, any program you didn't make isn't truly secure from your POV, that's all there is to it. And since this affects their governmental employees only it's more than reasonable.

[-] blahsay@lemmy.world 7 points 11 months ago

Is that all there is to it? Signal is open source. If they wanted to be extra paranoid they could take and maintain their own branch but that's a bit silly. Building your own is almost certainly the least secure option

[-] trougnouf@lemmy.world 5 points 11 months ago* (last edited 11 months ago)

What's wrong with XMPP? I've been using it for many years, it's by far been the greatest experience and it has OMEMO encryption.

[-] lovesickoyster@lemmy.world 2 points 11 months ago

ios apps are all really, really shit.

[-] autotldr@lemmings.world 5 points 11 months ago

This is the best summary I could come up with:


French Prime Minister Élisabeth Borne has banned widely used messaging applications WhatsApp, Telegram and Signal for ministers and their teams due to security vulnerabilities, according to a memo seen by POLITICO.

Borne set a deadline of December 8 for the government to switch to using the French app Olvid instead, which is certified by France's cybersecurity agency ANSSI.

Tchap, the government-developed secure messaging and collaboration app, launched in 2019, is also allowed.

In December, the entire government will be using [Olvid], the world's most secure instant messaging system," French digital minister Jean-Noël Barrot confirmed on X.

The government previously ordered civil servants to remove all types of social media platforms, gaming and video-streaming apps — including TikTok, CandyCrush and Netflix — from their work devices over cybersecurity and privacy concerns.

This article was updated to include details on the memo seen by POLITICO.


The original article contains 193 words, the summary contains 143 words. Saved 26%. I'm a bot and I'm open source!

[-] mp3@lemmy.ca 4 points 11 months ago

Aren't they already using their own version of Matrix for IM comms?

load more comments
view more: next ›
this post was submitted on 05 Dec 2023
245 points (98.4% liked)

World News

38970 readers
2269 users here now

A community for discussing events around the World

Rules:

Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.


Lemmy World Partners

News !news@lemmy.world

Politics !politics@lemmy.world

World Politics !globalpolitics@lemmy.world


Recommendations

For Firefox users, there is media bias / propaganda / fact check plugin.

https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/

founded 1 year ago
MODERATORS