cypherpunks

joined 4 years ago
MODERATOR OF
[–] cypherpunks@lemmy.ml 6 points 8 hours ago* (last edited 8 hours ago) (1 children)

They may get off. But I highly doubt Kristy Noem and Stephen Miller will. Or even Greg Bovino. The people responsible for the policies that led to those murders will be held accountable.

fry not sure meme template, no text

Not sure if you're doing a bit, but i'll bite: Can you recall any historical examples of US public officials being held accountable for their obviously-criminal policy decisions? Eg, remind me who from the Bush administration went to prison due to the fact that they (as Obama put it) "tortured some folks"? And who from the Obama administration went to prison for any of their war crimes (eg)? What makes you think it will be different for people like Noem and Miller? 🤔

[–] cypherpunks@lemmy.ml 1 points 9 hours ago

i think i get Candand (what some Barnes & Noble spam once rendered C++ as?) but, what is borsuk language?

[–] cypherpunks@lemmy.ml 4 points 1 day ago

💯

hopefully a FOSS organization will hire the person who made this

[–] cypherpunks@lemmy.ml 16 points 1 day ago

Reputable news source “GLOBAL FACTZ”

😂

Fwiw, before reposting this meme, I actually checked to make sure that the underlying "weird news" story here was not solely reported by random clickbait fake news sites but was also covered by an actual news organization.

 
[–] cypherpunks@lemmy.ml 1 points 2 days ago* (last edited 2 days ago)

So in summary. You’re right. Sealed sender is not a great solution. But

Thanks :)

But, I still maintain it is entirely useless - its only actual use is to give users the false impression that the server is unable to learn the social graph. It is 100% snake oil.

it is a mitigation for the period where those messages are being accepted.

It sounds like you're assuming that, prior to sealed sender, they were actually storing the server-visible sender information rather than immediately discarding it after using it to authenticate the sender? They've always said that they weren't doing that, but, if they were, they could have simply stopped storing that information rather than inventing their "sealed sender" cryptographic construction.

To recap: Sealed sender ostensibly exists specifically to allow the server to verify the sender's permission to send without needing to know the sender identity. It isn't about what is being stored (as they could simply not store the sender information), it is about what is being sent. As far as I can tell it only makes any sense if one imagines that a malicious server somehow would not simply infer the senders' identities from their (obviously already identified) receiver connections from the same IPs.

[–] cypherpunks@lemmy.ml 1 points 3 days ago (2 children)

Sure. If a state serves a subpoena to gather logs for metadata analysis, sealed sender will prevent associating senders to receivers, making this task very difficult.

Pre sealed-sender they already claimed not to keep metadata logs, so, complying with such a subpoena^[it would more likely be an NSL or some other legal instrument rather than a subpoena] would already have required them to change the behavior of their server software.

If a state wanted to order them to add metadata logging in a non-sealed-sender world, wouldn't they also probably ask them to log IPs for all client-server interactions (which would enable breaking sealed-sender through a trivial correlation)?

Note that defeating sealed sender doesn't require any kind of high-resolution timing or costly analysis; with an adversary-controlled server (eg, one where a state adversary has compelled the operator to alter the server's behavior via a National Security Letter or something) it is easy to simply record the IP which sent each "sealed" message and also record which account(s) are checked from which IPs at all times.

[–] cypherpunks@lemmy.ml 1 points 3 days ago (4 children)

sealed sender isn’t theater, in my view. It is a best effort attempt to mitigate one potential threat

But, what is the potential threat which is mitigated by sealed sender? Can you describe a specific attack scenario (eg, what are the attacker's goals, and what capabilities do you assume the attacker has) which would be possible if Signal didn't have sealed sender but which is no longer possible because sealed sender exists?

[–] cypherpunks@lemmy.ml 2 points 3 days ago (1 children)

In case it wasn't clear, I'm certainly not advocating for using WhatsApp or any other proprietary, centralized, or Facebook-operated communication systems 😂

But I do think Facebook probably really actually isn't exploiting the content of the vast majority of whatsapp traffic (even if they do turn out to be able to exploit it for any specific users at any time, which i wouldn't be surprised by).

[–] cypherpunks@lemmy.ml 3 points 3 days ago (6 children)

"Anonymity" is a vague term which you introduced to this discussion; I'm talking about metadata privacy which is a much clearer concept.

TLS cannot prevent an observer from seeing the source and destination IPs, but it does include some actually-useful metadata mitigations such as Encrypted Client Hello, which encrypts (among other things) the Server Name Indicator. ECH a very mild mitigation, since the source and destination IPs are intrinsically out of scope for protection by TLS, but unlike Sealed Sender it is not an entirely theatrical use of cryptography: it does actually prevent an on-path observer from learning the server hostname (at least, if used alongside some DNS privacy system).

The on path part is also an important detail here: the entire world's encrypted TLS traffic is not observable from a single choke point the way that the entire world's Signal traffic is.

[–] cypherpunks@lemmy.ml 1 points 3 days ago (5 children)

Many people have reverse-engineered and analyzed whatsapp; it's clear that they are actually doing e2ee. It is not certain that they don't have ways to bypass it for targeted users, and there is currently a lawsuit alleging that they do, but afaik no evidence has been presented yet.

[–] cypherpunks@lemmy.ml 3 points 3 days ago

This MFer thought there were so smart and then said “Donroe Doctorine” like a good little boy. You know, the infantile word games the media plays in order to propagandize its subservient population of Epstein defenders! Congratulations on your brogramming! You get an extra special treat after today’s slop!

I suspect that you're missing the actual importance and historical context of the Donroe Doctrine, also known as the Trump Corollary to the Monroe Doctrine, and you're incorrectly assuming that it is just another goofy nonsense portmanteau Trump made up?

I recommend reading about the Monroe Doctrine, the Olney corollary, the Roosevelt Corollary, and the Kennedy Doctrine, and reconsidering if you don't expect Donroe Doctrine to appear alongside them in history books.

I also recommend this text: https://progressive.international/wire/2026-01-27-a-doutrina-donroe-e-o-imperialismo-descarado-da-interveno-na-venezuela-1/en/ (there are translations to English and many other languages at that URL)

[–] cypherpunks@lemmy.ml 38 points 3 days ago* (last edited 3 days ago) (2 children)

anyone who objects to mass surveillance obviously hates puppies

297
submitted 4 days ago* (last edited 4 days ago) by cypherpunks@lemmy.ml to c/memes@lemmy.ml
 
view more: next ›