

Americans have the right to bear arms just as much as they have the right to shout fire in a crowded theatre — it’s a right that can be regulated and both already are, one needs more regulation, but people don’t seem to understand.
Americans have the right to bear arms just as much as they have the right to shout fire in a crowded theatre — it’s a right that can be regulated and both already are, one needs more regulation, but people don’t seem to understand.
I’d be interested to hear what you think a made up job is
MLS only deals with encryption and key management, which is great but that’s been a “solved” problem since TextSecure (now Signal) introduced the TextSecure Protocol (now the Signal Protocol) in 2013.
What I’m aware is missing with RCS / MLS compared to Signal (someone with more recent knowledge please correct me):
RCS still leaks metadata like a sieve. Encryption, considering the platforms that exist today (Signal and SimpleX), should not be the minimum requirement. Plain-text messaging should not even be possible in modern secure messaging platforms. The platform should be open source and be engineered to mitigate the collection of metadata - like Signal and SimpleX.
Tesla facilities face wave of attacks as Elon Musk delves into politics
I love good news!
XMPP is more comparable to Signal, yes.
XMPP allows unencrypted messages and leaks metadata - Signal does neither.
Signal does need (yes, need) a phone number, and most people only have one so that is identifiable info.
Signal is basically a privacy enhanced text/SMS/phone replacement. I can give my phone to someone in person and they can immediately start “texting” me on Signal - this is a feature (as well as a con to some people).
This puts it at mostly the same level as some competitors, including WhatsApp which is often advised against.
People advise against Whatsapp because while it uses Signal to encrypt message contents, they take no effort to minimize the collection of metadata - Signal’s been compelled by court to present all data it has on its users various times and the only info they have is the day/time you signed up for their services and the last day (not time) one of your clients pinged their servers - Source: https://signal.org/bigbrother/
I have yet to find any other free service that collects this little information and works just as well as a normal non-encrypted messenger. Even Signals sticker packs are end-to-end encrypted - Source: https://signal.org/blog/make-privacy-stick/
While Signal’s home base is the US, they are a non profit org that doesn’t operate in the same way as for-profit corporations. Also, Signal collects basically zero data so there’s no incentive to sell out, and who would want to buy them anyway when they have no data and the server and client are open source.
Matrix is great, but I wouldn’t compare it to Signal. I use both for very different purposes.
keep spreading FUD, my guy 😎
nearly daily Apex player moving to Linux full time again now that many more games work with it (knowing Apex no longer works). It will suck, but fuck microsoft and good riddance EA.
did they comment (maybe I missed it) on why they’re ending development?
Apex Legends. Its a difficult game to master, but every once in a while I get “in the zone” and pull moves/plays that impress myself. It’s not often, but feels nice when it happens. I still enjoy it even though I “suck” most of the time. I basically play it as a survival game >90% of the time.
anything specific you can call out for those of us who have zero interest in moving to another centralized platform?
user@domain.com/resource
. Theuser@domain.com
part identifies the user and their home server, and the/resource
identifies the specific client device they are using (e.g.,alice@example.com/mobile
oralice@example.com/laptop
)./resource
part of the JID can reveal the type of client or device being used.Signal uses Sealed Sender (wired.com). Imagine if letters you sent didn’t require a “from” field - or it was inside the envelope and impossible for anyone to see it. The post office would only know who its going to and only the recipient can decrypt it (open the letter) to see who sent it. Now, you could say, well they have your IP and can correlate it to the account, but the easy way around this is to either use a VPN or Signal proxy (support.signal.org) if you’re that paranoid.
Read more about it here: Technology preview: Sealed sender for Signal (signal.org)
Most email providers suffer similar metadata leaks as XMPP because:
You could host your own email, XMPP, or Matrix server - that’s definitely a win for privacy. But as soon as you interact with someone outside your ecosystem (server), metadata leakage is an issue again. It’s why making end-to-end encrypted email is a hard problem to solve. It’s not that it can’t be secure, its that it has to work with those that aren’t because that’s the expectation.
Until you interact with others who aren’t using encryption or have it misconfigured.