this post was submitted on 29 Jan 2025
93 points (97.9% liked)

Asklemmy

44611 readers
890 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 5 years ago
MODERATORS
 

Greetings!

A friend of mine wants to be more secure and private in light of recent events in the USA.

They originally told me they were going to use telegram, in which I explained how Telegram is considered compromised, and Signal is far more secure to use.

But they want more detailed explanations then what I provided verbally. Please help me explain things better to them! โœจ

I am going to forward this thread to them, so they can see all your responses! And if you can, please cite!

Thank you! โœจ

you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 1 points 20 hours ago (1 children)

They have to know who the message needs to go to, granted. But they don't have to know who the message comes from, hence why the sealed sender technique works. The recipient verifies the message via the keys that are exchanged if they have been communicating with that correspondent before or else it is a new message request.

So I don't see how they can build social graphs if they don't know who the sender if all messages are, they can only plot recipients which is not enough.

[โ€“] [email protected] 2 points 20 hours ago (1 children)

But they don't have to know who the message comes from, hence why the sealed sender technique works.

Anyone who's worked with centralized databases can tell you that even if they did add something like that, with message timestamps, it'd be trivial to find the real sender of a message. You have no proof that they even use that, because the server is centralized, and closed source. Again, if their response is "just trust us", then its not secure.

[โ€“] [email protected] 1 points 19 hours ago (1 children)

From what I understand, sealed sender is implemented on the client side. And that's what's in the github repo.

[โ€“] [email protected] 1 points 7 hours ago

How does that work? I wasn't able to find this. Can you find documentation or code that explains how the client can obscure where it came from?