• 0 Posts
  • 100 Comments
Joined 3 years ago
cake
Cake day: June 22nd, 2023

help-circle

  • People have always migrated, but modern mass migration is a result of the economic extraction & resulting instability being so extreme that someone with minimal opportunities in Spain can make more money than your average person in a colonized country.

    It’s not uncommon for migrants going from having middle class jobs (teachers, small business owners, etc) to cleaners and still having money to send home to support their family.

    Additionally many people will migrate to Spain, England & France because their language is widely used in colonized nations.











  • creating a backdoor to access plaintext messages is still very difficult if the app is well audited

    Well audited is key, this attack likely works by doing something like adding Meta to the list of trusted devices, then hiding itself from the list (either because of code in the client or because it the meta device is only added for a moment), so the backdoor wouldn’t be send_all_messages_to_hq(), it would be in the code to list trusted devices, either explicitly hiding some devices or some sort of refresh timer that’s known so you can avoid being there when the UI is updated).

    Or it works through the some other mechanism that still preserves E2E encryption.


  • The centralized server is only important because it sends you the message to get around the encryption (either adding a new client to your list of trusted clients or in some other way getting your client to send your messages to Meta).

    If we trust the keys are possessed only by the generating device, then how does the encrypted message become compromised?

    Because the client is capable of adding the backdoor, it isn’t comprosing the encryption. When you add a desktop client to your Signal account it doesn’t break E2E encryption either but your messages are visible in more places. That (or something like it) is what is being described, Meta aren’t decrypting your messages as they go through their E2E network, they are tapping them client side.





  • Just because it’s centralized doesn’t mean that it falls under this risk sector.

    The attack as described almost certainly involves the server sending a message to your client and then having the messages replicated via a side channel to Whatsapp without breaking E2E encryption (it could be adding them as a desktop client or adding them as a hidden participant in all chats, that isn’t clear in the article)

    If you could run Whatsapp without connecting to Meta, you would be safe from this attack, but as you’ve pointed out a secure client is a better solution.



  • seriously, if my comment is being upvoted, it’s because I responded to yours, and people understand what I am saying in response.

    Lmao, sure buddy pat yourself on the back because you got upvotes.

    You’re talking about E2E encryption as if it prevents side-channel client side attacks, but sure morons will upvotes because they also don’t understand real world security.

    The only useful thing you’ve pointed out in your deluge of spam, is that Signal builds are reproducible which does protect against the attack described (as long as there isn’t a backdoor in the published code)