There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

FrostyPolicy ,
@FrostyPolicy@suppo.fi avatar

Wonder how they’d manage that as they both are E2EE.

redditReallySucks ,
@redditReallySucks@lemmy.dbzer0.com avatar

With a warrant they could probably force signal/whatsapp to inject Malware into their apps to spy on users.

Don’t know how possible it is with signal and their reproducible builds. They would need to add this to the source code of the app.

otter ,

Could they though, I thought signal would just leave the market

30p87 ,

Especially with Signal being open source. What stops the official Signal company from advertising another fork?

kubica ,

"Gruyere Signal"

einkorn ,
@einkorn@feddit.org avatar

The server software is not open source.

massive_bereavement ,

Untrue. Stop spreading FUD:
https://github.com/signalapp/Signal-Server

30p87 ,

There’s a grain of truth in the claim: We don’t know for sure if the original open source version is actually running on the server.

Plopp ,

Isn’t that true of all server side FOSS?

30p87 ,

Yes. We just have to trust them. Or selfhost, which I’m doing with almost everything.

einkorn ,
@einkorn@feddit.org avatar

In that case: They started publishing code AGAIN.

The server soft has been available, then not, and apparently now again.

30p87 ,

That’d be irrelevant, because as long as only the clients hold the keys (which we can verify, as those are not only open source but also are under our control, meaning we can check that the upstream open source version is installed and no private keys are being exchanged) there’s no way anyone can read the messages, except the owner of the private key.

RmDebArc_5 ,
@RmDebArc_5@sh.itjust.works avatar

Apparently what happened is that French police installed some of malware on the phones to read the messages, and this was now decided to be legal in the UK.

linearchaos ,
@linearchaos@lemmy.world avatar

Damn, we’ll need those linux phones working soon.

smeeps ,

Then they enforce the chipmakers to put backdoors in the chips themselves

bjoern_tantau ,
@bjoern_tantau@swg-empire.de avatar

What would that change?

lastweakness ,

You’d have enough control over the software that you can ensure nothing like this happens

bjoern_tantau ,
@bjoern_tantau@swg-empire.de avatar

The basic security stuff exists on Android and iOS as well, namely full disk encryption. When that is defeated through a missing or bad password nothing keeps them from installing their malware with device access.

If they got in through an external security vulnerabilities in some software package the situation is also the same on either OS.

umami_wasbi ,

A French and Dutch Joint Investigation Team (JIT) harvested more than 115 million supposedly encrypted messages from an estimated 60,000 users of EncroChat phones after infecting the handsets with a software “implant”.

Looks like they just hack the phone

original_reader ,

How does one get an “implant” onto a phone?

Plopp ,

You implant it, duh.

otter ,

en.m.wikipedia.org/wiki/EncroChat

So this sounds like the ANOM phone story with extra steps?

I get that they can “access” messages, but the headline feels misleading if it requires full access to the device.

It’s not that they’re breaking encryption or reading messages in transit, it’s more like they’re installing malware on specific devices so that they can look at your screen?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines