Post AqtcB4Bi3e28nQTI4e by mcc@mastodon.social
(DIR) More posts by mcc@mastodon.social
(DIR) Post #AqtcAtlSoN66T87BmC by mcc@mastodon.social
2025-02-07T22:18:39Z
0 likes, 1 repeats
If you are using Signal, and you are doing something the government considers illegal, the way they are going to read your messages about it is they will arrest the person you sent the messages *to*, and make your counterparty show them the logs. We know this because this technique came up again and again in, for example, the Jan. 6 court filings.There may, hypothetically, be other Signal exploits available to a government, but this is the one they will use, because it works.
(DIR) Post #AqtcAuu0a5Whzv7WjY by nyx@social.xenofem.me
2025-02-08T03:27:54.488749Z
0 likes, 0 repeats
@mcc that's why you turn on disappearing messages
(DIR) Post #AqtcAyoq1Fle92jSEK by mcc@mastodon.social
2025-02-07T22:22:30Z
0 likes, 0 repeats
Please be very clear I am not saying not to use Signal, or saying that using Signal is pointless; I am describing a threat model which you should be aware of when using the application.( This said I'd also recommend turning off "Apple Intelligence" on Signal. And also turning off "Apple Intelligence" on every app. And also discontinuing use of any device, application, or operating system which has the capability to interoperate with "Apple Intelligence" or "Copilot".https://www.powerpage.org/apple-intelligence-reads-signal-messages-on-newer-iphone-models-privacy-concerns-cited/ )
(DIR) Post #AqtcB4Bi3e28nQTI4e by mcc@mastodon.social
2025-02-07T22:31:37Z
0 likes, 0 repeats
Several people have replied to this to point out Signal has this feature. https://support.signal.org/hc/en-us/articles/360007320771-Set-and-manage-disappearing-messagesNote this will not protect against situations such as:- People screenshotting the message for some reason- People reading the message, then testifying they remember reading it- A large group chat containing one or more FBI agents, who screenshot, copy and/or take contemporaneous notes preserving the content of the message
(DIR) Post #ArPUMq6xOv6Znv96Su by js@mastodon.nl
2025-02-23T09:25:09Z
0 likes, 0 repeats
@mcc Yes, $5 wrench attacks work against all cryptography.One obstacle, when targetting you by pressuring correspondents into submitting data is determining and finding these. That information is not available by sigint, and obtaining it requires a potentially substantial socint effort.
(DIR) Post #ArPUMr3RtRtQjKVodU by shironeko@fedi.tesaguri.club
2025-02-23T12:32:09.416335Z
0 likes, 0 repeats
@js @mcc it doesn't work when you don't know the keys.
(DIR) Post #ArPVfZbV6CQ840vfRQ by js@mastodon.nl
2025-02-23T12:33:12Z
0 likes, 0 repeats
@shironeko @mcc Meaning, if the information is not accessible *at all*?
(DIR) Post #ArPVfaI2Y2RqBwpdkO by shironeko@fedi.tesaguri.club
2025-02-23T12:46:43.190684Z
0 likes, 0 repeats
@js @mcc meaning the key is an physical artifact
(DIR) Post #ArPeEH0J2neK96aZge by js@mastodon.nl
2025-02-23T14:06:18Z
0 likes, 0 repeats
@shironeko @mcc Ah. The old “something you have” approach. It does come with its weaknesses, if that’s all there is to it. One would almost be inclined to involve multiple factors. 🤯
(DIR) Post #ArPeEHzzLSzPEPRppY by shironeko@fedi.tesaguri.club
2025-02-23T14:22:39.410613Z
0 likes, 0 repeats
@js @mcc at least you get to avoid being hosed