Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)BL
Posts 0
Comments 185
*Permanently Deleted*
  • Ok thank you so much. What I would like to point at in the difference between having an end-to-end encryption between two recipients and at-rest encryption for information owned by Signal (in this example), is the purpose of those two different things. E2E encryption means only the two agents at each end have the mathematical possibility to decrypt the info: this is privacy by design. At-rest encryption on Signal servers of different things is a security layer meant to protect users' privacy against attackers, but Signal have the means to decrypt it, and they would do it in the normal usage of the service. This would also mean they can (and have to) transmit decrypted information to whatever agency demand them to

  • *Permanently Deleted*
  • Thank you for that info and the link I'll go into that. Just to summarize, if you have the knowledge and time: this is at-rest encryption? I'm not sure how it could be end-to-end encryption and at the same time enable to start new conversations with other Signal users / discovery based on name / phone number

  • Comment Navigation
  • I would say it is in most situations. Then they could have a reason on top of that for not actually going forward with the release after validation, no idea. I'm not from the team, just to clarify

  • Australian woman convicted after pretending to be doctor on social media
  • We had someone in our online friends group saying she was a physician as well. It began to sound weirder and weirder based on some wrong medical stuff she was saying and because we found out about a friend of her and could narrow down her age. Turned out she was I think doing her first medical education year for the second time

  • *Permanently Deleted*
  • Nope only the message content is encrypted. So what they have unencrypted is of course your personal information (phone number etc), all your contacts, and the list of all messages sent (datetime, and contact or contacts). This enable them to have a great social map that evolves after each message sent

    And that is if the encryption remain unbroken. Don't forget that the NSA has a history of placing backdors in cryptography schemes (like that mathematically flawed key based on a weak elliptic curve, standardized and approved by the NSA after they found their exploit)

  • *Permanently Deleted*
  • You can find this online easily. Some of the things are: they've been funded by the Open Technology Fund, created for Radio Free Asia, which is a program by the CIA. The fund is now financed by the US Congress

  • incredible
  • English has changed a lot (no I've not read a lot of poetry in languages other than my own), some others may have changed less. Maybe Aramaic, Hebrew, Arabic. Greek has changed but some people know ancient Greek