• Autonomous User@lemmy.world
    link
    fedilink
    English
    arrow-up
    31
    arrow-down
    2
    ·
    edit-2
    1 year ago

    Stop promoting “just trust me bro software” in the same title.

    Anti-libre software, WhatsApp, bans us from proving its E2EE claims, any claims. It bans us from forking its source code, removing backdoors. It fails to include a libre software license text file, like AGPL, so they control it, not us. WhatsApp, anti-libre software, is a scam.

    • umami_wasabi@lemmy.ml
      link
      fedilink
      English
      arrow-up
      20
      ·
      1 year ago

      A French and Dutch Joint Investigation Team (JIT) harvested more than 115 million supposedly encrypted messages from an estimated 60,000 users of EncroChat phones after infecting the handsets with a software “implant”.

      Looks like they just hack the phone

      • Otter@lemmy.ca
        link
        fedilink
        English
        arrow-up
        12
        ·
        1 year ago

        https://en.m.wikipedia.org/wiki/EncroChat

        So this sounds like the ANOM phone story with extra steps?

        I get that they can “access” messages, but the headline feels misleading if it requires full access to the device.

        It’s not that they’re breaking encryption or reading messages in transit, it’s more like they’re installing malware on specific devices so that they can look at your screen?

    • RmDebArc_5@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      8
      ·
      1 year ago

      Apparently what happened is that French police installed some of malware on the phones to read the messages, and this was now decided to be legal in the UK.

    • pwalker@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      Honestly mentioning Enchrochat together with other mainstream message clients is kind of misleading. The Enchrochat message client was also E2EE. However Enchrochat was also a company that sold their own mobile phones with a prorietary OS on it together with own sim cards and only those phones were able to connect to each other. And law enforcment had enough evidence that they sold those hardware in shady untracable ways similar to drugs. At that point there was no western government that didn’t want to help seizing their infrastructure and taking over their update services for example.

      The bigger problem however for the general public is that certain politicians want to break encryption all together by forcing companies to implement backdoors on client side. This has been an ongoing discussion for 2 years in EU parliament and it has to stop: https://www.eff.org/deeplinks/2024/06/now-eu-council-should-finally-understand-no-one-wants-chat-control

    • redditReallySucks@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      With a warrant they could probably force signal/whatsapp to inject Malware into their apps to spy on users.

      Don’t know how possible it is with signal and their reproducible builds. They would need to add this to the source code of the app.

    • Lucy :3@feddit.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Especially with Signal being open source. What stops the official Signal company from advertising another fork?

          • einkorn@feddit.org
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            In that case: They started publishing code AGAIN.

            The server soft has been available, then not, and apparently now again.

          • Lucy :3@feddit.org
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            There’s a grain of truth in the claim: We don’t know for sure if the original open source version is actually running on the server.

            • bamboo@lemmy.blahaj.zone
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 year ago

              They’ve said that they release the source code after it’s running in production:

              sorry the source for one of our services was so far behind. We often don’t push source until we release things, and there were a few overlapping releases that happened in that period which made it awkward to push at any moment and put us behind. Additionally, we’ve seen a large increase in spam, and a reluctance to immediately publish the exact anti-spam measures we were responding with to a place where spammers could immediately see them combined with the above to cause this extreme delay.

              https://github.com/signalapp/Signal-Android/issues/11101#issuecomment-815400676

        • Lucy :3@feddit.org
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 year ago

          That’d be irrelevant, because as long as only the clients hold the keys (which we can verify, as those are not only open source but also are under our control, meaning we can check that the upstream open source version is installed and no private keys are being exchanged) there’s no way anyone can read the messages, except the owner of the private key.

          • EngineerGaming@feddit.nl
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            Messages - yes, but there is also metadata. When ALL communication goes through the same servers, it becomes kind of a problem.

    • Routhinator@startrek.website
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      1 year ago

      WhatsApp has MITM on the server side which is how Facebook scans your messages for targeted adverts. E2EE on WhatsApp was a fantasy the moment Facebook bought it

      That is different than Signal which (unless they changed something with the profiles thing) was always P2P E2EE. You’re sending encrypted messages directly to the other persons phone, not to a server.

      • teolan@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        WhatsApp has MITM on the server side which is how Facebook scans your messages for targeted advert

        You shouldn’t make claims like this when there is no evidence for it.

        Signal which (unless they changed something with the profiles thing) was always P2P E2E

        Signal has never been P2P.

  • CircuitSpells@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 year ago

    Can someone explain how this is even possible with a service like Signal? I was under the impression that encrypted messages can’t be intercepted.

    Extremely frustrating either way, I hate constantly having to manage different messaging services with different people and I’d really like to not have to add one more if signal becomes compromised.

    • antler@feddit.rocks
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      Anything on the signal protocol could have an infected cilent be delivered, or backdoor server side by providing the wrong keys.

      Facebook might comply. Would guess that Signal would refuse and would be hit by some absurd fee like 100mil a day for not complying and be forced to pull their services out of the UK.

  • helenslunch@feddit.nl
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    1 year ago

    Meta has all the power here. WhatsApp is ubiquitous in the EU. If they just shut it down, so many systems would be utterly fucked. They have to walk it back.

    But I’m sure they don’t have the balls and don’t care, they’d just point at the gov and say “they made us do it!”.