Encrypt iPhone calls app
Can someone please give me your appraisal of Signal. I'm not noticing the red flags that we see all too often in such sales pitches. https://whispersystems.org/blog/signal/?t=dXNlcmlkPTU1MjE5NjEwLGVtYWlsaWQ9OD...
Moxie and crew have a history of writing some pretty fantastic crypto software! In the past they have written redphone (Signal is the iOS version of this) and text secure, both of which are IMO some of the best crypto software out there right now. Aditionally signal is free (as in beer and in freedom) and open source. I would wholeheartedly recommend Signal. My only caveat would be that since it is so new there are likely some pretty serious bugs that have not been discovered yet. On 07/31/2014 06:40 PM, Henry Rivera wrote:
Can someone please give me your appraisal of Signal. I'm not noticing the red flags that we see all too often in such sales pitches.
https://whispersystems.org/blog/signal/?t=dXNlcmlkPTU1MjE5NjEwLGVtYWlsaWQ9OD...
On Thu, Jul 31, 2014 at 09:40:50PM -0400, Henry Rivera wrote:
Can someone please give me your appraisal of Signal. I'm not noticing the red flags that we see all too often in such sales pitches.
https://whispersystems.org/blog/signal/?t=dXNlcmlkPTU1MjE5NjEwLGVtYWlsaWQ9OD...
You cannot secure cellphones.
That is true. Total security does not exists. But it doesn't means security shouldn't be improved from 0% to some higher level. Regards, M. On August 1, 2014 5:26:26 AM CEST, David Hill <dhill+cpunks@mindcry.org> wrote:
Can someone please give me your appraisal of Signal. I'm not noticing
On Thu, Jul 31, 2014 at 09:40:50PM -0400, Henry Rivera wrote: the red flags that we see all too often in such sales pitches.
https://whispersystems.org/blog/signal/?t=dXNlcmlkPTU1MjE5NjEwLGVtYWlsaWQ9OD...
You cannot secure cellphones.
-- Poslano iz mobilnega telefona z aplikacijo K-9 Mail.
On Thu, Jul 31, 2014 at 09:40:50PM -0400, Henry Rivera wrote:
Can someone please give me your appraisal of Signal. I'm not noticing the red flags that we see all too often in such sales pitches.
https://whispersystems.org/blog/signal/?t=dXNlcmlkPTU1MjE5NjEwLGVtYWlsaWQ9OD...
On 2014-08-01 13:26, David Hill wrote:
You cannot secure cellphones.
An attack on cellphones, rather than communications between cellphones would be an active attack by a very powerful adversary. They are not going to actively attack everyone, or even very many people.
On Fri, Aug 01, 2014 at 05:53:57PM +1000, James A. Donald wrote:
An attack on cellphones, rather than communications between cellphones would be an active attack by a very powerful adversary. They are not going to actively attack everyone, or even very many people.
so is your statement consistent with: http://www.zdziarski.com/blog/?p=3441 -- otr fp: https://www.ctrlc.hu/~stef/otr.txt
On Fri, Aug 1, 2014 at 2:34 AM, stef <s@ctrlc.hu> wrote:
... so is your statement consistent with: http://www.zdziarski.com/blog/?p=3441
mobile is in bad shape, - http://labs.bromium.com/2014/07/31/remote-code-execution-on-android-devices/ - http://www.wired.com/2014/07/hackers-can-control-your-phone-using-a-tool-tha... if anything ever needed giant sandboxes it is mobile, yet expediency trumps and my yearning for seL4 VT-d ARMs pines ever onward... the most effective, persistent, stealthy mobile attacks do leverage IS-* arcana, so perhaps that alone deserving of "very powerful adversary". (a sick fuck reads IS-3, IS-91, IS-54, IS-136, IS-856, IS-2000, E-UTRA) best regards,
Dnia czwartek, 31 lipca 2014 23:26:26 David Hill pisze:
You cannot secure cellphones.
Here, have a read: https://medium.com/message/81e5f33a24e1 Pay some special attention to this part: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - “Most of the world does not have install privileges on the computer they are using.” That is, most people using a computer in the world don’t own the computer they are using. Whether it’s in a cafe, or school, or work, for a huge portion of the world, installing a desktop application isn’t a straightforward option. Every week or two, I was being contacted by people desperate for better security and privacy options, and I would try to help them. I’d start, “Download th…” and then we’d stop. The next thing people would tell me was that they couldn’t install software on their computers. Usually this was because an IT department somewhere was limiting their rights as a part of managing a network. These people needed tools that worked with what they had access to, mostly a browser. So the question I put to hackers, cryptographers, security experts, programmers, and so on was this: What’s the best option for people who can’t download new software to their machines? The answer was unanimous: nothing. They have no options. They are better off talking in plaintext I was told, “so they don’t have a false sense of security.” Since they don’t have access to better software, I was told, they shouldn’t do anything that might upset the people watching them. But, I explained, these are the activists, organizers, and journalists around the world dealing with governments and corporations and criminals that do real harm, the people in real danger. Then they should buy themselves computers, I was told. That was it, that was the answer: be rich enough to buy your own computer, or literally drop dead. I told people that wasn’t good enough, got vilified in a few inconsequential Twitter fights, and moved on. Not long after, I realized where the disconnect was. I went back to the same experts and explained: in the wild, in really dangerous situations — even when people are being hunted by men with guns — when encryption and security fails, no one stops talking. They just hope they don’t get caught. The same human impulse that has kept lotteries alive for thousands of years keeps people fighting the man against the long odds. “Maybe I’ll get away with it, might as well try!” - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- Pozdr rysiek
participants (8)
-
coderman
-
Cooper Quintin
-
David Hill
-
Henry Rivera
-
James A. Donald
-
Matej Kovacic
-
rysiek
-
stef