Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Admin, DevOps, Security
  3. Chat Protocols and Apps
  4. THE CHAT PROTOCOL OF THE FUTURE

THE CHAT PROTOCOL OF THE FUTURE

Scheduled Pinned Locked Moved Chat Protocols and Apps
29 Posts 8 Posters 4 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

    the terraform provider creates and owns the channel. it is the only user with the right to turn on encryption for said channels. voila. this is a perfectly reasonable solution.

    ariadne@social.treehouse.systemsA This user is from outside of this forum
    ariadne@social.treehouse.systemsA This user is from outside of this forum
    ariadne@social.treehouse.systems
    wrote last edited by
    #4

    matrix E2EE channels are fucking stupid because they leak all sorts of metadata

    for example, the topic is unencrypted

    reactions are unencrypted

    replies reference unencrypted MXIDs so you can tell what is being replied to even if the payload itself is encrypted

    do not use them. do not waste your time on them. it is not worth it.

    ariadne@social.treehouse.systemsA A 2 Replies Last reply
    0
    • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

      matrix E2EE channels are fucking stupid because they leak all sorts of metadata

      for example, the topic is unencrypted

      reactions are unencrypted

      replies reference unencrypted MXIDs so you can tell what is being replied to even if the payload itself is encrypted

      do not use them. do not waste your time on them. it is not worth it.

      ariadne@social.treehouse.systemsA This user is from outside of this forum
      ariadne@social.treehouse.systemsA This user is from outside of this forum
      ariadne@social.treehouse.systems
      wrote last edited by
      #5

      or as I put it in the Bundernet #known-issues room which is acting as an FAQ

      Link Preview Image
      siguza@infosec.spaceS 1 Reply Last reply
      0
      • R relay@relay.an.exchange shared this topic
      • incentiveI incentive moved this topic from Uncategorized
      • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

        or as I put it in the Bundernet #known-issues room which is acting as an FAQ

        Link Preview Image
        siguza@infosec.spaceS This user is from outside of this forum
        siguza@infosec.spaceS This user is from outside of this forum
        siguza@infosec.space
        wrote last edited by
        #6

        @ariadne Matrix also allows unencrypted messages in encrypted rooms, and the information that a room is encrypted may not reach a client. I reported this to both clients and the matrix spec, but was told that this was expected behaviour both times ("because we want to allow bots"). Dumbest E2E impl out there.

        1 Reply Last reply
        1
        0
        • R relay@relay.infosec.exchange shared this topic
        • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

          matrix E2EE channels are fucking stupid because they leak all sorts of metadata

          for example, the topic is unencrypted

          reactions are unencrypted

          replies reference unencrypted MXIDs so you can tell what is being replied to even if the payload itself is encrypted

          do not use them. do not waste your time on them. it is not worth it.

          A This user is from outside of this forum
          A This user is from outside of this forum
          alwayscurious@infosec.exchange
          wrote last edited by
          #7

          @ariadne is this something that could be fixed or is it too fundamental to how Matrix works?

          1 Reply Last reply
          1
          0
          • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

            THE CHAT PROTOCOL OF THE FUTURE

            Link Preview Image
            tapafon@soc.ua-fediland.deT This user is from outside of this forum
            tapafon@soc.ua-fediland.deT This user is from outside of this forum
            tapafon@soc.ua-fediland.de
            wrote last edited by
            #8

            @ariadne Are there any good, federated and E2EE IMs? Signal has good E2EE but not federation, XMPP has better federation but no E2EE out of the box.
            IMHO, Matrix is currently the best of what we got, in terms of both decentralisation and privacy.

            ariadne@social.treehouse.systemsA 1 Reply Last reply
            0
            • tapafon@soc.ua-fediland.deT tapafon@soc.ua-fediland.de

              @ariadne Are there any good, federated and E2EE IMs? Signal has good E2EE but not federation, XMPP has better federation but no E2EE out of the box.
              IMHO, Matrix is currently the best of what we got, in terms of both decentralisation and privacy.

              ariadne@social.treehouse.systemsA This user is from outside of this forum
              ariadne@social.treehouse.systemsA This user is from outside of this forum
              ariadne@social.treehouse.systems
              wrote last edited by
              #9

              @tapafon when it comes to E2EE federation is not a priority for me, safety is the priority.

              kkarhan@infosec.spaceK 1 Reply Last reply
              0
              • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                THE CHAT PROTOCOL OF THE FUTURE

                Link Preview Image
                kkarhan@infosec.spaceK This user is from outside of this forum
                kkarhan@infosec.spaceK This user is from outside of this forum
                kkarhan@infosec.space
                wrote last edited by
                #10

                @ariadne /me laughs in #PGP/MIME & #XMPP+#OMEMO

                wojtek@social.vivaldi.netW 1 Reply Last reply
                0
                • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                  @tapafon when it comes to E2EE federation is not a priority for me, safety is the priority.

                  kkarhan@infosec.spaceK This user is from outside of this forum
                  kkarhan@infosec.spaceK This user is from outside of this forum
                  kkarhan@infosec.space
                  wrote last edited by
                  #11

                  @tapafon @ariadne then I guess the only good option is self-hosted #XMPP+#OMEMO and/or #PGP/MIME!

                  • Anything else is either a controlled opposition, honeypot, or just flatout marketing lies.
                  ariadne@social.treehouse.systemsA monal@fosstodon.orgM 2 Replies Last reply
                  0
                  • kkarhan@infosec.spaceK kkarhan@infosec.space

                    @tapafon @ariadne then I guess the only good option is self-hosted #XMPP+#OMEMO and/or #PGP/MIME!

                    • Anything else is either a controlled opposition, honeypot, or just flatout marketing lies.
                    ariadne@social.treehouse.systemsA This user is from outside of this forum
                    ariadne@social.treehouse.systemsA This user is from outside of this forum
                    ariadne@social.treehouse.systems
                    wrote last edited by
                    #12

                    @kkarhan @tapafon XMPP also leaks metadata. E-mail also leaks metadata. secure messaging needs to be built around protocols designed for it.

                    kkarhan@infosec.spaceK 1 Reply Last reply
                    0
                    • kkarhan@infosec.spaceK kkarhan@infosec.space

                      @tapafon @ariadne then I guess the only good option is self-hosted #XMPP+#OMEMO and/or #PGP/MIME!

                      • Anything else is either a controlled opposition, honeypot, or just flatout marketing lies.
                      monal@fosstodon.orgM This user is from outside of this forum
                      monal@fosstodon.orgM This user is from outside of this forum
                      monal@fosstodon.org
                      wrote last edited by
                      #13

                      @tapafon @ariadne @kkarhan

                      Well, I'd say some public xmpp servers hosted by people actively developing clients or being active in the XSF (xmpp standards foundation) are safe to use, too. For example: conversations.im or yax.im.

                      Both are listed as default in Monal and I know both admins personally 🙂

                      You can of course use any server with Monal.

                      kkarhan@infosec.spaceK 1 Reply Last reply
                      0
                      • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                        @kkarhan @tapafon XMPP also leaks metadata. E-mail also leaks metadata. secure messaging needs to be built around protocols designed for it.

                        kkarhan@infosec.spaceK This user is from outside of this forum
                        kkarhan@infosec.spaceK This user is from outside of this forum
                        kkarhan@infosec.space
                        wrote last edited by
                        #14

                        @tapafon @ariadne The whole "Metadata" discussion is for the most part FUD by Signal fans.

                        • OFC this doesn't mean I deny the problem.

                          • But if you are concerned about said issue then you'd already only communicate with you own private self-hosted servers that are only reachable with a VPN over Tor.

                        The truth is that as of now there are no good options out there, unless you consider sending #PGP-encypted messages to a self-hosted, hidden ntfy.sh server to each other.

                        • I'd love to be wrong on that one, but so far #XMPP+#OMEMO & #PGP/MIME (both over #Tor) is the best practical option if you don't expect people to become unlicensed radio amateurs and illegally moonbounce their encrypted messages with WSJ…
                        ariadne@social.treehouse.systemsA 1 Reply Last reply
                        0
                        • kkarhan@infosec.spaceK kkarhan@infosec.space

                          @tapafon @ariadne The whole "Metadata" discussion is for the most part FUD by Signal fans.

                          • OFC this doesn't mean I deny the problem.

                            • But if you are concerned about said issue then you'd already only communicate with you own private self-hosted servers that are only reachable with a VPN over Tor.

                          The truth is that as of now there are no good options out there, unless you consider sending #PGP-encypted messages to a self-hosted, hidden ntfy.sh server to each other.

                          • I'd love to be wrong on that one, but so far #XMPP+#OMEMO & #PGP/MIME (both over #Tor) is the best practical option if you don't expect people to become unlicensed radio amateurs and illegally moonbounce their encrypted messages with WSJ…
                          ariadne@social.treehouse.systemsA This user is from outside of this forum
                          ariadne@social.treehouse.systemsA This user is from outside of this forum
                          ariadne@social.treehouse.systems
                          wrote last edited by
                          #15

                          @kkarhan @tapafon

                          > The whole "Metadata" discussion is for the most part FUD by Signal fans.

                          lmao no it isn't. CIA kills based on metadata.

                          ariadne@social.treehouse.systemsA kkarhan@infosec.spaceK 2 Replies Last reply
                          1
                          0
                          • monal@fosstodon.orgM monal@fosstodon.org

                            @tapafon @ariadne @kkarhan

                            Well, I'd say some public xmpp servers hosted by people actively developing clients or being active in the XSF (xmpp standards foundation) are safe to use, too. For example: conversations.im or yax.im.

                            Both are listed as default in Monal and I know both admins personally 🙂

                            You can of course use any server with Monal.

                            kkarhan@infosec.spaceK This user is from outside of this forum
                            kkarhan@infosec.spaceK This user is from outside of this forum
                            kkarhan@infosec.space
                            wrote last edited by
                            #16

                            @tapafon @ariadne @Monal personally, It's best to trust noone…

                            @monocles for examole is a good client and they certainly do iffer a great service but I don't expect any admin if any server to choose death or prison over snitching.

                            monal@fosstodon.orgM 1 Reply Last reply
                            0
                            • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                              @kkarhan @tapafon

                              > The whole "Metadata" discussion is for the most part FUD by Signal fans.

                              lmao no it isn't. CIA kills based on metadata.

                              ariadne@social.treehouse.systemsA This user is from outside of this forum
                              ariadne@social.treehouse.systemsA This user is from outside of this forum
                              ariadne@social.treehouse.systems
                              wrote last edited by
                              #17

                              @kkarhan @tapafon

                              the solution to Signal being proprietary is to build a libre clone of Signal, not to pretend that Matrix and XMPP are safe.

                              kkarhan@infosec.spaceK 1 Reply Last reply
                              0
                              • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                                @kkarhan @tapafon

                                > The whole "Metadata" discussion is for the most part FUD by Signal fans.

                                lmao no it isn't. CIA kills based on metadata.

                                kkarhan@infosec.spaceK This user is from outside of this forum
                                kkarhan@infosec.spaceK This user is from outside of this forum
                                kkarhan@infosec.space
                                wrote last edited by
                                #18

                                @tapafon @ariadne

                                But if you are concerned about said issue then you'd already only communicate with you own private self-hosted servers that are only reachable with a VPN over Tor.

                                Source

                                Again: Layering & Defining your Scope is critical.

                                • If we expect "#TechIlliterate #Nirmies" to "migrate to #Tails & #GrapheneOS or die" they'll give us all the finger and most likely add a restraint order on top of it.

                                  • OFC we need to work on this scope, but I'd rather offer the "best possible" than being complicit in the Starus Quo.

                                Feel free to name alternatives that actually work and have actual support…

                                ariadne@social.treehouse.systemsA 1 Reply Last reply
                                1
                                0
                                • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                                  @kkarhan @tapafon

                                  the solution to Signal being proprietary is to build a libre clone of Signal, not to pretend that Matrix and XMPP are safe.

                                  kkarhan@infosec.spaceK This user is from outside of this forum
                                  kkarhan@infosec.spaceK This user is from outside of this forum
                                  kkarhan@infosec.space
                                  wrote last edited by
                                  #19

                                  @tapafon @ariadne that won't hapoen because #Signal are so fucking criminally incompetent that they are hard locked-in on #aws on their inrastructure.

                                  • It would likely be easier and cheaper in terms of personnel hours needed to just make better, hardened clients for existing protocols rather than "unfuck" the mess that is @signalapp, which at best is just a big-ass #Honeypot!
                                  1 Reply Last reply
                                  1
                                  0
                                  • kkarhan@infosec.spaceK kkarhan@infosec.space

                                    @tapafon @ariadne

                                    But if you are concerned about said issue then you'd already only communicate with you own private self-hosted servers that are only reachable with a VPN over Tor.

                                    Source

                                    Again: Layering & Defining your Scope is critical.

                                    • If we expect "#TechIlliterate #Nirmies" to "migrate to #Tails & #GrapheneOS or die" they'll give us all the finger and most likely add a restraint order on top of it.

                                      • OFC we need to work on this scope, but I'd rather offer the "best possible" than being complicit in the Starus Quo.

                                    Feel free to name alternatives that actually work and have actual support…

                                    ariadne@social.treehouse.systemsA This user is from outside of this forum
                                    ariadne@social.treehouse.systemsA This user is from outside of this forum
                                    ariadne@social.treehouse.systems
                                    wrote last edited by
                                    #20

                                    @kkarhan @tapafon

                                    the scope is that western democracy is in a state of freefall and we are actively losing ground to fascist oligarchs in both the US and EU.

                                    in such a scope, cute toys like OMEMO and IRC's blowfish scripts and things of the same shape like Matrix's OLM/MegOLM do not provide an acceptable level of personal assurance.

                                    telling people to depend on these technologies as a security engineer is malfeasance.

                                    Signal also is not truly good enough (because it is proprietary), but it is at least accessible to non-technical people and cryptographically sound.

                                    the real answer is Tox, but somebody needs to build the plumbing to make it accessible to non-technical people.

                                    tris@chaos.socialT 1 Reply Last reply
                                    0
                                    • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                                      @kkarhan @tapafon

                                      the scope is that western democracy is in a state of freefall and we are actively losing ground to fascist oligarchs in both the US and EU.

                                      in such a scope, cute toys like OMEMO and IRC's blowfish scripts and things of the same shape like Matrix's OLM/MegOLM do not provide an acceptable level of personal assurance.

                                      telling people to depend on these technologies as a security engineer is malfeasance.

                                      Signal also is not truly good enough (because it is proprietary), but it is at least accessible to non-technical people and cryptographically sound.

                                      the real answer is Tox, but somebody needs to build the plumbing to make it accessible to non-technical people.

                                      tris@chaos.socialT This user is from outside of this forum
                                      tris@chaos.socialT This user is from outside of this forum
                                      tris@chaos.social
                                      wrote last edited by
                                      #21

                                      @kkarhan @tapafon@soc.ua-fediland.de @ariadne Isn't Tox that P2P thing? There's @cwtch developed by amazing folks like @sarahjamielewis

                                      ariadne@social.treehouse.systemsA 1 Reply Last reply
                                      0
                                      • tris@chaos.socialT tris@chaos.social

                                        @kkarhan @tapafon@soc.ua-fediland.de @ariadne Isn't Tox that P2P thing? There's @cwtch developed by amazing folks like @sarahjamielewis

                                        ariadne@social.treehouse.systemsA This user is from outside of this forum
                                        ariadne@social.treehouse.systemsA This user is from outside of this forum
                                        ariadne@social.treehouse.systems
                                        wrote last edited by
                                        #22

                                        @tris @kkarhan @cwtch @sarahjamielewis yes. Cwtch would also work, but I am less familiar with it. It also needs plumbing for non-technical people.

                                        BBM worked with fingerprints back in the day because PGP fingerprints were 32-bit at the time. Asking non-technical people to memorize 100s of bits of public key material isn't going to work.

                                        kkarhan@infosec.spaceK 1 Reply Last reply
                                        0
                                        • kkarhan@infosec.spaceK kkarhan@infosec.space

                                          @tapafon @ariadne @Monal personally, It's best to trust noone…

                                          @monocles for examole is a good client and they certainly do iffer a great service but I don't expect any admin if any server to choose death or prison over snitching.

                                          monal@fosstodon.orgM This user is from outside of this forum
                                          monal@fosstodon.orgM This user is from outside of this forum
                                          monal@fosstodon.org
                                          wrote last edited by
                                          #23

                                          @tapafon @ariadne @monocles @kkarhan sure, but you talked about honeypots and controlled opposition and that's normally not true for the people I mentioned.

                                          Also, albeit a bit philosophical, you always have to trust someone. You seem to make the cut at the client side (so you trust the client developers to not sneak some surveillance code in) and I make the cut somewhere on the server side, not trusting all servers, but some 🙂

                                          ariadne@social.treehouse.systemsA 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups