Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Admin, DevOps, Security
  3. Chat Protocols and Apps
  4. THE CHAT PROTOCOL OF THE FUTURE

THE CHAT PROTOCOL OF THE FUTURE

Scheduled Pinned Locked Moved Chat Protocols and Apps
29 Posts 8 Posters 4 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

    matrix E2EE channels are fucking stupid because they leak all sorts of metadata

    for example, the topic is unencrypted

    reactions are unencrypted

    replies reference unencrypted MXIDs so you can tell what is being replied to even if the payload itself is encrypted

    do not use them. do not waste your time on them. it is not worth it.

    A This user is from outside of this forum
    A This user is from outside of this forum
    alwayscurious@infosec.exchange
    wrote last edited by
    #7

    @ariadne is this something that could be fixed or is it too fundamental to how Matrix works?

    1 Reply Last reply
    1
    0
    • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

      THE CHAT PROTOCOL OF THE FUTURE

      Link Preview Image
      tapafon@soc.ua-fediland.deT This user is from outside of this forum
      tapafon@soc.ua-fediland.deT This user is from outside of this forum
      tapafon@soc.ua-fediland.de
      wrote last edited by
      #8

      @ariadne Are there any good, federated and E2EE IMs? Signal has good E2EE but not federation, XMPP has better federation but no E2EE out of the box.
      IMHO, Matrix is currently the best of what we got, in terms of both decentralisation and privacy.

      ariadne@social.treehouse.systemsA 1 Reply Last reply
      0
      • tapafon@soc.ua-fediland.deT tapafon@soc.ua-fediland.de

        @ariadne Are there any good, federated and E2EE IMs? Signal has good E2EE but not federation, XMPP has better federation but no E2EE out of the box.
        IMHO, Matrix is currently the best of what we got, in terms of both decentralisation and privacy.

        ariadne@social.treehouse.systemsA This user is from outside of this forum
        ariadne@social.treehouse.systemsA This user is from outside of this forum
        ariadne@social.treehouse.systems
        wrote last edited by
        #9

        @tapafon when it comes to E2EE federation is not a priority for me, safety is the priority.

        kkarhan@infosec.spaceK 1 Reply Last reply
        0
        • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

          THE CHAT PROTOCOL OF THE FUTURE

          Link Preview Image
          kkarhan@infosec.spaceK This user is from outside of this forum
          kkarhan@infosec.spaceK This user is from outside of this forum
          kkarhan@infosec.space
          wrote last edited by
          #10

          @ariadne /me laughs in #PGP/MIME & #XMPP+#OMEMO

          wojtek@social.vivaldi.netW 1 Reply Last reply
          0
          • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

            @tapafon when it comes to E2EE federation is not a priority for me, safety is the priority.

            kkarhan@infosec.spaceK This user is from outside of this forum
            kkarhan@infosec.spaceK This user is from outside of this forum
            kkarhan@infosec.space
            wrote last edited by
            #11

            @tapafon @ariadne then I guess the only good option is self-hosted #XMPP+#OMEMO and/or #PGP/MIME!

            • Anything else is either a controlled opposition, honeypot, or just flatout marketing lies.
            ariadne@social.treehouse.systemsA monal@fosstodon.orgM 2 Replies Last reply
            0
            • kkarhan@infosec.spaceK kkarhan@infosec.space

              @tapafon @ariadne then I guess the only good option is self-hosted #XMPP+#OMEMO and/or #PGP/MIME!

              • Anything else is either a controlled opposition, honeypot, or just flatout marketing lies.
              ariadne@social.treehouse.systemsA This user is from outside of this forum
              ariadne@social.treehouse.systemsA This user is from outside of this forum
              ariadne@social.treehouse.systems
              wrote last edited by
              #12

              @kkarhan @tapafon XMPP also leaks metadata. E-mail also leaks metadata. secure messaging needs to be built around protocols designed for it.

              kkarhan@infosec.spaceK 1 Reply Last reply
              0
              • kkarhan@infosec.spaceK kkarhan@infosec.space

                @tapafon @ariadne then I guess the only good option is self-hosted #XMPP+#OMEMO and/or #PGP/MIME!

                • Anything else is either a controlled opposition, honeypot, or just flatout marketing lies.
                monal@fosstodon.orgM This user is from outside of this forum
                monal@fosstodon.orgM This user is from outside of this forum
                monal@fosstodon.org
                wrote last edited by
                #13

                @tapafon @ariadne @kkarhan

                Well, I'd say some public xmpp servers hosted by people actively developing clients or being active in the XSF (xmpp standards foundation) are safe to use, too. For example: conversations.im or yax.im.

                Both are listed as default in Monal and I know both admins personally 🙂

                You can of course use any server with Monal.

                kkarhan@infosec.spaceK 1 Reply Last reply
                0
                • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                  @kkarhan @tapafon XMPP also leaks metadata. E-mail also leaks metadata. secure messaging needs to be built around protocols designed for it.

                  kkarhan@infosec.spaceK This user is from outside of this forum
                  kkarhan@infosec.spaceK This user is from outside of this forum
                  kkarhan@infosec.space
                  wrote last edited by
                  #14

                  @tapafon @ariadne The whole "Metadata" discussion is for the most part FUD by Signal fans.

                  • OFC this doesn't mean I deny the problem.

                    • But if you are concerned about said issue then you'd already only communicate with you own private self-hosted servers that are only reachable with a VPN over Tor.

                  The truth is that as of now there are no good options out there, unless you consider sending #PGP-encypted messages to a self-hosted, hidden ntfy.sh server to each other.

                  • I'd love to be wrong on that one, but so far #XMPP+#OMEMO & #PGP/MIME (both over #Tor) is the best practical option if you don't expect people to become unlicensed radio amateurs and illegally moonbounce their encrypted messages with WSJ…
                  ariadne@social.treehouse.systemsA 1 Reply Last reply
                  0
                  • kkarhan@infosec.spaceK kkarhan@infosec.space

                    @tapafon @ariadne The whole "Metadata" discussion is for the most part FUD by Signal fans.

                    • OFC this doesn't mean I deny the problem.

                      • But if you are concerned about said issue then you'd already only communicate with you own private self-hosted servers that are only reachable with a VPN over Tor.

                    The truth is that as of now there are no good options out there, unless you consider sending #PGP-encypted messages to a self-hosted, hidden ntfy.sh server to each other.

                    • I'd love to be wrong on that one, but so far #XMPP+#OMEMO & #PGP/MIME (both over #Tor) is the best practical option if you don't expect people to become unlicensed radio amateurs and illegally moonbounce their encrypted messages with WSJ…
                    ariadne@social.treehouse.systemsA This user is from outside of this forum
                    ariadne@social.treehouse.systemsA This user is from outside of this forum
                    ariadne@social.treehouse.systems
                    wrote last edited by
                    #15

                    @kkarhan @tapafon

                    > The whole "Metadata" discussion is for the most part FUD by Signal fans.

                    lmao no it isn't. CIA kills based on metadata.

                    ariadne@social.treehouse.systemsA kkarhan@infosec.spaceK 2 Replies Last reply
                    1
                    0
                    • monal@fosstodon.orgM monal@fosstodon.org

                      @tapafon @ariadne @kkarhan

                      Well, I'd say some public xmpp servers hosted by people actively developing clients or being active in the XSF (xmpp standards foundation) are safe to use, too. For example: conversations.im or yax.im.

                      Both are listed as default in Monal and I know both admins personally 🙂

                      You can of course use any server with Monal.

                      kkarhan@infosec.spaceK This user is from outside of this forum
                      kkarhan@infosec.spaceK This user is from outside of this forum
                      kkarhan@infosec.space
                      wrote last edited by
                      #16

                      @tapafon @ariadne @Monal personally, It's best to trust noone…

                      @monocles for examole is a good client and they certainly do iffer a great service but I don't expect any admin if any server to choose death or prison over snitching.

                      monal@fosstodon.orgM 1 Reply Last reply
                      0
                      • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                        @kkarhan @tapafon

                        > The whole "Metadata" discussion is for the most part FUD by Signal fans.

                        lmao no it isn't. CIA kills based on metadata.

                        ariadne@social.treehouse.systemsA This user is from outside of this forum
                        ariadne@social.treehouse.systemsA This user is from outside of this forum
                        ariadne@social.treehouse.systems
                        wrote last edited by
                        #17

                        @kkarhan @tapafon

                        the solution to Signal being proprietary is to build a libre clone of Signal, not to pretend that Matrix and XMPP are safe.

                        kkarhan@infosec.spaceK 1 Reply Last reply
                        0
                        • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                          @kkarhan @tapafon

                          > The whole "Metadata" discussion is for the most part FUD by Signal fans.

                          lmao no it isn't. CIA kills based on metadata.

                          kkarhan@infosec.spaceK This user is from outside of this forum
                          kkarhan@infosec.spaceK This user is from outside of this forum
                          kkarhan@infosec.space
                          wrote last edited by
                          #18

                          @tapafon @ariadne

                          But if you are concerned about said issue then you'd already only communicate with you own private self-hosted servers that are only reachable with a VPN over Tor.

                          Source

                          Again: Layering & Defining your Scope is critical.

                          • If we expect "#TechIlliterate #Nirmies" to "migrate to #Tails & #GrapheneOS or die" they'll give us all the finger and most likely add a restraint order on top of it.

                            • OFC we need to work on this scope, but I'd rather offer the "best possible" than being complicit in the Starus Quo.

                          Feel free to name alternatives that actually work and have actual support…

                          ariadne@social.treehouse.systemsA 1 Reply Last reply
                          1
                          0
                          • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                            @kkarhan @tapafon

                            the solution to Signal being proprietary is to build a libre clone of Signal, not to pretend that Matrix and XMPP are safe.

                            kkarhan@infosec.spaceK This user is from outside of this forum
                            kkarhan@infosec.spaceK This user is from outside of this forum
                            kkarhan@infosec.space
                            wrote last edited by
                            #19

                            @tapafon @ariadne that won't hapoen because #Signal are so fucking criminally incompetent that they are hard locked-in on #aws on their inrastructure.

                            • It would likely be easier and cheaper in terms of personnel hours needed to just make better, hardened clients for existing protocols rather than "unfuck" the mess that is @signalapp, which at best is just a big-ass #Honeypot!
                            1 Reply Last reply
                            1
                            0
                            • kkarhan@infosec.spaceK kkarhan@infosec.space

                              @tapafon @ariadne

                              But if you are concerned about said issue then you'd already only communicate with you own private self-hosted servers that are only reachable with a VPN over Tor.

                              Source

                              Again: Layering & Defining your Scope is critical.

                              • If we expect "#TechIlliterate #Nirmies" to "migrate to #Tails & #GrapheneOS or die" they'll give us all the finger and most likely add a restraint order on top of it.

                                • OFC we need to work on this scope, but I'd rather offer the "best possible" than being complicit in the Starus Quo.

                              Feel free to name alternatives that actually work and have actual support…

                              ariadne@social.treehouse.systemsA This user is from outside of this forum
                              ariadne@social.treehouse.systemsA This user is from outside of this forum
                              ariadne@social.treehouse.systems
                              wrote last edited by
                              #20

                              @kkarhan @tapafon

                              the scope is that western democracy is in a state of freefall and we are actively losing ground to fascist oligarchs in both the US and EU.

                              in such a scope, cute toys like OMEMO and IRC's blowfish scripts and things of the same shape like Matrix's OLM/MegOLM do not provide an acceptable level of personal assurance.

                              telling people to depend on these technologies as a security engineer is malfeasance.

                              Signal also is not truly good enough (because it is proprietary), but it is at least accessible to non-technical people and cryptographically sound.

                              the real answer is Tox, but somebody needs to build the plumbing to make it accessible to non-technical people.

                              tris@chaos.socialT 1 Reply Last reply
                              0
                              • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                                @kkarhan @tapafon

                                the scope is that western democracy is in a state of freefall and we are actively losing ground to fascist oligarchs in both the US and EU.

                                in such a scope, cute toys like OMEMO and IRC's blowfish scripts and things of the same shape like Matrix's OLM/MegOLM do not provide an acceptable level of personal assurance.

                                telling people to depend on these technologies as a security engineer is malfeasance.

                                Signal also is not truly good enough (because it is proprietary), but it is at least accessible to non-technical people and cryptographically sound.

                                the real answer is Tox, but somebody needs to build the plumbing to make it accessible to non-technical people.

                                tris@chaos.socialT This user is from outside of this forum
                                tris@chaos.socialT This user is from outside of this forum
                                tris@chaos.social
                                wrote last edited by
                                #21

                                @kkarhan @tapafon@soc.ua-fediland.de @ariadne Isn't Tox that P2P thing? There's @cwtch developed by amazing folks like @sarahjamielewis

                                ariadne@social.treehouse.systemsA 1 Reply Last reply
                                0
                                • tris@chaos.socialT tris@chaos.social

                                  @kkarhan @tapafon@soc.ua-fediland.de @ariadne Isn't Tox that P2P thing? There's @cwtch developed by amazing folks like @sarahjamielewis

                                  ariadne@social.treehouse.systemsA This user is from outside of this forum
                                  ariadne@social.treehouse.systemsA This user is from outside of this forum
                                  ariadne@social.treehouse.systems
                                  wrote last edited by
                                  #22

                                  @tris @kkarhan @cwtch @sarahjamielewis yes. Cwtch would also work, but I am less familiar with it. It also needs plumbing for non-technical people.

                                  BBM worked with fingerprints back in the day because PGP fingerprints were 32-bit at the time. Asking non-technical people to memorize 100s of bits of public key material isn't going to work.

                                  kkarhan@infosec.spaceK 1 Reply Last reply
                                  0
                                  • kkarhan@infosec.spaceK kkarhan@infosec.space

                                    @tapafon @ariadne @Monal personally, It's best to trust noone…

                                    @monocles for examole is a good client and they certainly do iffer a great service but I don't expect any admin if any server to choose death or prison over snitching.

                                    monal@fosstodon.orgM This user is from outside of this forum
                                    monal@fosstodon.orgM This user is from outside of this forum
                                    monal@fosstodon.org
                                    wrote last edited by
                                    #23

                                    @tapafon @ariadne @monocles @kkarhan sure, but you talked about honeypots and controlled opposition and that's normally not true for the people I mentioned.

                                    Also, albeit a bit philosophical, you always have to trust someone. You seem to make the cut at the client side (so you trust the client developers to not sneak some surveillance code in) and I make the cut somewhere on the server side, not trusting all servers, but some 🙂

                                    ariadne@social.treehouse.systemsA 1 Reply Last reply
                                    0
                                    • monal@fosstodon.orgM monal@fosstodon.org

                                      @tapafon @ariadne @monocles @kkarhan sure, but you talked about honeypots and controlled opposition and that's normally not true for the people I mentioned.

                                      Also, albeit a bit philosophical, you always have to trust someone. You seem to make the cut at the client side (so you trust the client developers to not sneak some surveillance code in) and I make the cut somewhere on the server side, not trusting all servers, but some 🙂

                                      ariadne@social.treehouse.systemsA This user is from outside of this forum
                                      ariadne@social.treehouse.systemsA This user is from outside of this forum
                                      ariadne@social.treehouse.systems
                                      wrote last edited by
                                      #24

                                      @Monal @tapafon @monocles @kkarhan you don't have to blindly trust clients that are libre, as they will get audited.

                                      kkarhan@infosec.spaceK 1 Reply Last reply
                                      0
                                      • kkarhan@infosec.spaceK kkarhan@infosec.space

                                        @ariadne /me laughs in #PGP/MIME & #XMPP+#OMEMO

                                        wojtek@social.vivaldi.netW This user is from outside of this forum
                                        wojtek@social.vivaldi.netW This user is from outside of this forum
                                        wojtek@social.vivaldi.net
                                        wrote last edited by
                                        #25

                                        @kkarhan @ariadne riiight… because OMEMO works so well! /s xDDDD

                                        kkarhan@infosec.spaceK 1 Reply Last reply
                                        0
                                        • ariadne@social.treehouse.systemsA ariadne@social.treehouse.systems

                                          @tris @kkarhan @cwtch @sarahjamielewis yes. Cwtch would also work, but I am less familiar with it. It also needs plumbing for non-technical people.

                                          BBM worked with fingerprints back in the day because PGP fingerprints were 32-bit at the time. Asking non-technical people to memorize 100s of bits of public key material isn't going to work.

                                          kkarhan@infosec.spaceK This user is from outside of this forum
                                          kkarhan@infosec.spaceK This user is from outside of this forum
                                          kkarhan@infosec.space
                                          wrote last edited by
                                          #26

                                          @tris @tapafon @cwtch @sarahjamielewis @ariadne Until then, there needs to be something that actually works, is easy to self-host and transition to as a first step.

                                          • Granted, one could do a fully-decentralized system to a degree, but either way anything would necessitate teaching #TechLiteracy to the people.

                                            • Otherwise we run into the same problems #GnuPG and Finale did.

                                          Call me weird, but that's sadly not a new problem either!

                                          kkarhan@infosec.spaceK 1 Reply Last reply
                                          1
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups