Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists.

We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists.

Scheduled Pinned Locked Moved Uncategorized
98 Posts 50 Posters 175 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • kkarhan@infosec.spaceK kkarhan@infosec.space

    @divVerent The problem is that @signalapp mandates #PII like #PhoneNumbers, which is critical for said #phishing...

    • If they actually did their infrastrutre setup correctly, this would not have been possible in the first place - ffs!
      • That's why I've never even seen nor heard of any #PhishingAttacks on #XMPP+#OMEMO because you don't have to self-d0x to a #centralized, proprietary, #SingleVendor & #SingleProvider messenger which can't even be assed to get their garbage off #aws!

    #Signal can spout all their "#Metadata" - #FUD all day but in the end they fall under #CloudAct and will snitch on users because if they didn't it would've been a statistical inevitability that @Mer__edith and #Moxie would've been in jail and Signal shutdown like #EncroChat was.

    • Make of that what you will, but demanding a #PhoneNumber [which is either directly ("#KYC!") or indirectly / circumstantially linked to a person should be seen as *THE BIGGEST RED FLAG for any service.
      • It's like asking for an #ID at a store not as means to "verify age" with like a #DOB & Photo on something not trivial to forge but rather demanding someone's address just to buy a beer!
    divverent@misskey.deD This user is from outside of this forum
    divverent@misskey.deD This user is from outside of this forum
    divverent@misskey.de
    wrote last edited by
    #59
    @kkarhan@infosec.space @signalapp@mastodon.world @Mer__edith@mastodon.world I do boycott Signal for the same reason - I will not use a messenger that requires a phone number.

    Also because my phone number already changed like 5 to 10 times in my life. It simply sucks as an identifier.

    But this has nothing to do with the attack in question, and nothing at all with control over usernames as you alluded to in your previous post. You can literally attack every service that does SMS 2FA with that (also a good reason to not do SMS 2FA, neither any other phone number identified 2FA - as it means that all you need for a good phish is the the phone number, which both allows you to attempt account recovery and is also a communication channel from you to your victim. I can list a bunch of services that are very likely vulnerable to the exact same attack:

    - Telegram
    - WhatsApp
    - Gmail
    - Your bank account (in particular basically all US banks)
    - GitHub

    Personally I am still using #Matrix, but I don't quite like it either. The protocol is overengineered and all clients suck (and there aren't even many clients to begin with that actually work, which is specifically the case because the protocol is so messy).

    I actually had used XMPP before, but for me it kinda died when mobile devices came along and XMPP didn't learn a good way for push notifications without keeping a TCP connection to the service open at all times . Really sucks when e.g. being on a train. Seems XEP-0357 from 2020 fixes that (not sure if it by now has a good story for multi device + offline messages, so you can connect sometimes with this device, sometimes with that one, and see full message history from both, and can also receive messages when none is online), but that shows the other problem of XMPP: everything is an extension and you can never know which feature set your server supports, and then you also need to know which feature set works with the people you talk to... IMHO they should collect a good set of XEPs and name it Jabber 2.0 or whatever, then servers and clients at least know what to align to. With that XMPP would actually have good chances at replacing Matrix.
    kkarhan@infosec.spaceK 1 Reply Last reply
    0
    • divverent@misskey.deD divverent@misskey.de
      @kkarhan@infosec.space @signalapp@mastodon.world @Mer__edith@mastodon.world I do boycott Signal for the same reason - I will not use a messenger that requires a phone number.

      Also because my phone number already changed like 5 to 10 times in my life. It simply sucks as an identifier.

      But this has nothing to do with the attack in question, and nothing at all with control over usernames as you alluded to in your previous post. You can literally attack every service that does SMS 2FA with that (also a good reason to not do SMS 2FA, neither any other phone number identified 2FA - as it means that all you need for a good phish is the the phone number, which both allows you to attempt account recovery and is also a communication channel from you to your victim. I can list a bunch of services that are very likely vulnerable to the exact same attack:

      - Telegram
      - WhatsApp
      - Gmail
      - Your bank account (in particular basically all US banks)
      - GitHub

      Personally I am still using #Matrix, but I don't quite like it either. The protocol is overengineered and all clients suck (and there aren't even many clients to begin with that actually work, which is specifically the case because the protocol is so messy).

      I actually had used XMPP before, but for me it kinda died when mobile devices came along and XMPP didn't learn a good way for push notifications without keeping a TCP connection to the service open at all times . Really sucks when e.g. being on a train. Seems XEP-0357 from 2020 fixes that (not sure if it by now has a good story for multi device + offline messages, so you can connect sometimes with this device, sometimes with that one, and see full message history from both, and can also receive messages when none is online), but that shows the other problem of XMPP: everything is an extension and you can never know which feature set your server supports, and then you also need to know which feature set works with the people you talk to... IMHO they should collect a good set of XEPs and name it Jabber 2.0 or whatever, then servers and clients at least know what to align to. With that XMPP would actually have good chances at replacing Matrix.
      kkarhan@infosec.spaceK This user is from outside of this forum
      kkarhan@infosec.spaceK This user is from outside of this forum
      kkarhan@infosec.space
      wrote last edited by
      #60

      @divVerent @signalapp @Mer__edith Yeah, I know folks that have changed phone numbers more frequent than addresses, license plates, employers and cars in the same time...

      • Some places even treat #PhnoneNumbers as "immuteable"...
        • See r / #SoftwareGore!
      1 Reply Last reply
      1
      0
      • kkarhan@infosec.spaceK kkarhan@infosec.space

        @vfrmedia @gettie Point is that #Telco regulations stems from #Telegraphy and #Postal operations, and whilst there are legitimate reasons for #regulators to disconnect phone lines (otherwise #robocalling and #SMS-#Spam would be even more rampant than #eMail-#Spamming!)

        • Which OFC also intertwines with "#LawfulInterception" and the means of Governments to exercise control.
          • So anything claiming #security must inherently acknowledge the unfixable #insecurity of the #PSTN and completely cease using it and it's per-design compromised Infrastructure as a matter of principle.

        That's why any "#secure communications" treats it as a hostile network and not to be trusted!

        • And that's not even scratching the surface that countries try to outlaw #anonymity - starting with #Prepaid - #SIM - Cards.
          • Because those traditionally had no reason for "#KYC" as there was no means for a customer to incur #debt or commit #fraud against the telco that provided said services, so there was [and IMHO still is] no "legitimate interest" in demanding any #ID for those, as any crime committed would be investigated with the existing #Govware inside the networks and thus found out.
        vfrmedia@social.tchncs.deV This user is from outside of this forum
        vfrmedia@social.tchncs.deV This user is from outside of this forum
        vfrmedia@social.tchncs.de
        wrote last edited by
        #61

        @kkarhan @gettie

        UK still sells prepaid SIMs but all providers either nudge you to have them delivered to a physical address and only allow cashless topups, or if you buy them from the shop it has CCTV (authorities have used this to catch those using PAYG SIMs for drug dealing lines and/or gang activity)

        I'm slightly surprised I haven't been pulled over as I've been driving around with as many as 6-7 active mobile devices in my car (driving solo in a relatively small hatchback), but I suspect authorities already know from ANPR and my movements (plus the nature of these SIMS and devices) they are for frontline health and social care workers and not anything sinister..

        kkarhan@infosec.spaceK 1 Reply Last reply
        0
        • vfrmedia@social.tchncs.deV vfrmedia@social.tchncs.de

          @kkarhan @gettie

          UK still sells prepaid SIMs but all providers either nudge you to have them delivered to a physical address and only allow cashless topups, or if you buy them from the shop it has CCTV (authorities have used this to catch those using PAYG SIMs for drug dealing lines and/or gang activity)

          I'm slightly surprised I haven't been pulled over as I've been driving around with as many as 6-7 active mobile devices in my car (driving solo in a relatively small hatchback), but I suspect authorities already know from ANPR and my movements (plus the nature of these SIMS and devices) they are for frontline health and social care workers and not anything sinister..

          kkarhan@infosec.spaceK This user is from outside of this forum
          kkarhan@infosec.spaceK This user is from outside of this forum
          kkarhan@infosec.space
          wrote last edited by
          #62

          @vfrmedia @gettie In fact, many places will literally note that down in their #LawfulInterception system (i.e. in Germany).

          • I.e. not only are providers banned from listing designated crisis helplines`(that are 0800 numbers) but if police try to query call records from someone with *"confidentiality privilegues" like lawyer, psychologist, doctor, psychatrist, notary, rehab clinic, addiction help center, etc. they get a BIG ASS RED WARNING BOX when they check for that number that said line is subject to said privilegues and that they cannot monitor it without warrant and have to file that with the request.
            • So even if they ever looked up why half a dozen devices are there, they'd quickly came to the conclusion that you are a known bona fide user and the other devices are too.

          Tho for most stochastic surveillance the number of SIMs and devices isn't that high that you'd cause suspicion, given a lot of #IoT garbage has at least a #4G or #5G - modem in it to send telemetry and that 7 devices can also be assumed 1 fro the #eCall of the car and 3 people with 1 #DualSIM phone or a regular phone + laptop with WWAN modem each.

          vfrmedia@social.tchncs.deV 1 Reply Last reply
          1
          0
          • kainisenni@vocalounge.cafeK kainisenni@vocalounge.cafe

            @unaegeli
            -That's a different code
            -It's very clearly a popup, and not in a chat
            -To abuse it, one would already need access to the account, i.e. through having completed the other attack

            I feel like that reminder is distinct enough as it is
            @signalapp

            unaegeli@swiss.socialU This user is from outside of this forum
            unaegeli@swiss.socialU This user is from outside of this forum
            unaegeli@swiss.social
            wrote last edited by
            #63

            @kainisenni @signalapp

            I see the difference now, thanks.

            1 Reply Last reply
            0
            • kkarhan@infosec.spaceK kkarhan@infosec.space

              @vfrmedia @gettie In fact, many places will literally note that down in their #LawfulInterception system (i.e. in Germany).

              • I.e. not only are providers banned from listing designated crisis helplines`(that are 0800 numbers) but if police try to query call records from someone with *"confidentiality privilegues" like lawyer, psychologist, doctor, psychatrist, notary, rehab clinic, addiction help center, etc. they get a BIG ASS RED WARNING BOX when they check for that number that said line is subject to said privilegues and that they cannot monitor it without warrant and have to file that with the request.
                • So even if they ever looked up why half a dozen devices are there, they'd quickly came to the conclusion that you are a known bona fide user and the other devices are too.

              Tho for most stochastic surveillance the number of SIMs and devices isn't that high that you'd cause suspicion, given a lot of #IoT garbage has at least a #4G or #5G - modem in it to send telemetry and that 7 devices can also be assumed 1 fro the #eCall of the car and 3 people with 1 #DualSIM phone or a regular phone + laptop with WWAN modem each.

              vfrmedia@social.tchncs.deV This user is from outside of this forum
              vfrmedia@social.tchncs.deV This user is from outside of this forum
              vfrmedia@social.tchncs.de
              wrote last edited by
              #64

              @kkarhan

              my car is just a few months before ecall was implemented (and it doesn't even work on some cars as 3G got ceased here), and some of the more modern cameras around these days would show I'm obviously driving solo and often at unusual hours of the night.

              Although any tracking would also show I take the same route every day between either my home and workplace, or sometimes the coastal town where some of our staff are.

              There is /some/ monitoring of social care workers as during Covid there were a few drugdealers pretending to be them (even getting uniforms etc), as well as healthcare workers themselves going rogue (I've noticed our staff are getting more attention from the Police recently, checking their cars are 100% legal)

              kkarhan@infosec.spaceK 1 Reply Last reply
              0
              • unaegeli@swiss.socialU unaegeli@swiss.social

                @signalapp

                Hmmm, and what about the monthly reminder to enter the personal smartphone code? How to differentiate this from the other?

                elduvelle@neuromatch.socialE This user is from outside of this forum
                elduvelle@neuromatch.socialE This user is from outside of this forum
                elduvelle@neuromatch.social
                wrote last edited by
                #65

                @unaegeli @signalapp i know right??

                1 Reply Last reply
                0
                • signalapp@mastodon.worldS signalapp@mastodon.world

                  These attacks, like all phishing, rely on social engineering. Attackers impersonate trusted contacts or services (such as the non-existent “Signal Support Bot”) to trick victims into handing over their login credentials or other information. To help prevent this, remember that your Signal SMS verification code is only ever needed when you are first signing up for the Signal app.

                  dresstokilt@mastodon.socialD This user is from outside of this forum
                  dresstokilt@mastodon.socialD This user is from outside of this forum
                  dresstokilt@mastodon.social
                  wrote last edited by
                  #66

                  @signalapp probably doesn't help that your app suggests that I verify my PIN - which apparently I will ever need? - every time I'm in it.

                  1 Reply Last reply
                  0
                  • vfrmedia@social.tchncs.deV vfrmedia@social.tchncs.de

                    @kkarhan

                    my car is just a few months before ecall was implemented (and it doesn't even work on some cars as 3G got ceased here), and some of the more modern cameras around these days would show I'm obviously driving solo and often at unusual hours of the night.

                    Although any tracking would also show I take the same route every day between either my home and workplace, or sometimes the coastal town where some of our staff are.

                    There is /some/ monitoring of social care workers as during Covid there were a few drugdealers pretending to be them (even getting uniforms etc), as well as healthcare workers themselves going rogue (I've noticed our staff are getting more attention from the Police recently, checking their cars are 100% legal)

                    kkarhan@infosec.spaceK This user is from outside of this forum
                    kkarhan@infosec.spaceK This user is from outside of this forum
                    kkarhan@infosec.space
                    wrote last edited by
                    #67

                    @vfrmedia I mean in any juristictions it's legal for police to randomly pull over cars, check license & registration and ask for mandatory safety equient like Warning Triangle, First Aid Kit and Retroflective Vest to be presented.

                    • And that is being used by the police to both gather intelligence as well as annoy individuals (i.e. motorists joyriding) out of an area.
                      • I mean, police do it all the time whenever they feel like it, and whilst theybdon't admit to it, I'm pretty shure they check way more plates than they pull over because they prefer to skip all the uninteresting ones…
                      • Cuz lets face it: It'll only waste time if they pull over some retirement-aged women who's only negative data on file - a parking ticket in the 1990s - is long expunged from records vs. someone with a decent record driving suspiciously orderly…
                    vfrmedia@social.tchncs.deV 1 Reply Last reply
                    0
                    • signalapp@mastodon.worldS signalapp@mastodon.world

                      To protect people from such phishing, Signal actively warns users against sharing their SMS code and PIN.

                      We also want to emphasize that Signal Support will *never* initiate contact via in-app messages, SMS, or social media to ask for your verification code or PIN. If anyone asks for any Signal related code, it is a scam. We make this clear when users receive their SMS code during initial signup.

                      orca@nya.oneO This user is from outside of this forum
                      orca@nya.oneO This user is from outside of this forum
                      orca@nya.one
                      wrote last edited by
                      #68
                      @signalapp@mastodon.world #Alt4You Better alt-text
                      A SMS message from Signal, reads:
                      SIGNAL code: 751912. Do not share this code with anyone. If anyone asks it's a SCAM. Our reps will NEVER ask for it.
                      1 Reply Last reply
                      0
                      • kkarhan@infosec.spaceK kkarhan@infosec.space

                        @vfrmedia I mean in any juristictions it's legal for police to randomly pull over cars, check license & registration and ask for mandatory safety equient like Warning Triangle, First Aid Kit and Retroflective Vest to be presented.

                        • And that is being used by the police to both gather intelligence as well as annoy individuals (i.e. motorists joyriding) out of an area.
                          • I mean, police do it all the time whenever they feel like it, and whilst theybdon't admit to it, I'm pretty shure they check way more plates than they pull over because they prefer to skip all the uninteresting ones…
                          • Cuz lets face it: It'll only waste time if they pull over some retirement-aged women who's only negative data on file - a parking ticket in the 1990s - is long expunged from records vs. someone with a decent record driving suspiciously orderly…
                        vfrmedia@social.tchncs.deV This user is from outside of this forum
                        vfrmedia@social.tchncs.deV This user is from outside of this forum
                        vfrmedia@social.tchncs.de
                        wrote last edited by
                        #69

                        @kkarhan here they tend to use ANPR hits and sometimes "public concerns" (there's a lot of nosey white folk reporting all the social carers for perceived bad driving simply because the carers are Black and brown)

                        UK just needs valid inspection record, tax and insurance (which cops can often check via mobile data terminals without going near the car), we aren't required to have the triangle, first aid kit and hi vis (although I carry these things anyway simply as it makes sense to have them)

                        1 Reply Last reply
                        0
                        • signalapp@mastodon.worldS signalapp@mastodon.world

                          While we build robust technical safeguards, user vigilance is ultimately the best defense against phishing. We will continue to work on mitigating these risks via interface design and signposting throughout the app. In the meantime, please stay alert, and never share your SMS verification code or Signal PIN with anyone.

                          Just a moment...

                          favicon

                          (support.signal.org)

                          kaito02@mastodon.socialK This user is from outside of this forum
                          kaito02@mastodon.socialK This user is from outside of this forum
                          kaito02@mastodon.social
                          wrote last edited by
                          #70

                          @signalapp SMS!?

                          1 Reply Last reply
                          0
                          • signalapp@mastodon.worldS signalapp@mastodon.world

                            We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

                            To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

                            falcennial@mastodon.socialF This user is from outside of this forum
                            falcennial@mastodon.socialF This user is from outside of this forum
                            falcennial@mastodon.social
                            wrote last edited by
                            #71

                            @signalapp it is perfectly clear. RUP to the people who got duped's accounts

                            1 Reply Last reply
                            0
                            • signalapp@mastodon.worldS signalapp@mastodon.world

                              While we build robust technical safeguards, user vigilance is ultimately the best defense against phishing. We will continue to work on mitigating these risks via interface design and signposting throughout the app. In the meantime, please stay alert, and never share your SMS verification code or Signal PIN with anyone.

                              Just a moment...

                              favicon

                              (support.signal.org)

                              spitfire@mastodon.socialS This user is from outside of this forum
                              spitfire@mastodon.socialS This user is from outside of this forum
                              spitfire@mastodon.social
                              wrote last edited by
                              #72

                              @signalapp implementing authentication using more secure methods (passkeys, physical security keys) could eliminate that risk.

                              1 Reply Last reply
                              0
                              • kkarhan@infosec.spaceK kkarhan@infosec.space

                                @ExcelAnalytics @signalapp not only that, the entire concept of demaning a #PhoneNumber to use #Signal is inherently and irredeemably wrong to begin with!

                                lackthereof@beige.partyL This user is from outside of this forum
                                lackthereof@beige.partyL This user is from outside of this forum
                                lackthereof@beige.party
                                wrote last edited by
                                #73

                                @kkarhan
                                This has always struck me as the strangest complaint about Signal.

                                You don't need to distribute your phone number to actually communicate with other signal users.

                                Presumably you want some form of 2fa, because losing your account would be bad.

                                And you don't want to be tied to some cloud based email provider.

                                And it's literally a phone app so every single user has the dependency.

                                kkarhan@infosec.spaceK syntaxseed@phpc.socialS 2 Replies Last reply
                                0
                                • lackthereof@beige.partyL lackthereof@beige.party

                                  @kkarhan
                                  This has always struck me as the strangest complaint about Signal.

                                  You don't need to distribute your phone number to actually communicate with other signal users.

                                  Presumably you want some form of 2fa, because losing your account would be bad.

                                  And you don't want to be tied to some cloud based email provider.

                                  And it's literally a phone app so every single user has the dependency.

                                  kkarhan@infosec.spaceK This user is from outside of this forum
                                  kkarhan@infosec.spaceK This user is from outside of this forum
                                  kkarhan@infosec.space
                                  wrote last edited by
                                  #74

                                  @lackthereof it's not a "strange complaint", but a massive problem, because it creates dependency on a proven insecure network that is more often than not controlled if not run by hostile actors…

                                  • Also #eMail, like #XMPP+#OMEMO, is based around #OpenStandards so you ain't forced to use any provider that is subject to #CloudAct nor known to snitch on customers without a valid domestic warrant…
                                    • And if you trust noone, you can just host your eMail Server on a Rasberry Pi at home. It'll certainly be less convenient and more expensive but the you also get all the benefits of it being not possible to seize it without breaking into your home.

                                  @signalapp mandating #PhoneNumners is a huge red flag because at best any #PhoneNumber is pseudonymous like a #Shitcoin-Wallet and that any #privacy is broken the moment it has any (even remotely circumstantial) connection to someone.

                                  • Because even if you ain't forced into #SelfDoxxing to obtain a #Prepaid - #SIM (aka. "#KYC") and/or Phone Number it is still a bad design.
                                    • Not to mention that this conpletely twarts their "#Metadata - #FUD" completely.

                                  Not to mention #Signal's #App is a huge shitshow…

                                  lackthereof@beige.partyL 1 Reply Last reply
                                  0
                                  • kkarhan@infosec.spaceK kkarhan@infosec.space

                                    @lackthereof it's not a "strange complaint", but a massive problem, because it creates dependency on a proven insecure network that is more often than not controlled if not run by hostile actors…

                                    • Also #eMail, like #XMPP+#OMEMO, is based around #OpenStandards so you ain't forced to use any provider that is subject to #CloudAct nor known to snitch on customers without a valid domestic warrant…
                                      • And if you trust noone, you can just host your eMail Server on a Rasberry Pi at home. It'll certainly be less convenient and more expensive but the you also get all the benefits of it being not possible to seize it without breaking into your home.

                                    @signalapp mandating #PhoneNumners is a huge red flag because at best any #PhoneNumber is pseudonymous like a #Shitcoin-Wallet and that any #privacy is broken the moment it has any (even remotely circumstantial) connection to someone.

                                    • Because even if you ain't forced into #SelfDoxxing to obtain a #Prepaid - #SIM (aka. "#KYC") and/or Phone Number it is still a bad design.
                                      • Not to mention that this conpletely twarts their "#Metadata - #FUD" completely.

                                    Not to mention #Signal's #App is a huge shitshow…

                                    lackthereof@beige.partyL This user is from outside of this forum
                                    lackthereof@beige.partyL This user is from outside of this forum
                                    lackthereof@beige.party
                                    wrote last edited by
                                    #75

                                    @kkarhan
                                    Email is, in practice, a privacy shit show equal to or greater than phone numbers. Either you self-host, which means you have an isp and a DNS provider at minimum who can reveal your identity on their whims, even if you lie on a whois record. Or you use one of the mega free providers with all their conflicts of interest and data mining. Or you use a paid provider which opens up all the payment chain to trace back to you on top of everything else

                                    To get a phone number I can walk to the corner convenience store and, with cash payment and no ID, purchase a prepaid SIM card. I can pay cash to refill it every month.

                                    kkarhan@infosec.spaceK 1 Reply Last reply
                                    0
                                    • lackthereof@beige.partyL lackthereof@beige.party

                                      @kkarhan
                                      Email is, in practice, a privacy shit show equal to or greater than phone numbers. Either you self-host, which means you have an isp and a DNS provider at minimum who can reveal your identity on their whims, even if you lie on a whois record. Or you use one of the mega free providers with all their conflicts of interest and data mining. Or you use a paid provider which opens up all the payment chain to trace back to you on top of everything else

                                      To get a phone number I can walk to the corner convenience store and, with cash payment and no ID, purchase a prepaid SIM card. I can pay cash to refill it every month.

                                      kkarhan@infosec.spaceK This user is from outside of this forum
                                      kkarhan@infosec.spaceK This user is from outside of this forum
                                      kkarhan@infosec.space
                                      wrote last edited by
                                      #76

                                      @lackthereof no, it's not because unlike #Phones and #PhoneNumbers, #eMail is not necessarily traceable by circumstances.

                                      • Because a Phone "Line" (regardless of whether it's POTS, ISDN, VoIP, GSM, VoLTE, …) and #telephony in general are designed for realtime communication, they inherently necessitate an active, ongoing connection.
                                        • Even if it's just some App/PBX/… to connect to the provider and constantly state "I am on the network and able to recieve calls!" (with PSTN networks, there a physical line that gets assumed to have a phone connected)…

                                      Whereas with eMail (and any #asynchronous #communication) you don't have that requirement.

                                      • So unless the provider is being taken over or otherwise "cooperative" there's no means for a sender to know where, when and how a message was retrieved unless the recipient wants the sender to know of it!
                                        • Besides, even if you don't have an eMail provider like cock.li which natively supports @torproject / #Tor useage with an #OnionService, unless said provider explicitly prevents you from doing so, you can use not just Tor but also other techniques to make it extremely hard (not necessarily impossible, but at least unfeasible at scale!) to get tracked down.
                                        • In fact, you could even use #Sneakernet - Style distribution through "#MeatProxies" and #DeadDrops (aka. #dr0p) to further twart tracing attempts.

                                      Or to put it simple:

                                      • You can ring up someone and thus circumstantially verify the chain of #PhoneNumber -> #IMSI -> #ICCID -> #SIM -> #IMEI -> Device -> Location -> Owner quite quickly.
                                        • Whereas you can't positively verify whether an eMail address and/or #XMPP+#OMEMO account belongs to me unless I want you to know that it does!

                                      So either way a phone number is just a horrible means of doing that.

                                      • And don't even get me started on the fact that legally speaking noone truly owns their number.
                                        • Because even if you got some spechal case number (like UPT was) you still depend on neither regulators nor telcos to not block or otherwise interfere with it. Which is in contrast to say an OnionService which can only be shutdown effectively by sabotage aka. (more or less figurately) "unplugging" it.

                                      I mean, it's not as if I didn't gave @signalapp a fair chance.

                                      • I wanted #Signal to be good - honestly...
                                        • But I'm old enough that things rarely are that simple as #TechPopulism & #Propaganda claim it to be.
                                        • Just like 5th grade #SexEd is not a substitute for Endocrinology, Gynecology and Andrology and actually licensed, medical professionals.

                                      So any #Messenger service that requires a #Phone Number for signup and/or useage is truly not a real replacement and inherently makes PROVEN WRONG assumptions [i.e. that it is legal and possible to obtain a phone number anonymously at someone's juristiction] about it's customers' ability to shield their privacy…

                                      • Cuz all the "#Metadata" claims of Signal are complete #MarketingLies by virtue of them storing a Phone Number and not just being (as per admission by @Mer__edith) 'hard locked-in' with #aws but also subject to #CloudAct.
                                      • They certainly are not deploying real #E2EE cuz you neither get #SelfCustody nor #SelfHosting and have to blindly trust them (aka. "#TrustMeBro!") that what they release as #SourceCode is actually what they deploy.
                                        • It's like all those "#VPN" shillings which one cannot verify to be true or false!

                                      THIS is why I am going fucking ballistic on #TechPopulism aiming at #TechIlliterates because it's spreading a "false sense of #security" whilst completely disregarding absolute fundamentals when it comes to the underlying systems.

                                      • And I don't mean shit like #Govware of the #SS7 kind, but absolute basics in #ITsec, #InfoSec, #OpSec & #ComSec that every @cryptoparty@chaos.social / @cryptoparty@mastodon.earth / #CryptoParty worth it's name touches on.
                                        • Signal can't and won't save peoples' asses and the sooner we realize that "complex problems are hard to fix" the less we waste Resources on #HoneyPots that stench like #CrytpoAG & #ANØM!
                                      kkarhan@infosec.spaceK lackthereof@beige.partyL 2 Replies Last reply
                                      0
                                      • kkarhan@infosec.spaceK kkarhan@infosec.space

                                        @lackthereof no, it's not because unlike #Phones and #PhoneNumbers, #eMail is not necessarily traceable by circumstances.

                                        • Because a Phone "Line" (regardless of whether it's POTS, ISDN, VoIP, GSM, VoLTE, …) and #telephony in general are designed for realtime communication, they inherently necessitate an active, ongoing connection.
                                          • Even if it's just some App/PBX/… to connect to the provider and constantly state "I am on the network and able to recieve calls!" (with PSTN networks, there a physical line that gets assumed to have a phone connected)…

                                        Whereas with eMail (and any #asynchronous #communication) you don't have that requirement.

                                        • So unless the provider is being taken over or otherwise "cooperative" there's no means for a sender to know where, when and how a message was retrieved unless the recipient wants the sender to know of it!
                                          • Besides, even if you don't have an eMail provider like cock.li which natively supports @torproject / #Tor useage with an #OnionService, unless said provider explicitly prevents you from doing so, you can use not just Tor but also other techniques to make it extremely hard (not necessarily impossible, but at least unfeasible at scale!) to get tracked down.
                                          • In fact, you could even use #Sneakernet - Style distribution through "#MeatProxies" and #DeadDrops (aka. #dr0p) to further twart tracing attempts.

                                        Or to put it simple:

                                        • You can ring up someone and thus circumstantially verify the chain of #PhoneNumber -> #IMSI -> #ICCID -> #SIM -> #IMEI -> Device -> Location -> Owner quite quickly.
                                          • Whereas you can't positively verify whether an eMail address and/or #XMPP+#OMEMO account belongs to me unless I want you to know that it does!

                                        So either way a phone number is just a horrible means of doing that.

                                        • And don't even get me started on the fact that legally speaking noone truly owns their number.
                                          • Because even if you got some spechal case number (like UPT was) you still depend on neither regulators nor telcos to not block or otherwise interfere with it. Which is in contrast to say an OnionService which can only be shutdown effectively by sabotage aka. (more or less figurately) "unplugging" it.

                                        I mean, it's not as if I didn't gave @signalapp a fair chance.

                                        • I wanted #Signal to be good - honestly...
                                          • But I'm old enough that things rarely are that simple as #TechPopulism & #Propaganda claim it to be.
                                          • Just like 5th grade #SexEd is not a substitute for Endocrinology, Gynecology and Andrology and actually licensed, medical professionals.

                                        So any #Messenger service that requires a #Phone Number for signup and/or useage is truly not a real replacement and inherently makes PROVEN WRONG assumptions [i.e. that it is legal and possible to obtain a phone number anonymously at someone's juristiction] about it's customers' ability to shield their privacy…

                                        • Cuz all the "#Metadata" claims of Signal are complete #MarketingLies by virtue of them storing a Phone Number and not just being (as per admission by @Mer__edith) 'hard locked-in' with #aws but also subject to #CloudAct.
                                        • They certainly are not deploying real #E2EE cuz you neither get #SelfCustody nor #SelfHosting and have to blindly trust them (aka. "#TrustMeBro!") that what they release as #SourceCode is actually what they deploy.
                                          • It's like all those "#VPN" shillings which one cannot verify to be true or false!

                                        THIS is why I am going fucking ballistic on #TechPopulism aiming at #TechIlliterates because it's spreading a "false sense of #security" whilst completely disregarding absolute fundamentals when it comes to the underlying systems.

                                        • And I don't mean shit like #Govware of the #SS7 kind, but absolute basics in #ITsec, #InfoSec, #OpSec & #ComSec that every @cryptoparty@chaos.social / @cryptoparty@mastodon.earth / #CryptoParty worth it's name touches on.
                                          • Signal can't and won't save peoples' asses and the sooner we realize that "complex problems are hard to fix" the less we waste Resources on #HoneyPots that stench like #CrytpoAG & #ANØM!
                                        kkarhan@infosec.spaceK This user is from outside of this forum
                                        kkarhan@infosec.spaceK This user is from outside of this forum
                                        kkarhan@infosec.space
                                        wrote last edited by
                                        #77

                                        @lackthereof The #TLDR: You are proven wrong!

                                        1 Reply Last reply
                                        0
                                        • kkarhan@infosec.spaceK kkarhan@infosec.space

                                          @lackthereof no, it's not because unlike #Phones and #PhoneNumbers, #eMail is not necessarily traceable by circumstances.

                                          • Because a Phone "Line" (regardless of whether it's POTS, ISDN, VoIP, GSM, VoLTE, …) and #telephony in general are designed for realtime communication, they inherently necessitate an active, ongoing connection.
                                            • Even if it's just some App/PBX/… to connect to the provider and constantly state "I am on the network and able to recieve calls!" (with PSTN networks, there a physical line that gets assumed to have a phone connected)…

                                          Whereas with eMail (and any #asynchronous #communication) you don't have that requirement.

                                          • So unless the provider is being taken over or otherwise "cooperative" there's no means for a sender to know where, when and how a message was retrieved unless the recipient wants the sender to know of it!
                                            • Besides, even if you don't have an eMail provider like cock.li which natively supports @torproject / #Tor useage with an #OnionService, unless said provider explicitly prevents you from doing so, you can use not just Tor but also other techniques to make it extremely hard (not necessarily impossible, but at least unfeasible at scale!) to get tracked down.
                                            • In fact, you could even use #Sneakernet - Style distribution through "#MeatProxies" and #DeadDrops (aka. #dr0p) to further twart tracing attempts.

                                          Or to put it simple:

                                          • You can ring up someone and thus circumstantially verify the chain of #PhoneNumber -> #IMSI -> #ICCID -> #SIM -> #IMEI -> Device -> Location -> Owner quite quickly.
                                            • Whereas you can't positively verify whether an eMail address and/or #XMPP+#OMEMO account belongs to me unless I want you to know that it does!

                                          So either way a phone number is just a horrible means of doing that.

                                          • And don't even get me started on the fact that legally speaking noone truly owns their number.
                                            • Because even if you got some spechal case number (like UPT was) you still depend on neither regulators nor telcos to not block or otherwise interfere with it. Which is in contrast to say an OnionService which can only be shutdown effectively by sabotage aka. (more or less figurately) "unplugging" it.

                                          I mean, it's not as if I didn't gave @signalapp a fair chance.

                                          • I wanted #Signal to be good - honestly...
                                            • But I'm old enough that things rarely are that simple as #TechPopulism & #Propaganda claim it to be.
                                            • Just like 5th grade #SexEd is not a substitute for Endocrinology, Gynecology and Andrology and actually licensed, medical professionals.

                                          So any #Messenger service that requires a #Phone Number for signup and/or useage is truly not a real replacement and inherently makes PROVEN WRONG assumptions [i.e. that it is legal and possible to obtain a phone number anonymously at someone's juristiction] about it's customers' ability to shield their privacy…

                                          • Cuz all the "#Metadata" claims of Signal are complete #MarketingLies by virtue of them storing a Phone Number and not just being (as per admission by @Mer__edith) 'hard locked-in' with #aws but also subject to #CloudAct.
                                          • They certainly are not deploying real #E2EE cuz you neither get #SelfCustody nor #SelfHosting and have to blindly trust them (aka. "#TrustMeBro!") that what they release as #SourceCode is actually what they deploy.
                                            • It's like all those "#VPN" shillings which one cannot verify to be true or false!

                                          THIS is why I am going fucking ballistic on #TechPopulism aiming at #TechIlliterates because it's spreading a "false sense of #security" whilst completely disregarding absolute fundamentals when it comes to the underlying systems.

                                          • And I don't mean shit like #Govware of the #SS7 kind, but absolute basics in #ITsec, #InfoSec, #OpSec & #ComSec that every @cryptoparty@chaos.social / @cryptoparty@mastodon.earth / #CryptoParty worth it's name touches on.
                                            • Signal can't and won't save peoples' asses and the sooner we realize that "complex problems are hard to fix" the less we waste Resources on #HoneyPots that stench like #CrytpoAG & #ANØM!
                                          lackthereof@beige.partyL This user is from outside of this forum
                                          lackthereof@beige.partyL This user is from outside of this forum
                                          lackthereof@beige.party
                                          wrote last edited by
                                          #78

                                          @kkarhan

                                          Your threat model is totally incoherent here and you talk like a cheap LLM

                                          kkarhan@infosec.spaceK 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups