If you are using Signal, and you are doing something the government considers illegal, the way they are going to read your messages about it is they will arrest the person you sent the messages *to*, and make your counterparty show them the logs. We know this because this technique came up again and again in, for example, the Jan. 6 court filings.

There may, hypothetically, be other Signal exploits available to a government, but this is the one they will use, because it works.

in reply to mcc

The best way to avoid this is to use "Disappearing Messages", which makes messages you send auto-delete after a set period of time, even on the receiving end.

Edit: important to note that the timer starts to count down for each recipient independently when they read it. Meaning if the recipient's device was compromised before they read your message, the message is compromised no matter how short the timer was.

This entry was edited (10 months ago)

Erik Jonker reshared this.

in reply to Tinker โ˜€๏ธ

makes sense, for critical stuff at least. wouldn't want that for general messaging. does signal / is there a similar app exist that allows you to make essentially disappearing channels with someone but have other channels with them stick around? i rely pretty heavily on looking back at what i said in the past as a general thing but equally am recognising the need in the near future for private messaging
in reply to amy

@amy - So you can set disappearing messages for different time periods AND at different areas. So you might not have any disappearing messages normally... then if you want to talk about something sensitive but let them refer to it for a past week, you set it to a week. It will then BEGIN to disappear messages from that point forward for a week. But then maybe you want to say something really sensitive and have it disappear in an hour. Change the setting.

That gets a little cumbersome... but if you're on top of it, you're solid.

@amy
in reply to amy

@amy @tinker Iโ€™m not certain about individual messages, but you can set it for individual users. You can also set a default app-wide disappearing period for new chats and such. Iโ€™m not sure if the individual usersโ€™ settings would override that. Thereโ€™s also the โ€˜sealed senderโ€™ option to mask sending users from being as easily identified. I havenโ€™t played with it myself, so I canโ€™t speak to how well it works. signal.org/blog/sealed-sender/
in reply to mcc

Please be very clear I am not saying not to use Signal, or saying that using Signal is pointless; I am describing a threat model which you should be aware of when using the application.

( This said I'd also recommend turning off "Apple Intelligence". And also discontinuing use of any device, application, or operating system which has the capability to interoperate with "Apple Intelligence", "ChatGPT" or "Copilot".

theverge.com/24340563/apple-inโ€ฆ )

This entry was edited (10 months ago)
in reply to mcc

Several people have replied to this to point out Signal has this feature. support.signal.org/hc/en-us/arโ€ฆ

Note this will not protect against situations such as:

- People screenshotting the message for some reason
- People reading the message, then testifying they remember reading it
- A large group chat containing one or more FBI agents, who screenshot, copy and/or take contemporaneous notes preserving the content of the message

This entry was edited (10 months ago)
in reply to margot

like if the US government wants to, the only way you are going to truly avoid getting stuff found is to just. never tell it to anyone, never write it down anywhere, it exists within your own head and even that might be risky. and then they might just make it up anyway and hope thereโ€™s enough circumstantial evidence to make it stick, or drag out a trial long enough to ruin your life
in reply to Sashin

the FBI's job is to keep track of political activity, of all kinds. for this purpose it does not matter whether the activity is legal, and there are numerous stories over the years where it was... if agents do not attempt to infiltrate group chats in which activists congregate, the FBI is neglecting its duties.

so, like, don't discount the possibility when you plan, is what we're saying.

Ricardo Harvin reshared this.

in reply to Sashin

@sashin my understanding from declassified FBI documents is that leftist groups will regularly be infiltrated by undercover FBI officers, even in cases where the leftist activity is noncriminal or even boring. On occasion, or at least I know of examples of this with Muslim groups, a government agent will infiltrate a non-lawbreaking group and actively propose members of the group break the law, so they can arrest them for conspiring to break the law

Ricardo Harvin reshared this.

in reply to mcc

They infiltrate all social change groups. The Far Right flag and mask groups are about half undercover cops and half idiots. The idiots are routinely egged on to do something dumb like saw off a shotgun so they can be prosecuted. This is how you get promoted in Fed land.

The guy calling for more action, violence, and lawbreaking, is a cop every time.

Paid informants are common. The informants routinely steal money from the group, because they know they are immune to prosecution.

This entry was edited (10 months ago)
in reply to mcc

I have an issue with your approach, which basically is steeping fear.
And fear causes inaction ๐Ÿ˜ฑ

Here, you did:
(1) share content that causes fear without showing the obvious mitigation
(2) once a mitigation was offered, you re-share it *but* immediately point its flaws

It is alright, and legitimate to be afraid, and feel free to express that ๐Ÿค—
One step better is: try to research mitigations, in order to avoid pushing your fellow activists to inaction, and take care of them โค๏ธ

This entry was edited (10 months ago)
in reply to craccerror

@12_XU @bri_seven Tried to reply to this and got "500" errors ugh. Trying again

See replies to this thread.

mastodon.social/@mcc/113884671โ€ฆ

Infosec mastodon seems very unimpressed with Session. They have diverged from Signal significantly in a slapdash way.

People seem to have positive things to say about Briar and Simplex, and nobody I have seen has said anything bad about them. But I'm not qualified to evaluate them. The reason I trust Signal is people qualified to evaluate it speak highly of it.

in reply to mcc

As far as I know, Matrix/Element is perfectly fine as long as all the messages are actually being encrypted. Some people I've spoken to are frustrated about it being too easy for a group chat to get set to an unencrypted mode without the interface making that clear. This seems to me like something you can address by educating yourself about the program and being careful.
This entry was edited (10 months ago)
in reply to mcc

@12_XU @bri_seven Matrix has some bad cryptography too. It uses what's basically a toy encryption library with some big security issues that's only meant for learning & demonstration purposes & the Matrix Foundation refuses to fix it.

Also Session depends on a cryptocurrency to work, so if the security of messages isn't an issue, the stability of the network is. Anyone with money could buy all of the tokens & begin refusing to route messages, which destroys the network.

in reply to mcc

Google-ified Android also has a rather nebulous "Let Google Assistant learn from this app" toggle 9to5google.com/2021/05/13/googโ€ฆ

It's not clear to me that they're currently using this similarly to how Apple Intelligence works, but "a more personalized experience" and zero docs that I can find on Google's site don't inspire much confidence

And despite the article being from 2021, I can confirm it's still there on an up-to-date Pixel device

This entry was edited (10 months ago)
in reply to mcc

And there will never be an easier time to turn it off that now, while itโ€™s still mostly a useless gimmick and not some essential tech feature we canโ€™t live without.

But judging from the blasรฉ attitude amongst most of my friends and coworkers about the ongoing coup in America, I suspect this message wonโ€™t reach beyond a community of tech nerds and activists.

This entry was edited (10 months ago)
in reply to mcc

I don't know if the first party Signal app delivers notifications by FCM or if it shows message contents in them, but if it does you should find the setting in the app to disable showing message contents in the notifications, because Google's Firebase Cloud Messaging is not end to end encrypted like Signal itself is, so any message text embedded in notifications is vulnerable.
in reply to blue_thistle37

@Blue_thistle37 there is a follow up post on this thread. mastodon.social/@mcc/113964973โ€ฆ

Moreover, Signal is a good way to keep your communications private.


Several people have replied to this to point out Signal has this feature. support.signal.org/hc/en-us/arโ€ฆ

Note this will not protect against situations such as:

- People screenshotting the message for some reason
- People reading the message, then testifying they remember reading it
- A large group chat containing one or more FBI agents, who screenshot, copy and/or take contemporaneous notes preserving the content of the message

Unknown parent

mastodon - Link to source

FreediverX

While I wouldnโ€™t be shocked to learn some companies like Google, Microsoft, and Facebook are already planning such nefarious uses, I believe the main reason behind the heavy push for AI is the desperate need to prolong the tech sector economic bubble.

Silicon Valley ran out of product ideas a few years ago, so theyโ€™ve been relying on hype to push โ€œthe metaverseโ€, then โ€œcryptoโ€, and now โ€œAIโ€.

This entry was edited (10 months ago)
in reply to The Sleight Doctor ๐Ÿƒ๐Ÿ‰

@ApostateEnglishman Please don't make decisions on this advice without doing further research, but a phone factory reset is likely to be *entirely adequate* protection against forensics, especially if you are using disk encryption.

Try to guess which adversaries you are likely to actually face.

โ‡ง