• Ulrich@feddit.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    I read it and don’t understand. Why is this better than Signal? Or the 500 other secure file/messaging protocols?

    Jabber seemed to work perfectly for Snowden…

    • rosco385@lemmy.wtf
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Because analysing network traffic wouldn’t allow an adversary to see what you’re sending with Signal, but they could still tell you’re sendig a secure message.

      What the Guardian is doing is hiding that secure chat traffic inside the Guardian app, so packet sniffing would only show you’re accessing news.

      • Ulrich@feddit.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        analysing network traffic wouldn’t allow an adversary to see what you’re sending with Signal

        How are they analyzing network traffic with Signal? It’s encrypted. And why does it matter if they know you’re sending a message? Literally everyone using Signal is sending a message.

          • Ulrich@feddit.org
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            2 months ago

            No they can’t.

            E: if someone wants to provide evidence to the contrary instead of just downvoting and moving on, please, go ahead.

                • I Cast Fist@programming.dev
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  2 months ago

                  Packet data has headers that can identify where it’s coming from and where it’s going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal’s servers use (which is public information), it’s trivial to know when a device is sending/receiving messages with Signal.

                  This is also why something like Tor manages to circumvent packet sniffing, it’s impossible to know the actual destination because that’s part of the encrypted payload that a different node will decrypt and forward.

                  • Ulrich@feddit.org
                    link
                    fedilink
                    English
                    arrow-up
                    0
                    arrow-down
                    1
                    ·
                    edit-2
                    2 months ago

                    Packet data has headers that can identify where it’s coming from and where it’s going to

                    Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

                    This is also why something like Tor manages to circumvent packet sniffing

                    TOR is what their already-existing tip tool uses.