The cradle of democracy! The origin of freedom....
Spain's High Court orders block on Telegram messaging app as a precautionary measure
Spain's High Court orders block on Telegram messaging app as a precautionary measure
Bruhhhhhhhhhhh....Can't remember what country banned TikTok before, anyway they took half their internet down, (might have been Thailand?) also i remember similar happening when Pornhub was taken down in Thailand lol
FYI TikTok routinely provides information to the Governments when requested, so does Signal (i am told - and unencrypted), but Wicker doesn't so i guess these people will move to something like that...
This was 2021 (but i am informed out - of -date by someone well informed).
View attachment 6481
In Asia it's usually We-Chat (Chinese defensive wall) or Line (Japanese privacy laws).
Somewhat surprised these Ukrainian and Russian knuckleheads sharing all the raw content on telegram don't use We-Chat...
Oh and then there's M1, M2, M3 Mac which is easily navigable around encryption now, and VPN's are running apple classroom and able to jump into the end users device or observe.
I have dealt with numerous requirements from leadership teams concerning secure communications, particularly for publicly traded companies needing secure messaging for their execs/R&D. This has led to several security assessments, including one for a now-dismantled Canadian app. My most recent PoCs with Threema and AWS Wickr were for a client desiring secure, on-premise messaging solutions. Both platforms showed promise with the right setup and dedicated support. Given Wickr's use by the US DOD and other government entities, there's a significant incentive to maintain security, at least against adversaries of the US. Threema, in my opinion, remains the most reliable option for secure communications currently available. Although Signal now offers usernames, its reliance on phone numbers could pose an OPSEC issue. Despite hearing some rumors about Signal, I've yet to come across any verifiable evidence of its compromise.FYI TikTok routinely provides information to the Governments when requested, so does Signal (i am told - and unencrypted), but Wicker doesn't so i guess these people will move to something like that...
I take it you're referring to the recent GoFetch incident? My stance is one of cautious optimism. Despite the serious nature of the vulnerability, particularly with the potential for remote access and data leakage, the barriers an attacker must overcome are significant. Moreover, the necessity of physical access to decrypt the device adds another layer of complexity, likely rendering this attack vector impractical for many threat models. Classroom software does raise eyebrows due to its background operations, but there are workarounds, such as startup scripts to terminate the process or tools to block it outright. It's important to consider that for certain threat models, the assumption includes having capabilities to defend against such threats, for instance, through proper monitoring.Oh and then there's M1, M2, M3 Mac which is easily navigable around encryption now, and VPN's are running apple classroom and able to jump into the end users device or observe.
You could also keep tabs on Secure Messaging Apps Comparison | Privacy Matters. While it does not show this from LE perspective, it does give you insight into the security controls of the app.
Great stuff! Thanks for sharing!I have dealt with numerous requirements from leadership teams concerning secure communications, particularly for publicly traded companies needing secure messaging for their execs/R&D. This has led to several security assessments, including one for a now-dismantled Canadian app. My most recent PoCs with Threema and AWS Wickr were for a client desiring secure, on-premise messaging solutions. Both platforms showed promise with the right setup and dedicated support. Given Wickr's use by the US DOD and other government entities, there's a significant incentive to maintain security, at least against adversaries of the US. Threema, in my opinion, remains the most reliable option for secure communications currently available. Although Signal now offers usernames, its reliance on phone numbers could pose an OPSEC issue. Despite hearing some rumors about Signal, I've yet to come across any verifiable evidence of its compromise.
I take it you're referring to the recent GoFetch incident? My stance is one of cautious optimism. Despite the serious nature of the vulnerability, particularly with the potential for remote access and data leakage, the barriers an attacker must overcome are significant. Moreover, the necessity of physical access to decrypt the device adds another layer of complexity, likely rendering this attack vector impractical for many threat models. Classroom software does raise eyebrows due to its background operations, but there are workarounds, such as startup scripts to terminate the process or tools to block it outright. It's important to consider that for certain threat models, the assumption includes having capabilities to defend against such threats, for instance, through proper monitoring.
You could also keep tabs on Secure Messaging Apps Comparison | Privacy Matters. While it does not show this from LE perspective, it does give you insight into the security controls of the app.
Isn't that by the Tether crew, the crew that work hand in hand with the surveillance state so as to stop themselves being sent to prison for their activities with Tether?Use keet.io.
It's P2P, Google "distributed holepunching".Isn't that by the Tether crew, the crew that work hand in hand with the surveillance state so as to stop themselves being sent to prison for their activities with Tether?
The cradle of democracy! The origin of freedom....
Spain's High Court orders block on Telegram messaging app as a precautionary measure
"It's bad when they do it but good when we do it" is a classic double standard in politics.You got to love Spain. So if Microsoft or Apple does not provide certain information they will ban Windows or iOS?. And people complain about China..lol.
Who is behind this project? What kind of encryption does it use, if any?Use keet.io.