The metadata. The message content is E2E, but the data about the content isn’t necessarily e2e.
The metadata. The message content is E2E, but the data about the content isn’t necessarily e2e.
Right. The question is whether they can attach what they know to an identity. Depends on your threat model which goal you need to achieve.
Yay!! Awesome news!
I swear some people here just need to argue and be upset with something.
It can always get worse! 🥰
deleted by creator
Ah gotcha. Thanks
Well that would be fucking annoying as fuck lmao. Sorry you have to deal with that
For what it’s worth I’ve got a group of friends who don’t give a shit either. Like they take some weird pleasure in not using E2E communication apps and just use SMS. It takes 2 seconds to download a new app.
They can spy on me all they want, I got nuthin to hide harhar
I don’t believe Signal requires a phone number anymore
I’d be curious to compare this with total internet usage shares
Yeah, I get that. However, the optics of having a successful “martyr” symbol is very, very dangerous. A wide scope of narrative means difficult to control. Difficult to control introduces “motivator to action” symbols among a, I think, specific (and quite populous) demographic (think of all the young males with zero purpose, waiting to seize on an opportunity for a real life Mr Robot, for example)… “well if he could do it, get away with it, AND become a ’hero’, what’s stopping me from doing the same?”
Having someone, anyone, buys time to craft the narrative and gauge public sentiment and, most importantly, dampen the probability of a revolutionary ’spark’ if you will.
Obviously we don’t have enough information here. It very well could be the dude they have in custody. I am only sharing one possible theory based off my experience and observations. And there are a number of very suspect observations here that are in line with narrative management.
I mean yeah most likely
deleted by creator
There’s a picture of him holding a McD happy meal?? He had the gun and manifesto just laying there in his backpack? You f’ing kidding??
Some elite fucks used an advanced AI search algorithm to search a bunch of people who vaguely looked like him. Input term search for social media and ‘reviews’ to further narrow down until you find someone who has a few tweets and posts that the media can point to say “yup hey look, he liked Kzynski’s manifesto on goodreads…got the guy!”. Plant evidence, and you got your scapegoat.
This poor kids’ life is ruined. And he will probably be threatened if he doesn’t plead guilty and waive jury trial. He’ll get a visit from the MIB threatening to skin his family alive in front of him if he doesn’t play along.
You and me both brother haha
Where is the lie? They don’t sell your data. That’s not how they operate. In fact, they want to keep your data as secure as possible so no one else can use it.
They build models from user data and basically sell those models to businesses. Models that can be used to manipulate behavior and distort reality.
Data brokers, on the other hand…they sell your data.
Don’t ya love it when people comment saying something that they think must be true as if it were actually true, without having the slightest idea?
It’s something they saw in a meme once and now they take it for fact.
Yes this is something I’m more interested in learning as well. Data access to servers by adversaries can be largely mitigated with E2E encryption and VPN use so that even if, for example, the NSA wanted data on certain servers, unless they had an encryption key, would be largely meaningless (unless metadata wasn’t encrypted). We largely know that if LE wants data, they can get a court order to hand it over.
What I’d like to know is if there has been any evidence of “hardware” backdoors like what you now describe. I haven’t been able to find evidence of any successful attempts by major agencies/corporations, but I guess part of a successful attempt involves the public not knowing that it exists.
My threat model has me using an iPhone with Lockdown Mode & Advanced Data Protection enabled. I am wondering if I need to reassess my model to potentially go for the Pixel with GrapheneOS.
According to my research, the iPhone with these specific settings for reducing attack surface and encrypting everything that gets put onto servers is more than enough for myself (admittedly a pretty stringent threat model). But would also like to hear what others think.