• rosco385@lemmy.wtf
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    Because analysing network traffic wouldn’t allow an adversary to see what you’re sending with Signal, but they could still tell you’re sendig a secure message.

    What the Guardian is doing is hiding that secure chat traffic inside the Guardian app, so packet sniffing would only show you’re accessing news.

    • Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      analysing network traffic wouldn’t allow an adversary to see what you’re sending with Signal

      How are they analyzing network traffic with Signal? It’s encrypted. And why does it matter if they know you’re sending a message? Literally everyone using Signal is sending a message.

            • Ulrich@feddit.org
              link
              fedilink
              English
              arrow-up
              0
              arrow-down
              1
              ·
              2 months ago

              Then you’re also a terrorist if you use The Guardian 🤷‍♂️

              • Diurnambule@jlai.lu
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                2 months ago

                I dont’ know, do you have sources about this ? Or are you imagining thing and deciding it is true ?

                • Ulrich@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  arrow-down
                  1
                  ·
                  2 months ago

                  Sources for what, exactly? What is “fantasming”? The title of the article you posted is “Criminalization of encryption”. The Guardian is using encryption to send messages, so why would they be exempt? In fact, why would any internet use at all not be criminalized? It’s all encrypted.

                  • Diurnambule@jlai.lu
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    ·
                    edit-2
                    2 months ago

                    So you read the title and you know everything. There is a liste of what they are accusing and their is no mention of internet

                    The elements of the investigation that have been communicated to us are staggering. Here are just some of the practices that are being misused as evidence of terrorist behavior6:

                    – the use of applications such as Signal, WhatsApp, Wire, Silence or ProtonMail to encrypt communications ;

                    – using Internet privacy tools such as VPN, Tor or Tails7 ;

                    – protecting ourselves against the exploitation of our personal data by GAFAM via services such as /e/OS, LineageOS, F-Droid ;

                    – encrypting digital media;

                    – organizing and participating in digital hygiene training sessions;

                    – simple possession of technical documentation.

                    But continue to invent reality. What are fact if not debatable point of view ? That the end for me. Have a great day.

        • Ulrich@feddit.org
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          2 months ago

          No they can’t.

          E: if someone wants to provide evidence to the contrary instead of just downvoting and moving on, please, go ahead.

              • I Cast Fist@programming.dev
                link
                fedilink
                English
                arrow-up
                1
                ·
                2 months ago

                Packet data has headers that can identify where it’s coming from and where it’s going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal’s servers use (which is public information), it’s trivial to know when a device is sending/receiving messages with Signal.

                This is also why something like Tor manages to circumvent packet sniffing, it’s impossible to know the actual destination because that’s part of the encrypted payload that a different node will decrypt and forward.

                • Ulrich@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  arrow-down
                  1
                  ·
                  edit-2
                  2 months ago

                  Packet data has headers that can identify where it’s coming from and where it’s going to

                  Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

                  This is also why something like Tor manages to circumvent packet sniffing

                  TOR is what their already-existing tip tool uses.