One of the most basic tenets of cybersecurity is that you must “consider your threat model” when trying to keep your data and your communications safe, and then take appropriate steps to protect yourself.

This means you need to consider who you are, what you are talking about, and who may want to know that information (potential adversaries) for any given account, conversation, etc. The precautions you want to take to protect yourself if you are a random person messaging your partner about what you want to eat for dinner may be different than those you’d want to take, if, hypothetically, you are the Secretary of Defense of the United States or a National Security Advisor talking to top administration officials about your plans for bombing an apartment building in Yemen.

  • liverbe@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    ·
    6 days ago

    Which also means these conversations were on an unapproved app on an unapproved device. Actual government phones wouldn’t be able to get Signal, right?

      • 0xD@infosec.pub
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        6 days ago

        As long as you can flash them, everything’s possible.

        In that spirit: Fuck Apple to hell.