OS has AI, Siri, service that reads everything. Don't need to break encryption
Privacy
A community for Lemmy users interested in privacy
Rules:
- Be civil
- No spam posting
- Keep posts on-topic
- No trolling
distopian world
Android is open source. Install a third-party OS. There's no way they can read your unencrypted backups without raising giant red flags.
Nothing from Apple is open source so yeah, that's a strong possibility.
It is a tinfoil hat moment, but I often think the same thing (I use Signal extensively)
Again this is all conjecture but If they have been breached, I would imagine it was when Moxie suddenly left the company.
Another point of failure is how signal is centralised, have you ever tried Session? they moved countries when they were approached .
Ultimately, there has to be some trust involved though, which is where the healthy paranoia stems from.
I haven’t but I use matrix as the most idealistic level of communication protocol.
Ultimately though, my point is that the in-app security is only as good as the OS it runs on.
Signal is not breached. That is propaganda spread by those who see Signal as a threat.
Session is basically what people think Signal is.
Here’s a tinfoil hat take: Five Eyes is significantly reducing inter cooperation. The non-fascist parts of the alliance (...)
Who are those non-fascist parts exactly...? New Zealand?
Touché
~~non-fascist~~ less-fascist
I think Signal is better than no Signal
Signal needs to be more popular. It isn't the best in terms of anonymity but it is user friendly and well known. I would rather have lots of people on a app that is decent for privacy than a few on something highly anonymous.
If your signal chats are unencrypted for consumption on your device, then that’s when the unencrypted content can be captured.
I have been critical on record here of Signal, but the issue you are describing is not a signal issue, it is your OS issue.
The issue with Signal is that it leaks enough meta data to profile you and who you communicate with. There is no indication that it can be breached as of now.
Using corpo provided OS is the issue, be windows, iOS or android...
These creeps got root access to your device so that means that glowies got access to your device.
Sounds like windows recall
Not that it’d surprise me, but where did Apple admit that they store the keys in the same cloud?
Also, not that I believe them, but what they communicate when you encrypt is that they don’t have that key and if you lose it it’s gone.
Not broadcast, but inferred.
https://support.apple.com/en-au/102651
Standard data protection
Standard data protection is the default setting for your account. Your iCloud data is encrypted in transit and stored in an encrypted format at rest. The encryption keys from your trusted devices are secured in Apple data centres so Apple can decrypt your data on your behalf whenever you need it, such as when you sign in on a new device, restore from a backup or recover your data after you've forgotten your password. As long as you can successfully sign in to your Apple Account, you can access your backups, photos, documents, notes and more.
Got it but they also say
If you enable Advanced Data Protection and then lose access to your account, Apple will not have the encryption keys to help you recover it — you’ll need to use your device passcode or password, a recovery contact, or a personal recovery key. Because the majority of your iCloud data will be protected by end-to-end encryption, you'll be guided to set up at least one recovery contact or recovery key before you turn on Advanced Data Protection. You must also update all of your Apple devices to a software version that supports this feature. You can turn off Advanced Data Protection at any time. Your device will securely upload the required encryption keys to Apple servers and your account will once again use standard data protection.
Since they are closed source there is no way for me to verify that’s true, but that’s also not exactly in line with what you’re saying.
Your quote is about Advanced Data Protection, mine about standard. It’s a hidden 30 min setup that most people don’t bother with.
Yeah I know that but for me that’s where it gets interesting. It doesn’t really matter to me what others do And in a privacy community you can expect that at least we bother with those things. And whether or not my advanced data protection really is proper E2EE that’s where it gets interesting imo.
Not trying to antagonize you because I consider us in the same team, just saying that with this is kinda the same as with crypto wallets: not your key, not your wallet (or in this case, not encrypted). If I just rely on Apples default settings then yeah I consider that compromised.