• abbiistabbii@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    1 hour ago

    “The guy who helped install Donald Trump, did a Nazi Salute at Trump’s victory parade on live TV, supports authoritarians, and who has declared war on transgender people to the point you’re not allowed to say “Cis” or “Cisgender” on his platform, has created an end to end encrypted chat.”

    All of this has the same vibes as the time Brigham Young University amended their code of conduct to allow people to come out as queer, let some students come out, and then changed the CoC back and expelled the students.

  • Typhoon@lemmy.ca
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    1
    ·
    3 hours ago

    XChat, has some red flags.

    With a white circle and a swastika inside?

  • Hozerkiller@lemmy.ca
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    3
    ·
    4 hours ago

    I trust it but there is a major misunderstanding of end to end encryption. Some implementations the platform holder does not have a key to decrypt data but it is far from a requirement. All end to end means is there’s a blocker preventing the network from seeing what you send not twitter who im assuming has a copy of the key.

    • notarobot@lemmy.zip
      link
      fedilink
      English
      arrow-up
      4
      ·
      3 hours ago

      That is NOT end to end encryption. That is transport layer encryption. So basically SSL

      End to end is from sender to recipient. No one in the middle should be able to read anything

      • Hozerkiller@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        2 hours ago

        It’s like ssl but done at the application layer. Nobody in the middle can read it except it’s nobody in the middle of you and twitter and twitter and the recipient. If you put something on a platform and they have the key they will always be able to read it if they want to.

        • notarobot@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 hours ago

          are you being dense on purpose? sender and recipient are both users. never twitter.

          i’m not saying that twitter’s messaging is secure. the opposite. what i’m saying is that you statement of “All end to end means is there’s a blocker preventing the network from seeing what you send not twitter” is 100% objectively wrong.

    • DarkFuture@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      5 hours ago

      Friends and I swapped our group chat to Signal the day Trump was inaugurated…the first time.

      If things keep going the way they are, no one should be communicating on anything but encrypted messaging apps.

  • CitizenKong@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    16 hours ago

    I don’t trust anything coming out of Elon’s fascisthole. Deleted the app when he bought it and never looked back.

    • DarkFuture@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      5 hours ago

      I refuse to even click on links. If a friend sends me an X link to something funny/interesting I tell them “I don’t click on Nazi links” and ask them to find me another source.

  • TwinTitans@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    1
    ·
    19 hours ago

    Why are people evening using this site anymore? It’s been severely compromised.

  • earthworm@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    126
    arrow-down
    1
    ·
    edit-2
    1 day ago

    TL;dr of the article :

    1. They keep your private key on their servers.
    2. Their implementation allows for AITM attacks.
    3. It’s closed source.
    4. There’s no perfect forward secrecy.

    This secret stays between you, me, and Elon.

    I hope politicians use the hell out of it, so we can see what they really think when it gets (inevitably) hacked in a few weeks.

  • artyom@piefed.social
    link
    fedilink
    English
    arrow-up
    103
    arrow-down
    1
    ·
    edit-2
    1 day ago

    offering me end-to-end encrypted chat

    No one - not even X - can access or read your messages

    This key is then stored on X’s servers

    So…they’re just blatantly lying?

    • InnerScientist@lemmy.world
      link
      fedilink
      English
      arrow-up
      14
      ·
      edit-2
      1 day ago

      It’s encrypted with a 4 digit pin so they’ll have to spend at least 316.8809e-10 years on brute-forcing it.

    • FreedomAdvocate@lemmy.net.au
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      1
      ·
      1 day ago

      No - did you even read the article? An x employee confirmed that they’re using the “special” servers to store the keys that mean that they cannot see them. The author then says that the employee confirming it doesn’t mean they do, because the author doesn’t want it to be true.

      • Natanael@infosec.pub
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        16 hours ago

        There are hardware for that called hardware security modules, but yeah I definitely wouldn’t trust Twitter’s implementation - especially because they probably just need the auth team to tell the HSM that the user logged in when they didn’t to get that key

        A proper implementation would use multiple security measures and require a reset (delete) of certain private account data before the account access can be reset, otherwise the user’s password would be needed (for key derivation) or some other secret held by the user’s devices (in the TPM chip or equivalent)

          • Natanael@infosec.pub
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            5 hours ago

            I’ve run a cryptography forum for 10 years. I can tell snake oil from the real deal.

            Musk’s Twitter doesn’t know how to do key distribution. The only major company using HSMs the way Musk intends to is Apple, and they have far more and much more experienced cryptographers than X does.

            • FreedomAdvocate@lemmy.net.au
              link
              fedilink
              English
              arrow-up
              1
              ·
              14 minutes ago

              So again - you just don’t want it to be true, and you think the people that know more than you about it are lying.