1/2/2024 0 Comments Tox vs cryptocat![]() Of course, just having a protocol and clients open source is not sufficient, also there are ideally several security audits. You don’t believe me that companies would never be so dishonest to do that? Have a look here: (summary: They advertise security and then there is no security in it) - you are saying big companies would never do that? Most of them are forced to: - so open source is the main criterion, everything which is not open source can’t be recommended. Reason: How can you tell the difference that they just show you a lock in the UI instead of really doing encryption? Yes, you can’t. Open source (clients and protocol): You can’t trust any closed source encryption, yes it’s that simple.So next I will give you a list of important characteristics of protocols and applications, by which you can determine if a protocol/application is good or not a list of protocol recommendations and the characteristics you could (and maybe should )) care about when deciding for a protocol. I thought how to present that decision the best and decided that often protocols and applications are still coupled and that for now the best is to have one list and not split it up into two lists. That means you will only be able to communicate with people that use a client that speaks the same protocol as your client. What you should be aware of is that you make two choices at the same time, when you pick an IM client: One the one hand the client itself, on the other hand the protocol which this client uses. I will compare different possibilities and will rank them by justified reasons for the ranking. The great news is that this does not mean any overhead in your communication, you only need to install a new app. Yes, my mom is sending me encrypted messages. It is actually now so easy that anybody can do it. Don’t fear, the great thing is, that since 2016 it is significantly easier than it was before. I hope until now you are conviced that you want to encrypt your communication. That is exactly what a lot of the fuzz with Snowden was about. And then when there are “investigations” many humans, police, politicians, security agencies can drill down and read every single of your email just because you wrote an email with someone 10 years ago who was potentially involved in a crime now. Why is it more important to you that I can’t read all your emails than Merkel, Trump and Zuckerberg?Īnd yes, this is real, computers are actually reading your unencrypted communication (email and chat). Or to make it less abstract: Would you mind giving me your email password? No? Why not? I thought you have nothing to hide? Here’s a long list of arguments, unfortuantely in German, if you have a similar list in English, please let me know in the comments: ! ![]() You decide when you want to share you and when you don’t. The right to privacy is the right to self. “Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” - Edward Snowden Why should you care about protecting your communication and generally your data? It’s just the biggest potential I see for people, where they can have the easiest the most impact. It’s important to me because I see a huge gap between what people do, what they care about and what they are not aware of. I’ll talk about other important issues in other posts. In this post I focus on a small subset of security: Encrypted Instant Messaging. Don’t be fooled by companies who use security as a marketing buzzword (especially don’t use WhatsApp, Facebook and Telegram). Use a XMPP+Omemo client (Conversations on Android, ChatSecure on iOS and Gajim for Windows/Mac/Linux). Tl dr: Encrypt all your online (IM) communication, there is no good reason anymore to not do it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |