Poor security implementations that would become the weakest link in the security chain
- 2 Posts
- 6 Comments
Joined 2 years ago
Cake day: June 7th, 2023
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
Definitely. Capturing the messages isn’t my concern though as much as interacting with non authentic clients
Yes of course. Signal can archive messages and they can be restored, you can screenshot messages and you can have them backed up as part of a policy like icloud backups.
My question is more about how do you know you’re interacting with an authentic signal client, and not a bastardized one.
root@lemmy.worldto Privacy@lemmy.ml•Do P2P Messaging apps that don't require the internet exist?1·6 months agoMeshtastic can be encrypted and is LoRa based. Can easily hit nodes dozens of miles away with a good line of sight. It also relays messages across nodes to reach even further distances.
Yeah, that’s a good point. For me it’s mostly family that is not very technical, so I’m not too concerned of them using a fork.