Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision |
securecomms [2023/04/11 03:07] – kc | securecomms [2023/04/12 12:36] – kc |
---|
| **Session** | Like Signal, but no phone needed | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/session/|Evaluation]]| | | **Session** | Like Signal, but no phone needed | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/session/|Evaluation]]| |
| Signal. | Only available via smartphone | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/signal/|Evaluation]]| | | Signal. | Only available via smartphone | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/signal/|Evaluation]]| |
| Snapchat | | || | | Snapchat | | |[[https://stealthoptional.com/news/is-snapchat-encrypted-how-secure-is-snapchat-messaging/|Evaluation]]| |
| __Telegram__ | | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/telegram/|Problems]]| | | __Telegram__ | | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/telegram/|Problems]]| |
| Threema | Works on iPads & smartphones | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/threema/ |Evaluation]]| | | Threema | Works on iPads & smartphones | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/threema/ |Evaluation]]| |
| |
| |
Running an instance of Ubuntu on your computer's CD drive or using a USB drive would let you work without leaving any trace of your actions on the computer. The user of this modality would not get flagged by Taliban for using TOR technology. | Running an instance of Ubuntu on your computer's CD drive or using a USB drive would let you work without leaving any trace of your actions on the computer. The user of this modality would not get flagged by Taliban for using TOR technology, except for the fact that the user's connection to the Internet was at one end of a TOR communication. The Taliban might not know how you did it or what you did, but they would know that you had done **something**. |
| |
See: [[https://www.techtarget.com/searchdatacenter/definition/Debian]] | See: [[https://www.techtarget.com/searchdatacenter/definition/Debian]] |