User Tools

Site Tools


securecomms

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
securecomms [2023/04/11 03:14] kcsecurecomms [2023/04/14 02:50] kc
Line 12: Line 12:
 | **Session**      | Like Signal, but no phone needed  | end-to-end encryption.    |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/session/|Evaluation]]| | **Session**      | Like Signal, but no phone needed  | end-to-end encryption.    |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/session/|Evaluation]]|
 | Signal.          | Only available via smartphone  | end-to-end encryption     | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/signal/|Evaluation]]|  | Signal.          | Only available via smartphone  | end-to-end encryption     | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/signal/|Evaluation]]| 
-| Snapchat                                        |                           ||   +| Snapchat                                        |                           |[[https://stealthoptional.com/news/is-snapchat-encrypted-how-secure-is-snapchat-messaging/|Evaluation]]|   
 | __Telegram__        |                                | end-to-end encryption.    |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/telegram/|Problems]]| | __Telegram__        |                                | end-to-end encryption.    |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/telegram/|Problems]]|
 | Threema          | Works on iPads & smartphones   | end-to-end encryption     | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/threema/ |Evaluation]]| | Threema          | Works on iPads & smartphones   | end-to-end encryption     | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/threema/ |Evaluation]]|
Line 44: Line 44:
 Wikipedia records that US security organizations have issued warnings about the potential misuses of this system for illegal actions. See: Wikipedia records that US security organizations have issued warnings about the potential misuses of this system for illegal actions. See:
 [[https://en.wikipedia.org/wiki/Tails_(operating_system)]] [[https://en.wikipedia.org/wiki/Tails_(operating_system)]]
 +
 +The use of TOR is not a perfect solution, but those with extreme security situations should 
 +learn about it. See: [[https://portswigger.net/daily-swig/tor-security-everything-you-need-to-know-about-the-anonymity-network|TOR and 
 +Tails]]
  
 [[https://lifehacker.com/browse-like-bond-use-any-computer-without-leaving-a-tr-5916551]] [[https://lifehacker.com/browse-like-bond-use-any-computer-without-leaving-a-tr-5916551]]
securecomms.txt · Last modified: 2023/05/04 18:19 by kc