Both sides previous revisionPrevious revisionNext revision | Previous revision |
securecomms [2023/04/11 02:27] – kc | securecomms [2023/05/04 18:19] (current) – kc |
---|
=====Secure Communications===== | =====Secure Communications===== |
| |
^ Online resource ^ Subset ^ Level of Message Security ^ See ^ | ^ Online resource ^ Comments ^ Level of Message Security ^ See ^ |
| Facebook | both sides using smart phones | secret chat available | [[https://ssd.eff.org]]| | | Facebook | both sides using smart phones | secret chat available | [[https://ssd.eff.org]]| |
| (FB) | either side using computer | no end-to-end encryption | | | | (FB) | either side using computer | no end-to-end encryption | | |
| Instagram | | | | | | Instagram | | | [[https://www.bankinfosecurity.com/facebook-instagram-blasted-for-lame-security-practices-a-21022|Warning]] | |
| Keybase | mobile phones and desktop PCs | Uses PGP | [[https://keybase.io/]]| | | Keybase | mobile phones and desktop PCs | Uses PGP | [[https://keybase.io/]]| |
| Line | | end-to-end encryption | [[https://www.lifewire.com/line-app-review-3426438|Evaluation]] | | | Line | | end-to-end encryption | [[https://www.lifewire.com/line-app-review-3426438|Evaluation|Warning]] | |
| __LinkedIn__ | | no end-to-end encryption | [[https://www.kaspersky.com/resource-center/preemptive-safety/linkedin-privacy-concerns|See discussion]]| | | __LinkedIn__ | | no end-to-end encryption | [[https://www.kaspersky.com/resource-center/preemptive-safety/linkedin-privacy-concerns|See discussion]]| |
| Meest | | end-to-end but see note. | [[https://www.linkedin.com/pulse/best-encrypted-social-media-platforms-2021-shiv-balak-kumar/|Somewhat less secure]] | | | Meest | | end-to-end but see note. | [[https://www.linkedin.com/pulse/best-encrypted-social-media-platforms-2021-shiv-balak-kumar/|Somewhat less secure]] | |
| **Session** | Like Signal, but no phone needed | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/session/|Evaluation]]| | | **Session** | Like Signal, but no phone needed | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/session/|Evaluation]]| |
| Signal. | Only available via smartphone | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/signal/|Evaluation]]| | | Signal. | Only available via smartphone | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/signal/|Evaluation]]| |
| Snapchat | | || | | Snapchat | | |[[https://stealthoptional.com/news/is-snapchat-encrypted-how-secure-is-snapchat-messaging/|Evaluation]]| |
| __Telegram__ | | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/telegram/|Problems]]| | | Tails | Complete Linux OS on your PC | ultra-secure;possession 😟| [[Tails_Details]]| |
| | __Telegram__ | | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/telegram/|Problems]]| |
| Threema | Works on iPads & smartphones | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/threema/ |Evaluation]]| | | Threema | Works on iPads & smartphones | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/threema/ |Evaluation]]| |
| Twitter | | no end-to-end encryption | [[https://www.forbes.com/sites/thomasbrewster/2022/12/07/elon-musk-said-twitter-needed-encrypted-messages-its-on-hold/ sh=29dee09e9f93|*]] | | | __Quora__ | | no end-to-end encryption | [[https://www.forbes.com/sites/thomasbrewster/2022/12/07/elon-musk-said-twitter-needed-encrypted-messages-its-on-hold/ sh=29dee09e9f93|*]] | |
| WhatsApp | Only available via smartphone | end-to-end encryption | [[https://www.businessinsider.com/guides/tech/is-whatsapp-safe|Evaluation]]| | | WhatsApp | Only available via smartphone | end-to-end encryption | [[https://www.businessinsider.com/guides/tech/is-whatsapp-safe|Evaluation]]| |
| Wire | Multiple platforms | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/wire/|Thorough review]]| | | Wire | Multiple platforms | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/wire/|Thorough review]]| |
| |
It may be desirable to register for some services using a "burnable" email address. For suggestions, see: [[https://restoreprivacy.com/email/temporary-disposable/]] | It may be desirable to register for some services using a "burnable" email address. For suggestions, see: [[https://restoreprivacy.com/email/temporary-disposable/]] |
| ---- |
| An attempt to [[TOR-VPN-Etc|Unsnarl TOR and related security issues]]. |
| |
---- | ---- |
| |
Wikipedia records that US security organizations have issued warnings about the potential misuses of this system for illegal actions. See: | Wikipedia records that US security organizations have issued warnings about the potential misuses of this system for illegal actions. See: |
[[https://en.wikipedia.org/wiki/Tails_(operating_system)]] | [[https://en.wikipedia.org/wiki/Tails_(operating_system)]] |
| |
| The use of TOR is not a perfect solution, but those with extreme security situations should |
| learn about it. See: [[https://portswigger.net/daily-swig/tor-security-everything-you-need-to-know-about-the-anonymity-network|TOR and |
| Tails]] |
| |
[[https://lifehacker.com/browse-like-bond-use-any-computer-without-leaving-a-tr-5916551]] | [[https://lifehacker.com/browse-like-bond-use-any-computer-without-leaving-a-tr-5916551]] |
| |
| |
Running an instance of Ubuntu on your computer's CD drive or using a USB drive would let you work without leaving any trace of your actions on the computer. The user of this modality would not get flagged by Taliban for using TOR technology. | Running an instance of Ubuntu on your computer's CD drive or using a USB drive would let you work without leaving any trace of your actions on the computer. The user of this modality would not get flagged by Taliban for using TOR technology. However, unless |
| you were using a good VPN your communications would still trace back to the point at which you went on-line. |
| |
See: [[https://www.techtarget.com/searchdatacenter/definition/Debian]] | See: [[https://www.techtarget.com/searchdatacenter/definition/Debian]] |
| |
Another kind of software is called Ricochet Refresh. It is a messenger that goes through | Another kind of software is called Ricochet Refresh. It is a messenger that goes through |
TOR. I have tried to experiment with it. It is notably lacking in on-line tutorial stuff. Here are some things I found out. [[RicochetReminders|Hints on getting Ricochet Refresh up and running.]] | TOR. I have tried to experiment with it. It is notably lacking in on-line tutorial stuff. Here are some things I found out. [[RicochetReminders|Hints on getting |
| Ricochet Refresh up and running.]] |
| |
| For the future, and also because this site gives good overbite on how https: works to keep communications |
| cryptic from when things leave your computer to when they enter the other guy's computer, see |
| [[https://physicsworld.com/a/the-dream-of-a-quantum-internet-is-closer-than-you-might-think/?Campaign+Owner=&utm_campaign=14290-55456&utm_content=Image%3A%20The%20dream%20of%20a%20‘quantum%20internet’%20is%20closer%20than%20you%20might%20think%20-%20explore%20more&utm_term=&utm_medium=email&utm_source=iop|Quantum Cryptography Is On The Way]] |
---- | ---- |
====MESHTASTIC==== | ====MESHTASTIC==== |