Pro@programming.dev to Technology@lemmy.worldEnglish · 16 days agoAn analysis of X(Twitter)'s new XChat features shows that X can probably decrypt users' messages, as it holds users' private keys on its serversblog.cryptographyengineering.comexternal-linkmessage-square45fedilinkarrow-up1501arrow-down13
arrow-up1498arrow-down1external-linkAn analysis of X(Twitter)'s new XChat features shows that X can probably decrypt users' messages, as it holds users' private keys on its serversblog.cryptographyengineering.comPro@programming.dev to Technology@lemmy.worldEnglish · 16 days agomessage-square45fedilink
minus-squareLifter@discuss.tchncs.delinkfedilinkEnglisharrow-up1arrow-down1·15 days agoAlternatively, we need to stop saying E2EE is safe at all, for any type of data, because or the arbitrary usage.
minus-squareEncrypt-Keeper@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down1·14 days agoWe don’t need to stop saying E2EE is safe, because it is. There is no arbitrary usage. Either it’s E2EE. If a company lies to you and tells you it’s E2EE and it’s not E2EE that’s not arbitrary usage, it’s just a lie.
minus-squareLifter@discuss.tchncs.delinkfedilinkEnglisharrow-up1arrow-down1·14 days agoYou are obviously not interested in listening to a word I’m saying. Goodbye.
minus-squareEncrypt-Keeper@lemmy.worldlinkfedilinkEnglisharrow-up1arrow-down1·13 days agoYou’re talking about things that you don’t understand on a fundamental level. Maybe stick things you do understand?
Alternatively, we need to stop saying E2EE is safe at all, for any type of data, because or the arbitrary usage.
We don’t need to stop saying E2EE is safe, because it is. There is no arbitrary usage. Either it’s E2EE. If a company lies to you and tells you it’s E2EE and it’s not E2EE that’s not arbitrary usage, it’s just a lie.
You are obviously not interested in listening to a word I’m saying. Goodbye.
You’re talking about things that you don’t understand on a fundamental level. Maybe stick things you do understand?