RU version is available. Content is displayed in original English for accuracy.
Advertisement
Advertisement
⚡ Community Insights
Discussion Sentiment
50% Positive
Analyzed from 854 words in the discussion.
Trending Topics
#end#encryption#encrypted#whatsapp#france#message#article#telegram#canada#care

Discussion (27 Comments)Read Original on HackerNews
It's only afterwards and as a consequence some highly newsworthy disasters occur such as a child abduction or political sex scandal involving a high profile politician come to light that the lay public will get the message that weak encryption is effectively no encryption.
In the meantime criminals will be early adopters of more sophisticated messaging such as steganography.
What makes you think French citizens don’t care?
Telegram doesn't even try to be end-to-end-encrypted by default. WhatsApp claims to be end-to-end-encrypted, but it's not open-source, Signal is end-to-end-encrypted.
And explicitly does not encrypt metadata.
Meanwhile NSA top brass publicly stated, "We kill people based on metadata."
Does make you wonder what kind of people they kill or how many. I can't think of a lot of crimes whose metadata warrants being killed for personally.
so as i read it the article doesn't suggest that all of telegram is end-to-end encrypted only that it has support for it.
Let's start putting some of these politicians in jail for being stupid.
But on the other side what I miss is some explanation if forensic analysis helps here? Presumably the messages stay on a phone and you can recover them. If that is the case then it should be enough to fight the crime, i.e if you get a warrant to access the device then you can access messages, which I believe many would agree is fine.
So a person in Canada messages someone in France who's WhatsApp is not encrypted. But the message from Canada is encrypted. Will the person in Canada's message have to be sent unencrypted ? Or will WhatsApp Canada need to allow France to break Canada's encryption ?
Personally I think it would be easier for these apps to ban people in France from using their service.
> "Perrin now offers a different framing. “Article 8 ter, which I had adopted, was not at all aimed at obtaining encryption keys but at introducing a ghost participant into a conversation before encryption,” he says. The “ghost participant” approach, sometimes called a ghost user proposal, was floated by GCHQ in 2018 and rejected by every major privacy organization, civil liberties group, and security researcher who looked at it. The idea is that the platform silently adds a third recipient, an invisible intelligence agent, to a supposedly two-person conversation. Users never see them. The encryption technically still works, except that one of the parties is the state."
https://community.qbix.com/t/the-global-war-on-end-to-end-en...
And by the way, this article mentions other things already in place, such as being able to commandeer your device and spy on it without breaking encryption:
https://community.qbix.com/t/increasing-state-of-surveillanc...
French investigators won't care about every WhatsApp message. But they definitely will slurp them all up, process them all with AI, and read them whenever they have an interest. And they will deny they are doing this as they do this.
It'd be interesting (horrifying?) to see something that was once assumed secret go public. Imagine if all chats and payments eventually went public at some point.
With TON, perhaps altcoins will give way to micro coins - tailored especially for apps and their users/founders? ..for micropayments and running on AI infrastructure. Blockchain and AI infrastructure are already interchangeable in large part. So if transaction histories are exposed, the damage is limited. Startups won't look to IPO, they'll look to float a coin to make serious money. Binance did it. Polymarket next? Poly is dominated by Bitcoin as it stands.
I'm not sure if Ethereum tokens would be the same thing.