Notices where this attachment appears
-
Embed this notice
@divergency @delta @ambiguous_yelp @gh0stz0x Looks like that is correct. So first thing you do is harvest the hosts hardcoded into the apps
> SMP server is the relay server used to pass messages in SimpleX network. SimpleX Chat apps have preset servers (for mobile apps these are smp11, smp12 and smp14.simplex.im), but you can easily change app configuration to use other servers.
Then go scrape the community server list: https://simplex-directory.asriyan.me/
And have someone embedded in the community harvesting the hostnames of all the extra private servers. Also watch for servers that have both 443 and 5223 open and isn't on an IP within Apple's AS. You can scrape the web yourself or just search Shodan.
St this point you have basically crippled access to the Simplex network unless the user has a SOCKS5 proxy they can use and the entity you're evading can't detect SOCKS5.
It's a lot of work but not impossible. Especially if you can use a custom implementation of SOCKS5 that obfuscates the traffic from DPI. But that's not as common.
This is a lot more work than just picking a public email server that isn't blocked by the gov. That's my main complaint