GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Alyx ⏚ (x_cli@infosec.exchange)

  1. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Friday, 17-Apr-2026 22:34:23 JST Alyx ⏚ Alyx ⏚
    in reply to
    • mcc
    • Soatok Dreamseeker
    • ಚಿರಾಗ್ 🌹✊🏾Ⓥ🌱🇵🇸 (he/him)
    • Ку 🇧🇬🇪🇺:neobear_computing:

    @soatok I have read your series :) What I am saying is that, unless I don't recall it correctly, your focus is not on what metadata is available to Signal servers.

    For operation purposes, they necessarily have more data than what they claim (i.e. just the phone number, the IP address of the last connection, date of creation and date of last connection).

    They have the remaining prekeys from which you can infer when/how many new conversations were created.

    Having stuff (like contacts) in the secure enclave is great, but secure enclaves don't have storage, so when you need to restart the task running in the enclave, either you loose all the data, or you store it on disk in an encrypted form to load it back in in the new task. Where is the encryption key for that data? It has to be known by the operators, unless I am mistaken, and if that key is known by the operator, they can decrypt the data on disk.... so the data ain't really secure from the operator and the DoJ?

    Signal has to store a token per account to request notification from the Google/Apple notification services. This token is tied to the Signal identity and to a Google/Apple account, so that's something that authorities would want to have, isn't it?

    And these are a sample of the data that Signal has to have. I'm not even talking about the data they claim they don't collect and for which we can just blinding trust them.

    So yeah, maybe my reply was lazy. But I did publish a conference that required significant work. Let's not ignore that, please.

    @chiraag @khm @kunev @mcc

    In conversation about 6 days ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      https://this.lol/
  2. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Friday, 17-Apr-2026 22:18:14 JST Alyx ⏚ Alyx ⏚
    in reply to
    • mcc
    • ಚಿರಾಗ್ 🌹✊🏾Ⓥ🌱🇵🇸 (he/him)
    • Ку 🇧🇬🇪🇺:neobear_computing:

    @chiraag

    I'm gonna break your high opinion of Signal, sorry.

    https://passthesalt.ubicast.tv/videos/metadata-protection-in-instant-messaging-applications-a-review/

    Signal can and do collect a lot of shit. A lot more than what they pretend they have. I have no idea why the USA authorities put up with their incomplete responses. I have theories.

    Signal subcontractors do collect shit and they make no privacy promises at all. There are a lot of them. All USA-based

    Signal servers can disable privacy features and the Signal app will comply silently.

    @khm @kunev @mcc

    In conversation about 6 days ago from infosec.exchange permalink
  3. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Friday, 17-Apr-2026 22:18:13 JST Alyx ⏚ Alyx ⏚
    in reply to
    • mcc
    • Soatok Dreamseeker
    • ಚಿರಾಗ್ 🌹✊🏾Ⓥ🌱🇵🇸 (he/him)
    • Ку 🇧🇬🇪🇺:neobear_computing:

    @chiraag Sure. I also work in the applied cryptography engineering field, but you can trust whoever you like. As it happens, @soatok does not speak about metadata in his blog post. Not once. The word is not even present, and that's all I am talking about, so his claims and mine's are not contradictory.
    My feeling about why the Signal president is not in jail right now, considering what we know about the metadata that Signal does have, is that they are actively collaborating with the USA government. Another possibility is that the DoJ is utterly stupid.

    If you had watched the video, you would know that I'm talking about AWS, Cloudfront, Cloudflare, GCP and Apple which are all involved in the operation of the Signal service.
    @khm @kunev @mcc

    In conversation about 6 days ago from infosec.exchange permalink
  4. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Tuesday, 14-Oct-2025 17:27:49 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Electronic Frontier Foundation
    • Rich Felker
    • Chris

    @dalias Unfortunately, it is already there... The ship has sailed. And it is the age-old argument "do not invent something that could be misused". We would still be living in caves if we did not invent stuff. What matters is what you do with that stuff and if that stuff can be built to be trusted.

    In my town, I would love to be able to set up informal polls/surveys that can only be voted (truly anonymously) by the people living or working in the town. Sounds legit, don't you think?

    I mean, if you think about it, there are valid use cases. Maybe you disagree with enforcing age restrictions on some products or content. In many cases, I share that opinion. But I can think of use cases that are benign. For those that aren't, the real fight is to stop their use, not to stop the tech from being invented. But this is debatable, I'm sure ; it is just my opinion :)
    @chrisvest @eff

    In conversation about 6 months ago from infosec.exchange permalink
  5. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Tuesday, 14-Oct-2025 17:07:32 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Electronic Frontier Foundation
    • Rich Felker
    • Chris

    @chrisvest
    I believe there might be some anonymous online attribute verification that may be legit.
    For instance, for selling drugs like alcohol or tobacco online, or ensuring that someone does have a ID card in a specific region of the world. YMMV.

    I'm not saying all attribute verifications are relevant or desirable, but some might me worth discussing democratically, and if some are valid, then we ought to have a truly privacy-preserving way of doing it that does not just pretend to be privacy-preserving by using ZKP just because it sounds secure.

    @dalias @eff

    In conversation about 6 months ago from infosec.exchange permalink
  6. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Tuesday, 14-Oct-2025 02:45:51 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Electronic Frontier Foundation
    • Rich Felker

    @dalias
    Exactly. The point of a ZKP is to provide repudiable proof, which goes against the very goal of these age proofs (i.e. allowing verifiers to prove to the authorities that they did verify users age). So if they use ZKP, it is only because the name induces a false sense of security. Nothing more. Digital signatures would be way more appropriate, but they are scary, on paper.
    @eff

    In conversation about 6 months ago from infosec.exchange permalink
  7. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 17-Sep-2025 21:43:53 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Modiie 🦝

    @Modiie
    Si les gens le proposent gratuitement, pourquoi refuser l'économie du don ? Pourquoi rendre tout capitaliste en considérant que "tout travail mérite salaire" ?
    Je veux dire, je comprends le cout d'une instance Peertube et du streaming. C'est mon métier. Mais il y a aussi des mécènes 🤷

    In conversation about 7 months ago from infosec.exchange permalink
  8. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Thursday, 17-Jul-2025 07:33:33 JST Alyx ⏚ Alyx ⏚
    in reply to
    • playit

    @playit I heard a lot of great things about Vector (https://vector.dev/) and I had plans to use it in my previous job before I quit.
    Vector is featureful and the documentation is great.

    In conversation about 9 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: vector.dev
      Vector
      from @vectordotdev
      A lightweight, ultra-fast tool for building observability pipelines
  9. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 21-May-2025 06:29:06 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Delta Chat

    @delta Good attempt, but I'll resist the urge of adding you to my talk :D Please implement PFS to be a candidate for the next one: https://cfp.pass-the-salt.org/pts2025/talk/7K9MEV/ ;)

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cfp.pass-the-salt.org
      Metadata Protection in Instant Messaging Applications: a Review PTS2025
      This talk covers the obvious issue of long-term identities and the construction of the social graph and how some protections supposed to thwart the social graph recovery are flawed. Some of these attacks are publicly documented and still unmitigated by those affected by them. This talk also dives into less obvious metadata leaks, such as traffic correlation and ciphertext correlation. Finally it also points out that some of the studied instant messaging solutions do not protect all messages and leak metadata to third parties via attachment upload, push notifications, backups and voice/video calls. Sorting out which instant messaging application is the best is a non-goal for this talk.
  10. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 21-May-2025 06:29:05 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Delta Chat

    @delta

    > What does PFS have to do with minimizing metadata?

    Absolutely nothing. You are correct.

    The thing is the research behind this talk is an unpaid independent research, done on my free time. So I had to set some arbitrary criteria to filter the dozens of applications to study. If people want me to study a specific application, my rate is 500€/day (which is lower than my standard rate; a sacrifice I am willing to make because I think there is a social value to this work).

    My belief is that E2EE, PFS and ephemeral messages are the minimum requirements for a secure messaging application to be taken seriously.

    These are beliefs. Some people might have different beliefs and that's obviously OK.

    So when people ask me "Have you considered Delta Chat?", my answer is "lol, no, they don't even have PFS; let's talk about serious applications".

    The truth is I did fund Delta Chat, studied it and even contributed to its translation. There is value in Delta Chat, and I am not denying it. But if I have to use an application to secure my communications, Delta Chat is not a valid option for me. Sorry.
    ---
    > Can you link a real-world case where PFS played a role and protected someone from repressive persecution?

    PFS protects against the recovery of past communications that were recorded and ultimately decrypted after the attacker gets access to the key material. People able to setup dragnet surveillance are generally working for intelligence services and law enforcement. They don't tend to brag about their methods in the press.

    Still, the NSA (Prism) showed to the world that there are nations recording large amount of Internet traffic. Pegasus showed that mobile phone surveillance and key extraction are a thing.

    The (almost) general adoption of ephemeral messages shows that the public is aware that when law enforcement forcefully unlocks your phone, you don't want to have your personal conversation lying around. But what about your key material?

    Well, if you don't have PFS, law enforcement will get their dirty hands on it... and with that, they will get access to all past conversations that you thought were confidential because you used ephemeral messages.

    My point is ephemeral messages are pretty much useless if your adversary recorded your encrypted conversations and you don't have PFS.

    So do I have a real-world case where PFS played a role? No.
    Do I know real-world cases where ephemeral messages prevented law enforcement from accessing someone's data? Yes.
    Do I know real-world cases where traffic was recorded and decrypted on the side thanks to the lack of PFS? Yes. I even worked for a company building surveillance appliances that do that... (not being too proud about that but hey... not having PFS is a serious flaw in my book).

    In conversation about a year ago from infosec.exchange permalink

    Attachments



  11. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 21-May-2025 03:21:27 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Natouille 🍷 🥃 🍾

    @Natouille Contradiction détectée 😅

    In conversation about a year ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/540/274/691/868/669/original/b10b6ee936a85e94.png
  12. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 05-Mar-2025 22:46:46 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Haelwenn /элвэн/ :triskell:
    • Elzen
    • Parleur 🔻
    • Lizzie Crowdagger :neocat_floof_flag_trans:

    @elzen (je m'inscris en faux sur cette affirmation ; il s'agit de la seule interprétation de @elzen des textes que j'ai fournis et qui, à mon avis, disent l'exact opposé :))
    @crowdagger @parleur @lanodan

    In conversation about a year ago from gnusocial.jp permalink
  13. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 05-Mar-2025 22:44:07 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Haelwenn /элвэн/ :triskell:
    • Elzen
    • Parleur 🔻
    • Lizzie Crowdagger :neocat_floof_flag_trans:

    @lanodan Les lois applicables, c'est toujours les mêmes depuis 20 ans : la LCEN et la LCEN2.

    @crowdagger @elzen @parleur

    In conversation about a year ago from gnusocial.jp permalink
  14. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 05-Mar-2025 22:17:48 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Parleur 🔻

    @parleur
    Loin de moi l'idée de défendre des racistes.

    Je rappelle néanmoins qu'en droit, un hébergeur est un hébergeur tant qu'il ne fait d'action de choix éditoriaux ; autrement tant qu'il se contente de supprimer le contenu qui est manifestement illégal dès lors que celui-ci lui est signalé et dans un délai raisonnable. Dès lors que ses actions de modération s'étendent des décisions sur du contenu qui n'est pas manifestement illégal, alors il devient éditeur, et il est responsable légalement des propos tenus sur sa plateforme.

    Est-ce que des messages que tu assimiles à du dog whistle (je te crois sur parole ; je m'y connais pas assez) sont qualifiables de manifestement illégal ? Par définition, j'ai l'impression que non.

    In conversation about a year ago from infosec.exchange permalink

    Attachments


  15. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Friday, 28-Feb-2025 16:38:28 JST Alyx ⏚ Alyx ⏚

    Zéro confiance en Olvid.

    https://web.archive.org/web/20250228063029/https://infosec.exchange/@x_cli/114071933034464431

    1) L'État ne représente pas un risque selon eux ;
    2) Épandage de la peur et du doute sur les concurrents ("nos concurrents sont des outils de surveillance de masse", sans justification) ;
    3) Usage de post-vérité : "nous avons été audité, contrairement aux autres, que les gogos croient sur parole" ;
    4) emploi de comptes marionnettes/ferme à trolls pour poster de la désinformation sur les concurrents (https://mastodon.top/@atchi150585/114078339465195398)

    Ne tombez pas dans le piège. Déconseillez Olvid.

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Alexandre H (@atchi150585@mastodon.top)
      from Alexandre H
      @x_cli@infosec.exchange @Olvid_Club_de_France@mastodon.social @trailofbits@infosec.exchange SimpleX Chat a été audité une fois, en octobre 2022
  16. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Thursday, 20-Feb-2025 22:45:37 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Stefan Thöni
    • rakoo
    • Sarah Jamie Lewis
    • Remi Gacogne

    @rgacogne
    I second that opinion, but the structure has to be a non-profit. This is why I refuse to fund Thunderbird.
    @rakoo @exception @sarahjamielewis

    In conversation about a year ago from infosec.exchange permalink
  17. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Friday, 24-Jan-2025 23:04:44 JST Alyx ⏚ Alyx ⏚

    Donc l'#ANSSI sort un guide sur la sécurisation des serveurs ACME.

    **PAS UNE mention de DNSSEC**

    Fucking amateurs

    #infosec #acme #cybersecurity

    In conversation about a year ago from infosec.exchange permalink
  18. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 04-Dec-2024 04:37:21 JST Alyx ⏚ Alyx ⏚
    in reply to
    • Solène :flan_hacker:

    @solene
    Nope. Not IPv6 related 😉

    In conversation Wednesday, 04-Dec-2024 04:37:21 JST from gnusocial.jp permalink
  19. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 04-Dec-2024 03:42:10 JST Alyx ⏚ Alyx ⏚

    Check your #DNS skills:

    On GNU/Linux:

    ping broken-by-design.fr => name resolution OK

    resolvectl query broken-by-design.fr => name resolution OK

    wget https://broken-by-design.fr => Temporary lookup failure

    apt update => Temporary lookup failure

    What did the user (sudoer) change on their system to break it?

    In conversation Wednesday, 04-Dec-2024 03:42:10 JST from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Broken by Design
      Security specialists have this tendency to focus on the most mundane things, and overthink them to the point where they may actually find something interesting to say about them.
  20. Embed this notice
    Alyx ⏚ (x_cli@infosec.exchange)'s status on Monday, 02-Dec-2024 22:00:54 JST Alyx ⏚ Alyx ⏚

    For those of you on Atomic Desktops (Fedora Silverblue) wanting to run Signal Desktop and not trusting the non-official flatpak (which is broken anyway...): you can install Signal Desktop on a toolbox.

    toolbox create -d ubuntu -r 24.04
    toolbox enter ubuntu-toolbox-24.04
    <run the commands to install signal desktop as indicated by the Signal website>
    apt update && apt install -y alsa

    and boom ! You can run Signal Desktop!

    Toolbx is an excellent tool, including for running applications with graphic displays. Audio and video calls work too!

    In conversation Monday, 02-Dec-2024 22:00:54 JST from infosec.exchange permalink
  • Before

User actions

    Alyx ⏚

    Alyx ⏚

    I am an antispeciesist, and member of L214, a French NGO fighting for animal rights. I also fight for LGBTQIA+ rights.#antispeciesism #author #privacy #lgbt #NoAI #ResistanceNet #fedi22 searchable

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          15572
          Member since
          1 Nov 2022
          Notices
          28
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.