Huh

Release v6.3.0 ¡ simplex-chat/simplexmq
See full changelog here. Key to verify release: FB44AF81A45BDE327319797C85107E357D4A17FC Commits: postgres: schema (#1416) postgres: db interfaces wip (sqlite passes) (#1419) postgres: store imple...
Huh
Which is why I opened a bug to cover IPA in the âoverviewâ if not in the âthreat modelâ section of the overview (but it was closed without much fanfare, except here on PG, I suppose). As @anon6884803 explained above, the âoverviewâ doc on SimpleXâs GitHub already talks about adversaries in a broad sense; except for this one adversary that may own most if not all of SimpleXâs guarantees.
As a user, I just donât know how or why that might come about. Given that you already have a legal counsel on retainer, you may as well write about IPA like Mullvad does for Swedish laws, for example (1, 2). It isnât part of the âthreat modelâ as you see it, but it is part of overall OpSec for your users (in this case: me). On the face of it, the âoverviewâ doc seems to make wide ranging claims about âtrustâ, and so talking about IPA as publicly doesnât seem out of place, tbh.
I see, but since the entire point of SimpleX is its superior protocol+cryptography, which if it can be backdoored (or whatever IPA allows for, I donât know), makes it useless to at least a section of your userbase, if not for everyone.
Sounds like an excuse, imo. For example, Iâd not use WireGuard clients if it could be backdoored by the French govt (its author, Jason Donenfeld, is based in France), but since Jason has put in the time and effort for reproducible builds of the official clients, I feel confident using those (regardless of how remote the threat may be). Same goes for what Google is doing with tamper-proof hardware in vendor-agnostic Open Titan, just so trusted/secure/verified boot guarantees remain anchored in userâs trusts solely on silicon manufacturer and the silicon owner (the equivalent for SimpleX would be to provide remote attestation for its servers and reproducible builds for its clients, I think?). All that to say, folks in the security/privacy industry are already putting in the work.
Unsure if it means what I think it means (you mean like Linux and Tor?), but it canât be the only answer? May be youâve thought about this deeply than I have.
Reasonable. But we have 5% of Mullvad budget I think, and no - itâs not a counsel on retainer - we pay for the advice as and when needed.
Thanks for the links. I will think about some opsec advice page on the site.
On the face of it, the âoverviewâ doc seems to make wide ranging claims about âtrustâ, and so talking about IPA as publicly doesnât seem out of place, tbh.
This doc should remain purely technical, what you want belongs elsewhere - probably linked to Transparency page.
Since point of SimpleX is its superior protocol+cryptography, which if it can be backdoored (or whatever IPA allows for, I donât know), makes it useless to at least a section of your userbase, if not for everyone.
Thatâs not correct, as compromised servers do not allow establishing who talks to whom, unless itâs coordinated compromise across multiple operators.
The primary focus is on minimizing trust to servers. Making them trustworthy is a secondary focus.
Unsure if it means what I think it means (you mean like Linux and Tor?), but it canât be the only answer? May be youâve thought about this deeply than I have.
By jurisdictional decentralization I mean two things:
Reproducible builds are not yet there - but my IP ops unexpectedly tells me that server builds might already be reproducible, which is surprising, but will soon know more.
What I am interested in doing irrespective of reproducibility is âcommunity server auditsâ. The way it would work with some selected members of community we can trust (canât be fully anonymous, would require signing some agreement under some known and reputable online identity - we wonât need to know name and address, a recognisable alias is sufficient):
It does seem like a bit of an effort and time commitment from both sides, but we can try to make it manageable.
Would there be an interest to participate?
If the server code is indeed reproducible, and people can verify the initial and changed server hashes, I do think it is the closest to server transparency without costly HSMs.
But you will need folks who already have excellent reputation. I am sure you can find some prominent names as I know a lot of smart folks are following SimpleX closely. If you can get someone like Nadim Kobeissi, Akc3n (GOS mod), etc. (these are the ones who have explicitly been interested in SimpleX off the top of my head) it will make it very easy to gain trust. A mix of technical experts and privacy advocates should be considered. This is not an operation that will risk their reputation (since they are just verifying hashes match), so I donât think that will be the issue. But convincing them to do so might be tough. Care should also be taken to take less volatile personalities, so that a bad Server signer does not malign SimpleX reputation. Some server signers can ask to see who else is doing this to understand if they wish to participate or not. Will be a delicate operation
Immediate benefit of course is having to spend less technical resources on hacking together server transparency cheaply, while also having active and continuous endorsement. A side benefit is reducing trust in the other parties that host servers, since the first hop can always be SimpleX servers that are verified. Sounds like a good start to me.
Yes, confirmed, it is reproducible when we build in docker. We already have a GitHub action that builds in docker, so GitHub hashes will be the same as with builds by any users, so we will be able to additionally sign these hashes locally and have independent verifiers to do the same for stable server releases.
We will aim to do it for 6.3 release of the servers this Saturday.
The point was to choose beforehand which you wish to provide:
Privacy by policy means the client does not actively protect the user from all third parties, especially the service provider.
Privacy by design means that it does.
Itâs ok to provide different type of protection for metadata and content. E.g. Signal is content-private by design, metadata-private only by policy. Signal chooses not to collect that data, and it has put some mechanisms like remote attestation that allows the client to verify that is the case. And we even have court docs to show this is the case. But still, itâs not impossible to make server collect all metadata if a) there is a secret interpretation of a secret national security law and b) Intelâs SGX is not trustworthy.
Cwtch is metadata-private by design as the service provider isnât able to collect anything without the clientâs code enabling that.
The legal system is important, from the PoV of not having draconian laws, but if the Snowden docs showed something, it was that the public might not have access to the content of law. Whose to say if FISA court might under some fascist regime one day rubber-stamp actions similar to cointelpro.
Itâs also the case Snooperâs Charter gives UK LEA permission to hack computer systems, and IIRC, we learned from Snowden papers, that foreign targets do not enjoy constitutional protections, so, nation states can compromise foreign systems, and exchange the information, bypassing said constitutional protections.
With a threat landscape this complex, I would argue the legal system is at its most useful state, when it allows privacy-by-design systems to exist. If not, your options are limited: relocate or fight the system.
As I have said multiple times: the key thing SimpleX is missing, is transparent threat modeling. Basically, tell users what types of adversaries can breach each layer of security, and what types canât.
Which is why I implored you above to be open about this. âWe canât verify independent parties are running the nodesâ. This means you acknowledge node pool sizes play a role in providing resistance against the end-to-end correlation. The only thing the legal entity protects against is domestic for-profit data mining companies, and maybe rogue LEA employees. Criminals and foreign agencies, like batman, have no jurisdiction.
As would I. But thatâs not what you brought to the table. I asked you to default to Tor, and you wanted to make it an optional step with complex setup instructions of several pages. You deployed an inferior system compared to Tor, and you marketed it on the front page as an improvement over Cwtch that defaulted to Tor.
And this is also OK. When someone starts writing a brand new messenger directly into GitHub, by the time the application has an MVP that allows communication over the network, the standard disclaimer of âNo encryption whatsoever has yet been implemented, do not use this application in productionâ should be in the project README (read: on the front page with big letters).
If the client-server encryption is implemented first, then updating the threat-model to reflect it: âThe system uses basic TLS, but not end-to-end encryption. This means or server gets access to your messages, know this before using it.â
Transparency shows youâre making progress, and that youâre taking security seriously. Itâs your job to know your job. If this costs a few early adopters who misunderstand this to mean the application is insecure or struggling, let me be clear: FUCK. THEM.
Your duty is to your users. SimpleX doesnât look like itâs the next Telegram, it actually seems to try instead of just appearing to try. Everything is E2EE and I respect that. A lot. Thatâs why I want to believe Iâm not wasting my breath writing this. A lot of the security of the product comes from the privacy by design. But like you said, itâs also the matter of policy. And that policy must include the transparency of threat model to users, if for no other reason, because no security architecture will stop all adversaries, and the only way you protect the users, is by letting them make informed decisions. Some things are best said face-to-face. It doesnât have to be illegal stuff. Some users would probably not use SimpleX to exchange nudes, if they knew state mass surveillance employees automating endpoint hacking might use them like trading cards.
No technical or design solution can solve for social problems. In the end every technology depends on some privacy policy, some social contract being adhered to.
Cwtch is also not usable. Trust me I tried.
Their published threat model seems fine, is there anything specific they seem to be missing?
Nobody can. Not even Tor. I agree I would like to see something like tor threat model in simplex threat model document.
I donât understand this. Isnât Tor massively compromised due to the network having large number of nodes controlled by nation states, concentration of servers in specific countries, etc. Isnât SimpleX network a chance for a clean slate with public providers who have their reputation tied to not being malicious (cloudflare and the like). Isnât a corporate run network more sybil resistant than anonymous volunteer network.
But SimpleX is not in that state. It is perfectly usable except in very specific sophisticated attacks, which I agree they should add to their threat model. I do not think it is fair to ask a new project to plaster their deficiencies on the front page, especially when more established and more critical projects also start with their sales pitch and more details in threat models.
They were talking about legacy systems like sms. Any E2EE app worth the name stops this kind of attack. Could have chosen a better example, since this example subtly paints it in a particularly bad light.
Are you attached to cwtch per chance?
Like I said, it needs a law that allows privacy-by-design systems to exist. The rest of the social contract is between the people doing the communication, and thatâs outside the domain of what an app can do.
No I do not trust you and no-one should either take your word for it. The way I see it, tools are made to serve a purpose. Technology has not perfect solution for every task. You want end-to-end encryption? Now you lose centralized monitoring in say a company wide chat. Slack is for that purpose. You need strong metadata-privacy? Signal no longer does it for you, but with Cwtch you lose offline-messaging. You want security against state actors hacking your endpoint, you use TFC, but you lose message forwarding.
In Saudi-Arabia you get 5 years of prison time and 500 lashes, for homosexuality. In Iran youâre executed. Thus, some people will place metadata security and/or endpoint security, and the risks if their security fails, on the scale. To them any inconvenience in more secure tools is a matter of life an death.
So you saying âitâs not usableâ comes from very privileged position, and failure to see beyond it. Youâre of course welcome to develop a more usable system with equal level of security. E.g. Briar has been working on some sort of proxied cache to allow offline-messages in Onion routed p2p messengers.
Searching âThreat modelâ on front page returns 0 results.
The Threat model article needs to be linked on the front page, like this
^ Doing this will shut me up for good @epoberezkin. If you think itâs not very presentable as as a front-page item as a GitHub markdown document, maybe itâs time to polish it into a nice article.
Tor doesnât make it a selling point either. Thereâs only so much tech can do, and Tor is doing all of it, without misrepresenting it. Tor is also considered by the NSA to be the king of anonymity systems with no contenders waiting.
This. I would also like Tor Project to link to that document on the front page. In fact, Iâm curious how to even navigate to that article without googling.
The nodes are picked at random. The entities that can control massive portions of the nodes are basically FVEY. And they donât need to compromise Tor, they have access to more or less the entire backbone and they can do end-to-end correlation anyway. Russia, China, and smaller authoritarian nations canât do any of that, except very rarely.
The Snowden documents sad even the NSA will ânever be able to deanonymize all Tor usersâ, it basically said they sometimes get lucky, but that they canât deanonymize users on demand.
Isnât SimpleX network a chance for a clean slate with public providers who have their reputation tied to not being malicious
Public providers doesnât mean shit, governments have forged ID cards as long as there has been ID cards. With anonymity networks, it boils down to node pool size and chances.
And remember, SimpleXâs solution has nothing to do with onion routing, itâs just a decentralized server network, just like email. You send messages to one server, your peer sends it to another. Your IP address leaks to your server. On fundamental level, itâs not that different different from you using Gmail and peer Office 365, with content encrypted PGP. Content is not readable, but now thereâs two parties that could collect metadata, and if its collected, it can be requested with subpoenas.
[quote=âanon6884803, post:98, topic:19256â]
Isnât a corporate run network more sybil resistant than anonymous volunteer network.[/quote]
We donât even have current or planned SimpleX server pool size available to make that assessment. Letâs talk more when SimpleX server pool exceeds 7,500.
The point was, an application must ALWAYS explain its limitations, even when its 100% production ready.
My point exactly. I want the limitations communicated. As long as SimpleX does not default to Tor, itâs inferior in security compared to apps that default to Tor.
They deserve flak, they get flak, and my critique is just one of the instances of said flak. E.g. Telegram could not give a shit about usersâ actual security. In fact, they have weaponized their cult following to do damage control. Thereâs very little point in criticizing them. But the nice part is, theyâre not a recommendation on PG anyway.
Signal and Tor are harder to persuade, Iâll give you that. But the way I see it, the smaller projects must be the first ones to compete by setting the example. This creates pressure to bigger players to participate.
It stops collecting said content sent over MMS which is more or less dead these days. But endpoint exploitation is something people seem to have entirely forgotten. Hereâs Snowden 10 years ago: https://www.youtube.com/watch?v=743u0pdikbM
The issue was swept under the rug because the industry did not have a solution for it.
Nope. Iâve done free UX testing for them in the past because I like the project. I got two sheets of Cwtch stickers as a thank you. Thatâs it. Iâve also made small contributions / bug reports to other projects like Tor/stem, OnionShare, Tails, and possibly Signal. TFC is my body of work in secure messaging space, and I try to practice what I preach there.
But you are moving goalposts now. You said SimpleX has to choose, that it is an either or question. Now you say it is not as black and white as you painted it. I find that very irritating, since both cannot be true. The social contract required is not just allowing existence of privacy by design systems, it is also not having conventions that force you to disclose private info to family/friends/strangers, not having laws that force you to be truthful irrespective of the cost, etc. I find your definition to be self contradicting.
Please do not present the âthink of the childrenâ argument here. That was not at all my point. It was simply cwtch is not usable for the public that needs secure communication (journalists, activists, etc.). They acknowledge it themselves that unusable tech makes useless tech:
This made adoption of Ricochet a difficult proposition; with even those in environments that would be served best by metadata resistance unaware that it exists [ermoshina2017can] [renaud2014doesn].
I would also request you to not descend into personal attacks like âprivileged positionâ when you know nothing about me. Me criticizing your pet project does not mean you can turn into a name calling white knight for the project. (Notice the ad hominem, others can do it too).
How do you know I am not? Your response reeks on privilege and maybe a personal vendetta against the SimpleX chat project. I advise you to maybe reflect a bit before interacting on the online space.
I agree, I would also like to see it on their website landing page.
Tor is less confident about their abilities than you are. I would also like to have the source for the quote, or are you an NSA insider?
You keep making claims, sources please.
So government can forge identity but not devote resources for forging anonymous networks? Show me one instance of malicious cloudflare with sources. I can share malicious tor nodes for days. Again, lots of bluster not enough sources.
Do you really think network size is the only metric? You must be more knowledgable than most of my professors, they seem to think sybil resistance is not just a direct property of network size. For example, a network that can only be run by national governments and has the ability to exclude anyone else (like the SWIFT system) with only 2 nodes even has more sybil resistance than Tor. I recommend reading on lots of extensive literature written on sybil resistance, rather than just pointing at random numbers.
I agree.
No. Smaller projects that are not able to generate enough marketing or self sabotage themselves for getting a higher moral ground die in oblivion.
Nobody except you has forgotten it. Or do you not keep you with the endpoint hardening happening across entire internet with android iOS becoming more hardened, linux windows macos trying to create secure systems, etc. I would recommend again reading up on the cutting edge rather than using grandmother tales from 20 years ago as proof.
Thanks for clarifying.
More proofs, less hostility is a better approach when you respond again. Thanks for taking the time.
Metadata and content are protected either by the company policy, or by technology itself. Yes youâre right, privacy by design exists at the grace of policy and politics. SimpleX doesnât get to dictate the UK law, but it can make the decision whether user data is a subpoena, or national security request to add a backdoor, away.
Iâm not moving goal posts. Iâm fine with either. Like I said above, Iâm fine with app having no security, if itâs communicated clearly.
My point about tech having no perfect solution for every task was about fundamental limitations of the architecture. SimpleX gets to choose that one too. And its limitations have to be communicated clearly too.
Iâm sorry if you come from toxic environment that lacks boundaries wrt individual privacy. I feel those are very much out of domain of secure messengers. Of course, a screen lock would be a welcome addition. Youâll be pleased to know Cwtch has decent plausible deniability of separately unlocked accounts when correct password is entered.
Iâm not sure if I believe my eyes. Think of the children is basically pro-backdoor argument for CSAM scanning etc. Having a secure messaging app actually walk the talk, is hardly the same thing.
The ermoshina2017can link is broken, and the latter is more general, and doesnât even mention Cwtch, Ricochet, or even Tor. Hardly an argument against UX of Cwtch.
Well the alternative is you fail to see things from the point of view of people in authoritarian countries. Not sure if thatâs any less personal. If your life doesnât depend on the choice of your messaging app, youâre in a privileged position. As am I, Finland tends to be on top of lists wrt human rights. I donât have to worry about my privacy too much, but I wouldnât dream of thinking that applies to others.
Again, TFC is my pet project. Cwtch is the best UX of all the onion routed systems (Briar, Ricochet, OnionShare chats, TFC), so I recommend it when protecting metadata is part of someoneâs threat model.
Oh I didnât know you had an affiliation with a messaging app, by all means do share, I like to see othersâ work.
I live in a rechtsstaat, but Iâve also spent more than a decade with TFC to empower people who have to deal with state hackers. I havenât taken a dime for it. Sorry if thatâs not enough.
Iâve criticized more projects than I can remember. Cryptviser, iMessage, Telegram, FooCrypt, TIME AI (lol), SimpleX, DataGateKeeper come to mind. Itâs funny you try to label it as a crusade.
My mistake for assuming you had actually read the thread youâre replying to. From above:
Yeah I canât prove a negative. Of course, if you have a document available China has the geolocation advantage and infrastructure for their own instance of Upstream program
I will happily update my knowledge. As the image shows, US sits in the middle of international fibers. Not all data flows through the US of course, but a lot does. But data doesnât really flow through Russia or China like it does through FVEY, especially US.
Like I said, FVEY doesnât need to. They can do end-to-end correlation from net backbone. If you have source stating China or Russia runs a sybil attack against Tor, Iâm all ears.
Yeah thatâs not the same thing as compromising an anonymity network. I donât know why youâd even make this argument unless you wanted to just spread FUD. Also, people running malicious nodes are scanning traffic by running exit nodes. Three guesses if Onion service based messengers use exit nodes.
No, but itâs the biggest.
I do not pretend to be an expert on financial systems. Iâm concerned with other attacks with SimpleX. There seems to be 85 servers Unofficial SimpleX Directory - Discover Community-Run Servers of which 38 are onion routed. So that leaves us with 47 non-torified servers that have access to usersâ IP-address. Just over 2% probability that me and my contact use the same server, which means that server can perform a timing attack to determine which two contacts communicate. Or, if thereâs no traffic masking (which I HIGHLY doubt), the chances of multiple users sending an attachment the size of which is 42069 bytes at the same time is quite unlikely. So yeah, I do not like the odds. With Cwtch, thereâs no decentralized servers that can do this type of scanning.
Are you seriously suggesting SimpleX would be self-sabotaging themselves for disclosing their true level of security? Sounds like the project would be getting whatâs coming for it, if itâs current limitations canât stand the light of day.
The thing is, communicating your threat model openly is a massive boost for oneâs image. Youâre open that your system may not be for everyone. And you help everyone to know if the project is for you. SimpleX is a mass-market tool, and the userbase two whom its enough, accounts for a larger portion than its current servers could probably even handle.
My problem is the misleading threat model that lies by omission.
In this post Poberezkin said
We never said [SimpleX has no identifiers], no tech can work without identifiers. What is important though, and itâs a unique quality of SimpleX network, is that SimpleX user profiles are not assigned any distinct identifiers in the network, unlike all other networks do.
So theyâre not assigning additional identifiers. They donât care that your router glues the source IP address field to the TCP header, which is WAY worse than Cwtchâs Onion Address that allows removing the source IP.
Yes thatâs why TFC was only entirely designed around the problem.
I fully agree endpoint security is not in the domain of mass market messengers. I also think threat model should communicate the limitation with something like âTo journalists, activists, dissidents and whistleblowers: Some nation state hackers can compromise your device, and bypass the end-to-end encryption. Unfortunately, thereâs not much we can do about that. If this is a concern, strongly consider using hardened endpoint, setting the self-destruct timer, or leaving the most sensitive discussions to face-to-face meetings if possible.â
It is from the Cwtch website, I thought you had read it.
messaging app
I have no affiliation with any messenger app. I work on less flashy, run of the mill stuff.
Until SimpleX decided to make two servers swap ciphertexts via anonymous credentialsâ?
You said:
king of anonymity systems with no contenders waiting.
I asked if you had proof. You responded by citing something which says âTor is difficultâ. You are claiming Tor as best among alternative solutions, your source says it is among the best. Are you seeing the difference?
Yeah I canât prove a negative. Of course, if you have a document available China
So your threat analysis is based on hunches?
compromising an anonymity network
It is the same for the adversary threat you cite.
Are you seriously suggesting SimpleX would be self-sabotaging themselves for disclosing their true level of security?
No. Maybe you have unfamiliarity with English? I apologize in that case. I was suggesting you keep asking of SimpleX which no other project does. It is self sabotaging to frighten the user away with impossible attacks on the front page. Come back when Signal and Tor do it.
threat model should communicate the limitation
I agree. Did Signal not catch flak for not being clear on that before on social media? Again, you keep holding simpleX marketing and website to higher standards than the ones you cite.
So theyâre not assigning additional identifiers. They donât care that your router glues the source IP address field to the TCP header, which is WAY worse than Cwtchâs Onion Address that allows removing the source IP.
I already agree that they should be more clear with the threat model document.
With Cwtch, thereâs no decentralized servers that can do this type of scanning.
But Tor project itself says this:
Tor canât protect against traffic confirmation (also known as end-to-end correlation), where an attacker tries to confirm a hypothesis by monitoring the right locations in the network and then doing the math.
So if they know you are sending something right now (which they can since cwtch requires both ends to be online last I checked), does it just not make it easier? I am not very clear on what the issue is?
I asked if you had proof.
Again, youâre the one who didnât read the thread.
So your threat analysis is based on hunches?
In the absence of hard data what we have is educated guesses. https://www.submarinecablemap.com/ shows China isnât in a place to run Upstream-like drag-collection Largest part of cables terminate at Hong Kong.
you keep holding simpleX marketing and website to higher standards than the ones you cite.
SimpleX is the one lying by omission in their front page. They donât consider IP-addresses a unique identifier. You seem to ignore that part of my critique consistently. Why?
Risk Model | Cwtch doesnât have inaccuracies, and the front page isnât misleading about what the threat model (or risk model in their lingo) states.
Putting the threat model on front page is good practice, and SimpleX wonât be the only one I will ask. Why Iâm asking SimpleX to do that, is the threat model clearly states
[The server can] perform the correlation of the queue used to receive messages (matching multiple queues to a single user) via either a re-used transport connection, userâs IP Address, or connection timing regularities.
Which is quite different from what the front page says
SimpleX protects the privacy of your profile, contacts and metadata, hiding it from SimpleX platform servers and any observers. Unlike any other existing messaging platform, SimpleX has no identifiers assigned to the users â not even random numbers.
Itâs also not better than what Cwtch offers. Surely you agree SimpleX client isnât improving over Cwtchâs elimination of user deanonymizing identifiers?
So if they know you are sending something right now (which they can since cwtch requires both ends to be online last I checked), does it just not make it easier?
Non-onion SimpleX server serving two conversing users will also always know the queue IDs, it doesnât actually even need to know scan packet sizes. And queue IDs canât be changed without you remaining authenticated to the server, so the IP address can be determined even later if the user forgets Tor/VPN.
Doing that for Tor connections require a government doing end-to-end correlation on all Tor traffic inside the country. Itâs the limit of what proxy chains alone can offer. Protection from it requires traffic flow confidentiality, which very few messaging apps provide. Corporate VPN with IPSEC is the most common place you might see it. TFC has it as optional mechanism. Itâs not impossible to deliver files as smaller chunks that fit the Tor cell size, whenever client polls the server of peer for new messages, but AFAIK Cwtch doesnât do that.
I am not very clear on what the issue is?
SimpleX needs to communicate clearly its threat model, and not make claims itâs eliminating user identifiers better than Cwtch on its front page. Hiding the fact the server has access to usersâ IP address on separate domain, behind four clicks is too much, when the front page implies thereâs âno* identifiersâ, where the asterisk is doing ALL of the lifting by meaning âno added identifiersâ. Yeah sure youâre technically correct, the best kind of correct. IP address isnât being added by SimpleX, itâs added by your router but ask anyone who thought it had no identifiers, if they care about that nuance.
The server builds are now reproducible, so server releases are signed:
See full changelog here. Key to verify release: FB44AF81A45BDE327319797C85107E357D4A17FC Commits: postgres: schema (#1416) postgres: db interfaces wip (sqlite passes) (#1419) postgres: store imple...
The key to verify: keys.openpgp.org
Itâs also not better than what Cwtch offers. Surely you agree SimpleX client isnât improving over Cwtchâs elimination of user deanonymizing identifiers?
No, this is not correct:
In particular, the addition of second layer guard nodes means that the adversary goes from being able to discover your guard in minutes by running just one middle node, to requiring them to sustain the attack for weeks or even months, even if they run 5% of the network.
While this is ok for most users, it is not ok for some users.
Non-onion SimpleX server serving two conversing users will also always know the queue IDs
while server can indeed record all queue IDs used to receive messages from a given IP address, and the only way to mitigate it now is an additional overlay layer and per-queue transport isolation (which is supported in the client), it does not allow servers establishing which IP address connects with which IP address, provided two independent operators are used.
We are considering adding a third layer in message routing, proxying the recipient connections too, so that it will make not only IP correlation impossible but also session correlation (so again, closer to mixnets than to Torâs circuit routing).
SimpleX needs to communicate clearly its threat model, and not make claims itâs eliminating user identifiers better than Cwtch on its front page.
But it 1) does eliminate protocol level user identities, in a way that no other app does 2) it indeed does it better than Cwtch given the above - per connection, and not per profile.
So I am not sure why we should not claim what is factually correct.
IP address isnât being added by SimpleX, itâs added by your router but ask anyone who thought it had no identifiers, if they care about that nuance.
I think that everybody who cares about the level of anonymity we discuss, does understand that nuance very well. I find it strange that privacy experts think that people are idiots. We donât think so.
Tor, in comparison, should certainly be avoided by users donât understand intricacies of its configuration, which nodes and countries to avoid, etc., and none of that is advertised on Tor website. So their position and comms are much more risky and potentially damaging, given a much wider range of users, and that the main assumption of Torâs threat model - node independence - simply doesnât hold any more.
Get maqp post back please, it canât be TOO bad
Mind explaining why it appears twelve of Simplexâs 83 community servers seem to be under single host URI?
There is no server register, and this is not our site. This has been an ongoing experiment with voluntary server listing somebody did, but it wasnât too popular. The servers you can see there are now are servers run by Flux that are preconfigured in the app.
Which if you bothered to read the thread, isnât that unlikely. Thereâs apparently 47 non-torified servers meaning 2% of my contacts will use same server on average at any given moment.
It is unlikely because the client takes the information about the operator into account.
The bottom line is this. You are incredibly naive and stupid if you think government agencies arenât forging IDs to mount a sybil attack in your tiny network. They donât give a damn about your contracts. Like Jesus. The NSA mass surveillance was ruled illegal. The Israeli intelligence sold BOMBS as messaging devices and killed 42 and injured over 4000 with them. They. Donât. Give. A. F. about your policies and with overwhelming probability wonât be ever held accountable if they break them.
Yep. And it is a bit convenient to remove the ultimate adversary, government letters (laws/regulations), from the threat model, too. Xie, a devops/sec blogger I follow, makes the same point you do, but from an end-user pov:
Now letâs take a look at the things Sleve canât control. Generally, Sleve can control the things he does, but he canât control what other people do in response to them. He canât control what other people do, and he has even less control over what the government does. Sure, he votes, but I vote too.
from the looks of it you got told.
Would anyone have a link to the Mastodon thread? There mustâve been a formatting issue here as it doesnât include a link.
I leave with this: I still do not recommend SimpleX.
I know your back and fourth with Evgeny is over but would you mind summarizing the disagreement from your perspective for others (like myself) who either donât quite understand the issue at hand or donât have time to read the full thread? Iâd really appreciate it so I could better decide between SimpleX and alternatives like Cwtch.