schizoidman@lemmy.zip to Privacy@lemmy.mlEnglish · 2 days agoAustrian government agrees on plan to allow monitoring of secure messagingwww.reuters.comexternal-linkmessage-square14fedilinkarrow-up160arrow-down10file-text
arrow-up160arrow-down1external-linkAustrian government agrees on plan to allow monitoring of secure messagingwww.reuters.comschizoidman@lemmy.zip to Privacy@lemmy.mlEnglish · 2 days agomessage-square14fedilinkfile-text
minus-squareUlrich@feddit.orglinkfedilinkEnglisharrow-up2arrow-down1·2 days agoE2EE comms are not monitorable. That’s like, the whole purpose of using them.
minus-squarebndkt@lemm.eelinkfedilinkEnglisharrow-up1·2 hours agoYou just have to infiltrate one end, e.g. the smartphone of one party
minus-squaresunzu2@thebrainbin.orglinkfedilinkarrow-up3arrow-down1·2 days agoArticle talks about Austrian spooks getting tipped about a concert attack by UK spooks that got it from WhatsApp?
minus-squareslackness@lemmy.mllinkfedilinkarrow-up6·2 days agoCan you really talk about E2EE on a closed source app? The whole point of E2EE is I don’t trust the vendor. If they give me a blob as a client and tell me it’s E2EE, am I supposed to just trust them all of a sudden?
E2EE comms are not monitorable. That’s like, the whole purpose of using them.
You just have to infiltrate one end, e.g. the smartphone of one party
Article talks about Austrian spooks getting tipped about a concert attack by UK spooks that got it from WhatsApp?
Can you really talk about E2EE on a closed source app? The whole point of E2EE is I don’t trust the vendor. If they give me a blob as a client and tell me it’s E2EE, am I supposed to just trust them all of a sudden?
Zucc shares the info