Technology
This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.
Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.
Rules:
1: All Lemmy rules apply
2: Do not post low effort posts
3: NEVER post naziped*gore stuff
4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.
5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)
6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist
7: crypto related posts, unless essential, are disallowed
view the rest of the comments
Unless you pissed off an entire nation state I wouldn't worry about signal as long as you encrypt your device and use a password to unlock. Although I believe that some police in the u.s. have some kind of black box for unlocking phones. In that case, I guess you break off your USB port and rely on wireless charging. Even then, they could send the phone to someone to disassemble and pull an image from the device image and try to get in that way.
Pissing off entire nation state or at least people in power in that nation is unfortunately easy these days. And while the average person usually doesn't run into these issues the shrinking spaces and criminalization of civil society even in countries you wouldn't think are that far gone are at the level that surprising people might run into these issues. There are also some situations where you don't need to piss off entire governments to get a lot of data from a person. Tech-savvy abusive spouse might be enough.
We are not really disagreeing here. I just think that we need to be open about the vulnerabilities and strengths of software. The security of Signal and Matrix are absolutely great especially compared to things like WhatsApp. But they are not 100% secure. Very little is.
Agreed. Basically if you know that nobody will have physical access to the device and that nobody who cares has the money to buy a vulnerability from an Israeli firm, then you're good.
I mean you don't even need that now. Anyone can technically do that with a PC and the right payloads. If anything it's best to use the internet as if it has a backdoor.