I’m aware of what end-to-end encrypted means in a technical sense, but does the lack thereof guarantee the messages are just plaintext readable to whoever’s manning the machine?

My guess is yes but I’ve been known to have wildly incorrect guesses so I want to double-check.

  • bamboo@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    30
    ·
    15 days ago

    Probably yes. General rule of thumb is if you don’t control the keys, it doesn’t matter if it’s E2EE, your communications could be intercepted. Famously iMessage is E2EE but your keys are uploaded to iCloud under standard data protection. They say “Your iCloud data is encrypted, the encryption keys are secured in Apple data centers so we can help you with data recovery, and only certain data is end-to-end encrypted.” [1]. The encryption key is included in iCloud backups which is provided to law enforcement with a subpoena. [2]

    Even if a service claims it is E2EE, it’s still important to understand where that those encryption keys are stored, how they’re managed, and if security researchers have raised concerns about the E2EE claim.


    1. https://support.apple.com/en-us/102651 ↩︎

    2. https://appleinsider.com/articles/20/01/21/what-apple-surrenders-to-law-enforcement-when-issued-a-subpoena ↩︎

  • chemical_cutthroat@lemmy.world
    link
    fedilink
    arrow-up
    13
    ·
    15 days ago

    Technically yes. Likely they still use Transport Layer Security that will encrypt the messages in transit, but that encryption is controlled by the company, and not the end user. What that means is that your messages are safe from randos in the cafe on the same wifi as you, but if the company wanted to, they could read them. It also means that if messages are subpoenaed then they can hand over the unencrypted messages to the authorities.

    I tried looking at their documentation to see what was going on under the hood, but there were a lot of connection errors and dead ends. They seem to be open source, though, so if you are so inclined you can comb through their code to see what kind of encryption they use.

    Personally, I’d stay away. It doesn’t seem like something that I could put my trust in.

    Edit: Upon further inspection, I can see that they host on third party servers likely in plain text. That means that these third party hosts have access to your information, too. I’ll go ahead and take this opportunity to double down on not trusting this company with my memes.

  • floquant@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    3
    ·
    14 days ago

    It’s better to be on a server that is encrypted but not E2E if the admin is someone that is well intentioned and abides by the sudo oath, than on a corporate “E2E” platform where they manage your keys themselves