• Ulrich
    link
    fedilink
    English
    1
    edit-2
    1 month ago

    Packet data has headers that can identify where it’s coming from and where it’s going to

    Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

    This is also why something like Tor manages to circumvent packet sniffing

    TOR is what their already-existing tip tool uses.

    • @[email protected]
      link
      fedilink
      English
      21 month ago

      Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

      You mean like your workplace wifi that you’re blowing the whistle at?

      • Ulrich
        link
        fedilink
        English
        11 month ago

        Does it matter? How would you get access to such information?

        • @[email protected]
          link
          fedilink
          English
          1
          edit-2
          1 month ago

          If the header isn’t encrypted it’d be easy to inspect, and thus easy to determine where it goes, which is why it matters.

          Based on your questions, it sounds like you’re expecting the network traffic itself to be encrypted, as if there were a VPN. Does signal offer such a feature? My understanding is that the messages themselves are encrypted, but the traffic isn’t, but I could be wrong.

          • Ulrich
            link
            fedilink
            English
            11 month ago

            If the header isn’t encrypted it’d be easy to inspect

            Easy for whom? How are you getting access to the traffic info?

            • @[email protected]
              link
              fedilink
              English
              11 month ago

              You’re talking about encryption and signal because you’re worried about folks whose network you’re connected to being able to invade your privacy, right?

              I’d say it’s a pretty reasonable suggestion to say we start with those guys. If you don’t worry about those guys, who do have access to traffic info, then why bother with encryption?

              • Ulrich
                link
                fedilink
                English
                11 month ago

                You’re talking about encryption and signal because you’re worried about folks whose network you’re connected to being able to invade your privacy, right?

                LOL no? I’d never blow the whistle on my employer from my desk. Even if I did, I would connect to a different network.

                I recognize other people are not as conscious as I am of that vulnerability but you asked about me, specifically.

                If you don’t worry about those guys, who do have access to traffic info, then why bother with encryption?

                Any number of other people. Primarily the government.

                • @[email protected]
                  link
                  fedilink
                  English
                  1
                  edit-2
                  1 month ago

                  Any number of other people. Primarily the government.

                  Right, so if the header isn’t encrypted, it’d be trivial for them to see who you’re sending to, which is why that’s important.

                  You never answered my question - do you think the network connection itself is encrypted? Or just the content of the messages?

    • I Cast Fist
      link
      fedilink
      English
      2
      edit-2
      1 month ago

      Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

      That, or a court order telling your ISP or mobile operator to allow the sniffing. Or just the police wanting to snoop your stuff because they can. Not every country cares about individual or human rights, you know

      TOR is what their already-existing tip tool uses.

      Yes, but tor can be blocked at a firewall level, its packets are easy to identify. “Nations like China, Iran, Belarus, North Korea, and Russia have implemented measures to block or penalize Tor usage”