Especially for the less tech-savvy among us?

    • @[email protected]
      link
      fedilink
      63 months ago

      They probably meant tech-savviness compared to other Signal alternatives.

      Although even then XMPP with modern clients is simple enough for my mom to use, so I don’t entirely buy the “complication” argument either.

      • @[email protected]
        link
        fedilink
        English
        63 months ago

        is simple enough for my mom to use

        The bar is so low. I just had to visit somebody today to help them fix their computer. There was dirt on the fingerprint reader, and they forgot their password. I told them their password was their user name. I.e. hunter / hunter and it didn’t work… (I chose this because of their modest tech experience)

        They were using hunter / Hunter instead.

        • @[email protected]
          link
          fedilink
          43 months ago

          Idk, I meant my personal experience. She doesn’t see much difference between ease of use of her XMPP client compared to, say, Whatsapp.

    • sunzu2
      link
      fedilink
      113 months ago

      It is a centralized weak point that US feds can easily extract meta data from to obtain your social network etc

      • @[email protected]
        link
        fedilink
        103 months ago

        A bigger weak point is having weak encryption like Session has. Also, you cannot obtain metadata from Signal. They’ve gone to great length to prevent that. Signal servers don’t even know who is talking to whom.

      • @[email protected]
        link
        fedilink
        113 months ago

        easily extract metadata

        That’s a pretty big claim to make with zero additional information.

        Since 2018, Signal has been encrypting the sender data with a key that isn’t known to the server. Messages do not contain unencrypted metadata. I’m not sure how you expect the FBI to do this with the information available to the Signal servers.

        • @[email protected]
          link
          fedilink
          23 months ago

          I am pretty sure that if asked, the serverside protections can be circumvented - I think in one Github issue they even confessed that Sealed Sender is not bulletproof and is “best effort”. I prefer to assume that if everything goes through a single server, and they know what and when each account does upon connecting - they can correlate the identities if they want to.

          • @[email protected]
            link
            fedilink
            43 months ago

            I am pretty sure that if asked, the serverside protections can be circumvented

            No, they literally cannot. The entire protocol is open sourced and has been audited many times over.

            One of the fundamental things you assume when designing a cryptosystem is that the communication link between two parties is monitored. The server mostly exists as a tool to frustrate efforts by attackers that have network dominance (i.e. secret police in oppressive regimes) by not allowing signals intelligence to extract a social graph. All this hypothetical attacker can see is that everyone talks to a server so they can’t know which two people are communicating.

            The previous iteration, TextSecure, used SMS. Your cellular provider could easily know WHO you were talking to and WHEN each message was sent. So SMS was replaced with a server and the protocol was amended so that even the server has no way of gaining access to that information.

            The sealed sender feature is something that the client does. It was best effort because, at the time, they still supported older clients and needed backwards compatibility. This is no longer the case.

          • @[email protected]
            link
            fedilink
            33 months ago

            at role does the signal server play?

            If this is a question that you need answered then I’m not sure you’re qualified to declare that Signal is insecure.

    • chi-chan~
      link
      fedilink
      13 months ago

      Because his grandma can’t type a password 30 characters long just to restore her messages.

      They are so smart and still make some choices that are so, so, *so dumb*. ‘No history on a new PC for you, it’s a ״feature״’. Seriously? c’mon.

      • @[email protected]
        link
        fedilink
        103 months ago

        History isn’t stored on the server so it can’t be automatically populated on a new device. That is a feature. The alternative, storing the messages on the server or having the means for one device to clone all of its messages to another device, would be insecure.

        A 30 character long password is required in order to have enough bits of entropy so that the backed up messages are actually secure.

        Grandma isn’t moving her data to a new PC without assistance, the person that is assisting her should be competent enough to operate Signal.

  • Sonalder
    link
    fedilink
    123 months ago

    I think that SimpleX is more innovative and ground-breaking than Session.

    • irotsoma
      link
      fedilink
      83 months ago

      But it’s a difficult concept for the average person to not have an account, but everything is device oriented. Same problem with people not using gpg for email. Having to maintain a thing similar to a private key that’s not memorizable like a username and password and back that up in case your device is lost. Is a big hurdle for many. And then additionally having to share a qr code or link through some external means for someone to connect with you rather than just telling them to download an app and enter your username HSS always been difficult.

      So, IMHO, Signal has the best implementation possible with the level of usability that many nontechnical people expect in a chat application, even if it’s not the most secure. I am interested to see how SimpleX solves these issues in the future, though.

      • Sonalder
        link
        fedilink
        33 months ago

        Of course it is, that’s the innovating part of it ! My opinion was that I rather use SimpleX if I wanted to switch away from Signal, if not I’ll simply use Signal not Session. But my threat model isn’t everyone’s.

        I think as people will be more educated on cryptography in there digital lives we will have better UX to the point of it not be as difficult as sending on e-mail in the late 80s. Innovation like Bitcoin, nostr, U2F, passkeys etc… will be more accessible over time. Today sending a message on Signal is infinity more easy, secure and private than the majority of e-mails of the 21th century.

        • irotsoma
          link
          fedilink
          33 months ago

          Yeah, I just meant people are used to decades of using meaningful usernames. Having to use a cryptographic key has traditionally made it very difficult to get enough people to adopt to make it worth adopting yourself as a technologically savvy person. I never would have used Facebook in a million years if it wasn’t for the fact that it was the only place I could get in touch with many people. Having to build your networks in-person is tedious for many people and sharing the codes securely through other means is cumbersome if you don’t have an existing method for sharing.

          Just like HTTPS needs several layers to make it work and still relies on an untrustworthy and corruptible thing like DNS to verify the destination and it’s keys are the thing you’re expecting to connect to. There’s no secure way to share the route to your device electronically in a user-accountless system with no secure, trusted middleman translating names to addresses unless you do it in-person.

    • umami_wasabi
      link
      fedilink
      4
      edit-2
      3 months ago

      Use separate profile for different devices. Make a group when you chat with others.

    • Alas Poor ErinaceusOP
      link
      fedilink
      English
      33 months ago

      Grr! Ok, but damned if I could get that to work! It seems like you can’t use the desktop and mobile client at the same time! You have to scan a QR code to switch between them! And it has issues with firewalls and VPNs! Old and clueless here, maybe part of the problem. 🙁

      • Sonalder
        link
        fedilink
        33 months ago

        Yes SimpleX isn’t mature from a UX perspective and that is due to it’s innovative approach. If you need to have device sync and don’t want Signal, Session could be a better optioon to you.

        • Alas Poor ErinaceusOP
          link
          fedilink
          English
          13 months ago

          Am I right tho about having to scan QR codes to go back and forth between desktop and mobile on SimpleX, or am I just 😵‍💫?

        • Alas Poor ErinaceusOP
          link
          fedilink
          English
          43 months ago

          I didn’t have an issue with fireballs either, thankfully, because I made my saving throws before they got to me.🔥😉

      • @[email protected]
        link
        fedilink
        43 months ago

        I just have two identical but independent profiles. They also double as my remote copypaste buffer.

  • Hanrahan
    link
    fedilink
    English
    123 months ago

    Session is an Australian conpany afaik. The entire app reeks of entrapment. Australian laws are all about no privacy for you.

    • @[email protected]
      link
      fedilink
      English
      23 months ago

      Briar doesn’t make sense to me because you’re trading a central server for a central service… If tor is down, you can’t message. It’s the same POF as cellular, which is insane to me.

        • @[email protected]
          link
          fedilink
          English
          13 months ago

          You’re missing the point. Of course tor is decentralized, but the tor protocol can be locked at which time you have no connectivity at all… Your super secure messenger doesn’t work. It makes no sense.

            • @[email protected]
              link
              fedilink
              English
              4
              edit-2
              3 months ago

              Unless you obfuscate tor traffic, it’s trivial to block it via any number of IDS products. The entirety of public tor exit nodes are publicly available: https://check.torproject.org/torbulkexitlist

              Here’s tor exit node blocking in production with 14 lines of bash

              It’s significantly easier than you’ve obviously been led to believe. When it becomes not easy is when someone understands the protocol and understands how to circumvent these measures, but I can assure you that 99.8% of all tor users don’t fall within that category…

              • @[email protected]
                link
                fedilink
                43 months ago

                Bridges are trivial to use tho. And even if they get blocked too actively, a lot of people in such censored regions have a VPN anyway (although I still don’t have an understanding whether a VPN decreases Tor’s security if used like this.

              • @[email protected]
                link
                fedilink
                13 months ago

                oh sure, but you can get around these blocks and this sort of block is ultimately always a possibility short of building your own network infrastructure. and as blocks like that become more common it becomes more common to circumvent them too.

                “significantly harder than youve been lead to believe”, no, you just werent clear in your description of the problem. if your problem with tor is “governments can play whack-a-mole blocking ips and traffic” there is no technology which doesnt have that as a downside.

                • @[email protected]
                  link
                  fedilink
                  English
                  23 months ago

                  but you can get around these blocks

                  They create a better ad, so they create a better adblock, which forces them to discover anti-adblock methods, which forces adblocker’s to adapt, which forces anti-adblocker’s to adapt, ad infinitum.

                  This isn’t anything new. Of course you can circumvent these blocks, but they can always adapt to make them useful again. It’s not a good argument at all.

        • @[email protected]
          link
          fedilink
          English
          23 months ago

          It’s also a specific procol, which can absolutely be blocked. I don’t know where this notion that it’s impossible to block tor because it was designed to be censorship resistant came from, but you can absolutely stop people from using it.

          It’s not even that hard and there’s nothing end users can do about it if they don’t know how to circumvent it…

          • @[email protected]
            link
            fedilink
            43 months ago

            Being able to be blocked is a completely different thing than being centralized service.

            […] there’s nothing end users can do about it if they don’t know how to circumvent it…

            I mean, if users don’t know how to circumvent something, by definition there is nothing that they can do about it.

            However, unless this hypothetical censoring country is blocking all encrypted network traffic it is trivial to access TOR via a VPN or an SSH tunnel

          • @[email protected]
            link
            fedilink
            43 months ago

            It can be blocked, but blocking bridges is a constant whack-a-mole (especially now that they have Webtunnel which, while apparently not as robust as some dedicated obfuscation solutions, is still a noticeable improvement). My bigger problem with Briar is that both recipients have to be online to message, or you have to set up a “mailbox”.

  • foremanguy
    link
    fedilink
    253 months ago

    The real alternative to Signal for myself is SimpleX. The project is still in his beginning but it’s the best instant messaging we could have once polished finished

  • Em Adespoton
    link
    fedilink
    173 months ago

    As a centralized system, nothing has been shown to improve on Signal yet. For decentralized systems, I haven’t seen anything better than Matrix yet? SimpleX is slightly more secure, but harder to spin up and easier to break.

    Session… there have been multiple articles written on how it is flawed and untrustworthy.

    • @[email protected]
      link
      fedilink
      113 months ago

      “Harder to spin up”? Hard disagree. Matrix’s main server implementation is very resource-heavy, and alternatives like Conduit are not full-featured (and broke in some ways for me when interacting with mateix dot org). Meanwhile Simplex servers are pretty light and aside from a couple errors in the documentation that took a while to figure out, it has been easier than Conduit. And unlike Matrix, it has never broken for me so far.

    • Sonalder
      link
      fedilink
      93 months ago

      Matrix is not decentralized but rather federated and distributed. Also synapse (matrix sevrer) have poor performance, especially when you federate your instance to others.

      • @[email protected]
        link
        fedilink
        2
        edit-2
        3 months ago

        What do you mean poor performance ?

        My synapse used to run on a 5€/mo VPS besides other stuff and ran fine and now runs on one of my on-premise servers (and not even my fastest, just some old ryzen 2700) with A BUNCH of other stuff besides it. Multiple users, a bunch of large federated rooms, bridges to other messengers … And it just runs fine with 0 issues.

        Are you talking about running a synapse server for like a thousand people or on absolute potato hardware or what is the issue ?

        • Sonalder
          link
          fedilink
          13 months ago

          I’m not running a Synapse server myself so I can only speak on behalf of people I know who are. From what they told me they love the matrix protocol but it’s not the same for the synapse implementation. A non-federated server can have somewhat great performance but a federated one was not worth it for them so they decided to switch to another alternative. They are not running for thousands of users more something like 40 I would say and while I don’t know their server specs, I assume it’s not a potato though.

  • @[email protected]
    link
    fedilink
    English
    53 months ago

    Not sure, I’ve never used session but I think less tech savvy people would want to use signal because it is similar to Whatsapp, which they are used to.

  • @[email protected]
    link
    fedilink
    73 months ago

    The main turnoff for me is that it is essentially impossible to selfhost - you use random nodes from the network, and to host such a node, you have to lock up a whole fortune (last time I looked I remember it being around $1500, might’ve changed) in their own cryptocurrency. They do promise returns, but I am skeptical - where would they take so much money to guarantee compensation for everyone within a sane amount of time? They claim it is against a Sybil attack, but it seems to me that it would be a lot easier for a government/company to have more nodes in a situation when “competition” is reduced like this.

    • Alas Poor ErinaceusOP
      link
      fedilink
      English
      43 months ago

      Selfhosting is kind of hard and labor intensive for some of us; had a lot of trouble trying to set up NextCloud on my QNAP (if that counts as selfhosting), and finally gave up.

      • @[email protected]
        link
        fedilink
        43 months ago

        Fair - I was referring to the fact that here it isn’t even an option.

        Also, XMPP or Simplex are very easy to set up, Nextcloud is indeed more complicated.

  • @[email protected]
    link
    fedilink
    63 months ago

    I used to think session is a way to go, but now…well simplex is literally all you need for communication with anyone

  • @[email protected]
    link
    fedilink
    43 months ago

    You can easily re-roll usernames in Signal, and profiles in SimpleX. I couldn’t find an equivalent feature in Session.