![]() Of course, since the data on Facebook exists in theĬlear and we now know of PRISM, that is rather pointless when using Facebook. This has become the default behaviour of most TLS/SSL links, so it even applies Target for man-in-the-middle attacks) given the difficulty toįorward Secrecy: Traffic between endpoints cannot be decryptedĪt some later point in time if access to the private key was gained. Interserver interactions, that unfortunately is frequently an easy Federated systems use link encryption also in their You can activate this withįacebook by using the https: prefix, or, even better, by using the Tor service The involved machines can read in on your activity. Your Internet connection, the Internet backbone or anyone hacking into any of Link Encryption: Without it, anyone operating your DSL router, local network, = isolated server-based installations operated in a trustworthy manner using a Tor onion service = Federated Social Web projects like Mastodon, Pleroma, Diaspora, Friendica and several more SVPN = SocialVPN, an XMPP-based tool that establishes virtual private networks among friends = XMPP-based open source federation projects such as Budd圜loud, movim = Faceboogle = Most web-based social network services including Facebook, Human Connection, Google+ etc Try to use them in combination with one of the proven technologies: by transmittingĪTTENTION: The symbols used in the tables below are explained in the LEGEND on the left hand side of the screen. If you have any doubts on the degree of reliability of these tools, you can always Ricochet operating in P2P over Tor rather than OTR over XMPP. Still, some things are more likely to be safe by architectural design, like This should be consideredĪn incentive to do so, since we need more advanced tools as soon as possible. Have not been sufficiently audited for safety. Many technologies mentioned here for "best current practice" however GENERAL WORD OF WARNING: PGP, OTR and Tor have all somehow proven to beĬryptographically secure for certain appropriate purposes, and within certain Unfortunately public understanding, traditional pride and motivation is lagging behind scientific rationality whereby there is currently more work being invested in old-fashioned federated rather than in distributed technologies. In other words, distributed and federated are opposites – you can't have both – and distributed crypto-routing architectures are the ones we should invest our efforts on as none of the other approaches deliver the needed security properties. Good distributed systems take metadata-protecting measures typically by onion routing or bulk storage ( consensus, blockchain).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |