If any of you have been browsing r/privacy lately you would have come across the British student who had the Air-force literally swarm the flight he was on. This is because he made some joke about a bomb sitting in an airport.

Current speculation suggests that Snapchat has a word-filter and could locate the IP as that of an airport, and notified authorities immediately. Another, somewhat less plausible reason posited is that the government holds the private keys for TLS-encrypted traffic for Snapchat and could decrypt and read the message and that’s how they knew.

For the paranoid people here: the latter claim, even if it is not true, poses great concern to us. If im may be permitted to run with it; It essentially means that using a public CA isn’t exactly safe anymore. For all of you homelabbers using Let’s Encrypt - think again. Don’t listen to me, I don’t understand certificates well.

Talking on a tangent: let us consider the position of TOR. It has been said that TOR devs accommodate the government and the government has backdoors built in TOR. And even if they didn’t, the technique of owning a majority of instances running TOR nodes will allow them to identify and associate traffic. TOR is not safe if you want to really keep your content private. On a similar vein, I am a bit skeptical of the privacy advantages of using session, but I have yet to read their whitepaper.

I haven’t read much about i2p, but I wouldn’t be surprised if the government has their paws in there too.

What are you doing to browse and communicate privately today?

  • TheOneCurly@lemmy.theonecurly.page
    link
    fedilink
    English
    arrow-up
    13
    ·
    10 months ago

    I don’t believe it’s possible for a CA to decrypt TLS traffic with their private keys. They sign a site’s public key with their own private key after verification but are never given the private key itself. Public CAs only provide identity verification, they do not take part in the encryption process itself. Let’s Encrypt is perfectly safe in that regard.

    • N0x0n
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      10 months ago

      Yep, until you find out who owns the most widely used elliptic curves…

      That’s exactly what’s going to happen here in the EU, CA for europe with special EU elliptic cruves with known weakness to spoof on the traffic !

  • lemmyreader
    link
    fedilink
    arrow-up
    6
    ·
    10 months ago

    The Snapchat has a word-filter suggestion makes most sense. But then again Cloudflare is very popular on the Internet as the cheap and well-known MITM anti-DDOS tool.

    I haven’t read much about i2p, but I wouldn’t be surprised if the government has their paws in there too.

    You will have to trust something if you want to communicate, there’s also GNUnet, ZeroNet, DeltaChat, and probably a lot more.

    • MigratingtoLemmy@lemmy.worldOP
      link
      fedilink
      arrow-up
      2
      ·
      10 months ago

      Ah, I completely missed this. Of course they use Cloudflare, perhaps the biggest MiTM-service on the planet.

      Thanks, this makes a lot of sense