TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Session Encrypted Messenger

74 pointsby kuba-orlikover 3 years ago

13 comments

colesantiagoover 3 years ago
It seems encrypted messengers are turning into cryptocurrency ponzi scam projects.<p>Keybase -&gt; Stellar<p>Session -&gt; Oxen&#x2F;Loki<p>Whatsapp -&gt; Diem&#x2F;Novi<p>Signal -&gt; Mobilecoin [0]<p>There really is no defence of introducing this at all and it&#x27;s sad that this is becoming a trend, looks like one has to look at Threema, Wire and possibly Element as our only hope.<p>[0] <a href="https:&#x2F;&#x2F;www.wired.com&#x2F;story&#x2F;signal-mobilecoin-payments-messaging-cryptocurrency&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.wired.com&#x2F;story&#x2F;signal-mobilecoin-payments-messa...</a>
评论 #28719522 未加载
评论 #28718862 未加载
评论 #28719051 未加载
评论 #28716721 未加载
评论 #28718988 未加载
评论 #28720281 未加载
评论 #28723392 未加载
评论 #28716725 未加载
0xdeadb00fover 3 years ago
I&#x27;ve looked into this before a little. But no one seems concerned these guys are located in Australia. We (Australia) have what I&#x27;d call quite frankly, &quot;Awful&quot; encryption and privacy laws.<p>edit: they touch on it here: <a href="https:&#x2F;&#x2F;getsession.org&#x2F;blog&#x2F;on-the-recent-australian-surveillance-legislation" rel="nofollow">https:&#x2F;&#x2F;getsession.org&#x2F;blog&#x2F;on-the-recent-australian-surveil...</a><p>But AFAIK with the news laws nothing is stopping the feds from requesting them to upload a backdoored apk one of these days (if someone can shed more clarity on that, I&#x27;d be appreciative).
AshamedCaptainover 3 years ago
Even though the website looks like yet another &quot;secure messenger scam&quot;, at least these guys check the important checkbox of having a reproducible build available at F-Droid. [or apparently not, see below for more]<p>This check box is actually quite import; I laugh at anyone who promises that &quot;they won&#x27;t reveal identities, not even under a court order&quot; when the court can just force them to ship a silent binary update that does whatever the heck the court wants.
评论 #28716333 未加载
评论 #28716305 未加载
1vuio0pswjnm7over 3 years ago
It is linked to a cryptocurrency called Loki.<p><a href="https:&#x2F;&#x2F;crypto.com&#x2F;price&#x2F;loki" rel="nofollow">https:&#x2F;&#x2F;crypto.com&#x2F;price&#x2F;loki</a>
评论 #28716307 未加载
评论 #28716514 未加载
评论 #28716498 未加载
评论 #28716474 未加载
dhxover 3 years ago
The whitepaper at [1] is more impressive than I expected it to be, not for what is built today (which on a quick read appears to be rather unexciting), but for the class of attacks recognised as unsolved, and identified as requiring future work.<p>Improvements identified include:<p>1) Encrypted messages should have a constant size (padded). Note that the Signal protocol used by Session currently uses variable length messages[2].<p>2) Encrypted messages should be sent as noise by clients through the onion network and back to themselves at random intervals frequent enough that messages to&#x2F;from other parties are statistically indistinguishable to an eavesdropper from the noise generated.<p>3) Intermediate nodes in the onion network should hold and delay encrypted messages so they are adequately mixed before being sent forward. This makes it statistically difficult for an eavesdropper to match up a message entering a node and a message leaving a node. Ideally messages would be mixed across enough nodes of the onion network that to an eavesdropper, the full list of possible destinations is equal to the total number of clients on the network.<p>4) Proof of work should be replaced with a better technique for preventing degradation of service or spam attacks. The paper quite rightly identifies that proof of work would favour Eve who has setup a data center filled with custom ASICs solving proof of work problems, rather than favouring Alice or Bob with an energy efficient mobile phone SoC. CAPTCHAs are identified as a possible future solution to this class of attacks.<p>I doubt those improvements would have much application outside of labs and experiments though. Unless a significant part of the global economy surprisingly becomes dependent on a traffic analysis resistant anonymising protocol, it is too easy to just block such protocols similar to what China does with its Great Firewall.<p>[1] <a href="https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;2002.04609.pdf" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;2002.04609.pdf</a><p>[2] <a href="https:&#x2F;&#x2F;github.com&#x2F;signalapp&#x2F;libsignal-protocol-c&#x2F;blob&#x2F;master&#x2F;src&#x2F;protocol.c" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;signalapp&#x2F;libsignal-protocol-c&#x2F;blob&#x2F;maste...</a>
yewenjieover 3 years ago
There are so many encrypted messaging apps now but none has the feature-parity and convenience of Telegram. The user experience is just unparallel, and it is quite astonishing to see so high-quality software being produced by an actual company these days. However, there are a couple of drawbacks of Telegram which are seriously important to consider<p>- no self-hostable server option (of course they don&#x27;t have a federated model so interoperability will not be easy even if they release the server source).<p>- the encryption protocol is non-standard, does not sync between devices, and is not enabled by default.<p>I would really love it if there is a client-side encryption app which uses established time-tested encryption protocol to encrypt and decrypt messages fully at client side and will just let me use something heavily feature-rich like Telegram for sending the messages.
评论 #28724723 未加载
soziawaover 3 years ago
Session is a cool fork from Signal. They adress the two biggest privacy issues, push tokens and IP addresses.<p>But I can&#x27;t see it gaining too much main stream traction any time soon. Too me it feels like WhatsApp has hit the sweet spot for people who can&#x27;t get themselfes to care about security and privacy.
评论 #28716354 未加载
t0bia_sover 3 years ago
Looks good but it is centralised if I understand correctly. Same weakness as Signal or Threeema. Element [Matrix] should be prefered for decentralisation.
评论 #28723318 未加载
majaxgover 3 years ago
A good implementation in secure messaging app that doesn&#x27;t use meta data at all, ( only a pubkey ) is olvid. <a href="https:&#x2F;&#x2F;www.olvid.io&#x2F;assets&#x2F;documents&#x2F;2020-12-15_Olvid-specifications.pdf" rel="nofollow">https:&#x2F;&#x2F;www.olvid.io&#x2F;assets&#x2F;documents&#x2F;2020-12-15_Olvid-speci...</a>
评论 #28716582 未加载
runawaybottleover 3 years ago
How do we know this is not an FBI honeypot?
评论 #28728024 未加载
unixheroover 3 years ago
Is this Signal killer?
评论 #28716340 未加载
评论 #28716327 未加载
评论 #28716346 未加载
chrisxcrossover 3 years ago
The company&#x2F;main developer seems to have ties to the alt-right <a href="https:&#x2F;&#x2F;nitter.42l.fr&#x2F;WPalant&#x2F;status&#x2F;1281540005190672384" rel="nofollow">https:&#x2F;&#x2F;nitter.42l.fr&#x2F;WPalant&#x2F;status&#x2F;1281540005190672384</a>
评论 #28716703 未加载
评论 #28716759 未加载
评论 #28716742 未加载
评论 #28716790 未加载
encryptluks2over 3 years ago
Looks like a non-standard XMPP clone. XMPP already offers standard encryption.
评论 #28716126 未加载
评论 #28716119 未加载