要自己搵方法/地方記低,否則開唔返backup,亦有被人搵到嘅風險,而backup密碼只係30位密碼
我亦都講過點可以將password / important chats安全地儲存 at little inconvenience (1Password / KeePassXC; Standard Notes / Nextcloud + LibreOffice).
Signal Groups 無人數限制、全部用一個安全嘅protocol to provide E2EE
問心果句,有幾多個人password 長過30 characters?
2. They continued, “Every popular messaging app offers its users some way to back up their messages to prevent data loss.
Messaging apps that
ignore backups (
such as Wickr/
Signal/Confide)
never reach 1M DAU [Daily Active User] and remain niche.”
This is a misleading play of words as Signal could never know how many daily active users they have, as they collect almost no data about their users, as described above.
3. Telegram continues, “users don’t want to lose their entire message history when they lose/change their phones so apps of this kind never become massively popular. […] Secret Chats in Telegram
or their copycat versions in Viber or
Facebook Messenger [...] also provide e2ee and don’t get backed up).” They claim that the “[c]onsequence of people using [niche] apps can be targeted by governments as those who have something to hide. Due to the limited distribution of such apps, the government can identify and track individuals whose phones connect to the corresponding IP addresses.”
It is difficult to see how governments could not track Telegram “Cloud Chat” users since all the chat logs of all users are all permanently stored and logged by Telegram servers in plaintext. In fact, governments can easily subpoena all user data collected by Telegram, and Telegram is legally forced to provide information to government or law enforcement agencies. Edward Snowden’s revelations showed that warrantless searches of private citizens’ records are commonplace and officers in 3-character government agencies can look up such records without even notifying the companies involved. If your service does not even stop mass surveillance, why would government agencies even bother with targeted surveillance?
4. Telegram boldly declares
on January 16, 2017 that “WhatsApp's approach has other architectural drawbacks that invalidate end-to-end encryption for 99% of private conversations” (
https://telegra.ph/whatsapp-backdoor-01-16),
citing an exaggerated news piece from The Guardian, which editors later admitted lacked technical proofreading, that there was a “backdoor” in WhatsApp. This claim caused an outcry amongst 72 security researchers and was likened to the ludicrous claim that “VACCINES KILL PEOPLE” (
https://web.archive.org/web/20190724011112/http://technosociology.org/?page_id=1687 and
https://signal.org/blog/there-is-no-whatsapp-backdoor/). It is extraordinary that Telegram, a company that appeals to authority by claiming to be consisted of elite PhDs everytime someone poses technical challenges against their MTProto, could conjure the claim that 99% of WhatsApp chats are insecure, and this was soundly refuted by the researchers:
“The imagined attack on WhatsApp […] is a remote scenario requiring an adversary capable of many difficult feats. Even then, the threat would involve
only those few undelivered messages, if they exist at all, between the time the recipient changes their phone and the user receives a warning.
In the full scheme of things,
this is a small and unlikely threat. The preconditions of the attack (which is not a backdoor) would in practice mean that
the attacker had many other ways of getting at their target.”