• 7 Posts
  • 40 Comments
Joined 5 months ago
cake
Cake day: February 10th, 2024

help-circle




  • mox@lemmy.sdf.orgtoPrivacy@lemmy.mlDoes MATRIX recipients know my IP?
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    8 days ago

    Obviously you need someone joining the room for the room metadata to be shared between homeservers.

    Well then, your assertion that Matrix gives it freely is false.

    Not so with Matrix, where a joining homeserver get full retroactive access to all the room metadata since the room’s creation.

    This is false, too. Historical event visibility is controlled by a room setting. (And if you don’t trust admins of a sensitive room to configure for privacy, then you’re going to have bigger problems, no matter what platform it’s on.)

    Edit: I suppose you might argue that you can bypass this by running your own homeserver and attempting to join the room from it, thereby granting visibility not through joining (as you wrote), but instead through federation with the server you control. The thing is, you can’t do it without permission. Room admins can simply deny your join request when they see what server you’re on. This might make sense in a particularly sensitive room, for example, just as it would to restrict history visibility.

    you really need to stop privacy LARPing

    LARPing? I’m not the one stirring up drama with falsehoods and patronizing snark, am I? Farewell.


  • Matrix stores all this info and gives it freely to other servers retroactively(!)

    Can you show me the part of the spec that allows a server with no room members to get private room info from another server? I’m skeptical, but if true, I believe that would be worth reporting as a bug.

    network layer sniffing (which is anyway much harder to do)

    You’re funny.


  • The network layer of all internet servers reveals almost everything you listed. Signal has the same problem, and there’s nothing they can do about that. The only way to avoid it is to use a completely peer-to-peer model (Matrix has started work on this, btw) and avoid communicating across network routes that can be monitored.

    There might be one exception, depending on what you mean by “Accounts”: The user IDs participating in a room can be seen by server operators and room members. But then again, server operators can already see their users’ IP addresses (which is arguably more sensitive than a user ID), and I believe room members have to be allowed into the room in order to see them. For most of us, that’s fine. Far from a disaster.


  • Human behavior is funny, isn’t it? No matter what the topic, there are always people around who like to repeat criticism they heard from someone else, even if it’s so vague as to be useless (“metadata disaster”) or they don’t understand the details at all.

    It’s not a disaster. A few minor bits of metadata (avatars and reactions, IIRC) haven’t been moved into the encrypted part of the protocol yet. If that’s a problem for your use case, then you might want to choose a platform with different flaws, or simply avoid those features. It’s already good enough for the needs of many privacy-minded folks, though, and it continues to get better.











  • No, I would not say that.

    I used XMPP in the past, but long-lived public server support is almost nonexistent these days, and proper setup/maintenance requires too much tech skill for the general public. Also, it lacks modern features that many people have come to expect. I would only suggest it for small groups, and only if you can run your own server and provide tech support.

    For my needs, Matrix is the best available today. It covers the things that I find most important, and is constantly improving.


  • mox@lemmy.sdf.orgtoPrivacy@lemmy.mlWhat's the best messaging platform?
    link
    fedilink
    arrow-up
    20
    arrow-down
    1
    ·
    edit-2
    25 days ago

    There is no best, because none of them cover every use case or threat model. However, these are worth considering:

    • Matrix, if you don’t mind minor meta-data leaks (reactions and avatars have not yet been moved to the encrypted channel, IIRC).
    • XMPP with OMEMO, if all your contacts are technically skilled enough to manage the requisite clients, servers, and protocol extensions, or if they have a skilled admin to do it for them.
    • Signal, if you don’t mind linking a phone number to your account, can tolerate an ecosystem effectively married to Google, and accept the risks of a centralized service that can be attacked or shut down by someone with the right access or influence.

    In situations where your safety depends on anonymity from the powerful or well-connected, I would instead look for a messaging system tailored for such things. (It would, of course, require giving up some convenient features that most of us expect from a general-purpose chat platform.)



  • Anyone using a forwarding/alias service might also want to search the web for “disposable” email domain blacklists, and petition the maintainers to remove the service you use from their lists.

    These lists are often adopted by web developers, leading to many web sites rejecting forwarding addresses, or sometimes even accepting the addresses and then silently dropping messages while claiming to have sent them. As these lists become more common and widely used, forwarding services are becoming useless on more and more sites.


  • In that situation, I would also:

    • Only use it through a browser (with fingerprinting protection), never a Discord app.
    • Dedicate a browser installation, or at least a user profile, to Discord.
    • Only use it over a VPN connection dedicated to Discord, or Tor if it’s allowed.
    • Have an alternative channel (maybe Matrix?) ready and waiting for contacts who might be willing to switch.