ramjambamalam

joined 2 years ago
[–] ramjambamalam@lemmy.ca 5 points 1 month ago (1 children)

A highly respected school teacher of mine was known to say, "Say what you mean; mean what you say."

[–] ramjambamalam@lemmy.ca 8 points 2 months ago (2 children)

I haven't tried it yet, but I've seen massive lists of trackers floating around that you can add to your torrents, in case the same torrent is indexed on other trackers, but the torrent file you downloaded doesn't know to search them.

[–] ramjambamalam@lemmy.ca 1 points 2 months ago (1 children)

Serious question: what is a US multinational?

[–] ramjambamalam@lemmy.ca 19 points 3 months ago* (last edited 3 months ago)

I can think of easier ways of compromising the data besides brute forcing the keys, off the top of my head, and I'm just some schmuck. Relevant XKCD: https://xkcd.com/538/

  1. Compromise their endpoint with a malicious app on the app store.

  2. Gain physical access to the device and compromise it. Use your imagination – pickpocket, traffic stop or customs inspection by a compromised agent, seduce them with a honeypot, etc.

  3. Socially engineer them to mistakingly add you to their group chats.

  4. SIM swap

Signal might be fine for journalists, criminals, cheating spouses, and general privacy when used properly with good OpSec but nation state adversaries have significantly greater resources than your average attacker, and thus require more significant security.