User Controls

Secure messaging software

  1. #1
    netstat African Astronaut
    edited for privacy
  2. #2
    -SpectraL coward [the spuriously bluish-lilac bushman]
    ICQ.

    https://icq.com

    Over 20 years in the business. They have all the security holes pretty well boarded up.
  3. #3
    Star Trek VI: The Undiscovered Country Dark Matter [my scoffingly uncritical tinning]
    Originally posted by -SpectraL ICQ.

    https://icq.com

    Over 20 years in the business. They have all the security holes pretty well boarded up.

    Literally an Israeli company linked (via Odigo) to 911.
  4. #4
    -SpectraL coward [the spuriously bluish-lilac bushman]
    I learned a lot about hacking from the ICQ network, by using them as a kind of guinea pig for my penetration tests and such. They used to be really shitty and stupid about their security, but now they're pretty top notch, probably because they got fucked over so many times.
  5. #5
    Misterigh Houston
    IRC
    The following users say it would be alright if the author of this post didn't die in a fire!
  6. #6
    Sudo Black Hole [my hereto riemannian peach]
    jabber, signal, wickr or ideally a ciphertel phone
  7. #7
    Snapchat is fun cause of all the enhamcementings but voxxer is funne too

    300 bit encryption

    One awesome thing about Snapchat is the tokens and it self restricts the message after its been seen
    The following users say it would be alright if the author of this post didn't die in a fire!
  8. #8
    WhatsApp :)
  9. #9
    Star Trek VI: The Undiscovered Country Dark Matter [my scoffingly uncritical tinning]
    Originally posted by Fox WhatsApp :)

    Ugh, triggered
  10. #10
    Splam African Astronaut
    Originally posted by Misterigh IRC

    IRC DCC encrypted chat. Safest. Easiest. One exe file and you send messages via IP.
  11. #11
    Sophie Pedophile Tech Support
    If XMPP is not an option maybe TorChat? It creates a local hidden service for you and for your friend as far as i understand it. Since it goes from hidden service to hidden service that's 6 hops. Not bad.
  12. #12
    aldra JIDF Controlled Opposition
    the Russian government has been trying for a long time to force Telegram to backdoor itself but they seem to understand encryption and technology in general even more poorly than the boomers populating western governments so I seriously doubt it's an issue
  13. #13
    Lanny Bird of Courage
    Signal is defacto centralized and you should be concerned about using it.

    Tox actually seems pretty good and the UI is what I would consider mainstream consumer ready. But I mean I haven't audited it or anything so who the hell knows.
  14. #14
    Sudo Black Hole [my hereto riemannian peach]
    Originally posted by Lanny Signal is defacto centralized and you should be concerned about using it.

    Tox actually seems pretty good and the UI is what I would consider mainstream consumer ready. But I mean I haven't audited it or anything so who the hell knows.

    what's a problem with the centralization of signal? Do you mean communication could be intercepted but past messages are gone forever?
  15. #15
    A College Professor victim of incest [your moreover breastless limestone]
    they store the messages on cassette tapes this is where the term mix tape comes from becuase when they run out of storage it will put some other guys message over part of your message - "mixed" they dont change the encryption hash enough either some intern can literally run off with all the tapes and theres nothing you can do about it it will just say theres been "an error" or play a mix tape
  16. #16
    Originally posted by Lanny But I mean I haven't audited it or anything so who the hell knows.

    you havent audited it but you wonder who else knows ?

  17. #17
    Misterigh Houston
    What is wrong with using IRC?

    You can easily set up a small sever. I actually have code for a small IRC server that can be ran on a rPi or even a phone with root access. Very small amount of C code that could be modified.

    I was actually wanting to set some of these up in hotel rooms, leeching off of their WIFI and electricity. Hidden inside appliances in the room. Running a TOR service, with SSH enabled for remote modifications. An army of these...
  18. #18
    Lanny Bird of Courage
    Originally posted by Sudo what's a problem with the centralization of signal? Do you mean communication could be intercepted but past messages are gone forever?

    Well it is e2e encrypted so key exchange aside you should be fine in terms of interception. But a central server knows who you're communicating with and when, even if not what's being said, and your ability to use signal is predicated on that central server being up.
    The following users say it would be alright if the author of this post didn't die in a fire!
  19. #19
    Splam African Astronaut
    Originally posted by Misterigh What is wrong with using IRC?

    You can easily set up a small sever. I actually have code for a small IRC server that can be ran on a rPi or even a phone with root access. Very small amount of C code that could be modified.

    I was actually wanting to set some of these up in hotel rooms, leeching off of their WIFI and electricity. Hidden inside appliances in the room. Running a TOR service, with SSH enabled for remote modifications. An army of these…

    Don't even need a server. Just DCC to IP. Have a list of IPs to your buddies.
    The following users say it would be alright if the author of this post didn't die in a fire!
  20. #20
    Sudo Black Hole [my hereto riemannian peach]
    Originally posted by Lanny Well it is e2e encrypted so key exchange aside you should be fine in terms of interception. But a central server knows who you're communicating with and when, even if not what's being said, and your ability to use signal is predicated on that central server being up.

    knowing who is communicating with whom isn't very useful to law enforcement unless it's the most circumstantial of circumstances, and you can basically use any number you can get an sms on once to verify a number so there's really no identifying information between parties. If the central server wasn't up you could tell right away and messages wouldn't be sent, not that they wouldn't be encrypted.
Jump to Top