• ramenu@lemmy.ml
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    21
    ·
    4 months ago

    What? How is this a red flag? Having third party clients is not good for security.

    • doctortran@lemm.ee
      link
      fedilink
      English
      arrow-up
      14
      arrow-down
      3
      ·
      edit-2
      4 months ago

      Having third party clients is not good for security.

      If the first party provider told you this, you should always second guess them.

      Moreover, providing an option that informed users can choose doesn’t hurt security. This idea the user can’t be trusted to use the appropriate type of messaging if provided options needs to die.

      • ramenu@lemmy.ml
        link
        fedilink
        English
        arrow-up
        23
        arrow-down
        4
        ·
        4 months ago

        When you use a client, you are relying on the client’s crypto implementation to be correct. This is only one part of it and there’s a lot more to it when it comes to hardening the program. Signal focuses on their desktop and mobile clients and they hire actual security professionals and cryptographers (unlike the charlatans in this thread) to implement it correctly.

        Having third party clients would not definitively mean the client is bad, but it most likely would break the security model. Just take a look at Matrix’s clients.

        • ReversalHatchery@beehaw.org
          link
          fedilink
          English
          arrow-up
          11
          arrow-down
          2
          ·
          edit-2
          4 months ago

          When you use a client, you are relying on the client’s crypto implementation to be correct.

          Nothing prevents this other client from using the same as the original app. When the alt client is just a fork, it’s even easier to check if they kept it intact or not.

          This is only one part of it and there’s a lot more to it when it comes to hardening the program.

          Something at which even the original Signal fails. It has received criticism multiple times (1, 2) for not being verifiable whether it’s been tampered with by the app’s distributor, and also for having included properietary google services dependencies which dynamically load further code from the phone which is also a security issue. Worthy forks solve both of these.

          Signal focuses on their desktop and mobile clients and they hire actual security professionals and cryptographers (unlike the charlatans in this thread) to implement it correctly.

          Last I heard (a month or so ago) the desktop client had serious unfixed issues.


          I think it further erodes your point that Signal is not just hostile in terms of not wanting it, but Moxie for instance has been very, very verbal about this.

          • ramenu@lemmy.ml
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            4 months ago

            Something at which even the original Signal fails. It has received criticism multiple times (1, 2) for not being verifiable whether it’s been tampered with by the app’s distributor, and also for having included properietary google services dependencies which dynamically load further code from the phone which is also a security issue. Worthy forks solve both of these.

            That’s unfortunate. I do hope that these forks don’t go and start making extensive changes though, because that’s where it becomes a problem.

        • poVoq@slrpnk.net
          link
          fedilink
          arrow-up
          10
          arrow-down
          5
          ·
          edit-2
          4 months ago

          No, if your system can’t support 3rd party clients properly, it is inherently insecure, especially in an e2ee context where you supposedly don’t have to trust the server/vendor. If a system claims to be e2ee, but tightly controls both clients and servers (for example WhatsApp), that means they can rug-pull that e2ee at any point in time and even selectively target people with custom updates to break that e2ee for them only. The only way to realistically protect yourself from that is using a 3rd party client (and yes, I know, in case of Signal also theoretically reviewing every code change and using reproducible builds, but that’s not very realistic).

          Now admittedly, Signal has started to be less hostile to 3rd party clients like Molly, so it’s not as bad anymore as it used to be.

        • UltraGiGaGigantic@lemmy.ml
          link
          fedilink
          English
          arrow-up
          5
          ·
          4 months ago

          Appreciate the link. I still believe in Matrix, even if the client ecosystem isn’t there yet. There HAS to be something to replace discord, the enshitification has already begun.

        • ahal@lemmy.ca
          link
          fedilink
          arrow-up
          8
          arrow-down
          3
          ·
          4 months ago

          Excellent point! If I’m sending someone information that could get me killed if it were intercepted by the state, I’d sure as hell want some guarantees about how the other side is handling my data. Disallowing third party clients gives me at least one such guarantee.

          • doctortran@lemm.ee
            link
            fedilink
            English
            arrow-up
            7
            ·
            edit-2
            4 months ago

            You have absolutely zero guarantees, with or without their policy on third party apps. You can not send sensitive information to someone else’s phone and tell yourself it couldn’t possibly have been intercepted, or that someone couldn’t get ahold of that phone, or that the person you’re sending it to won’t take a screenshot and save it to their cloud.

            A lot of software nowadays is doing a real disservice to their users by continuing to lie to them like this by selling them the notion that they can control their information after it has been sent. It’s really making people forget basic information hygiene. No app can guarantee that message won’t be intercepted or mishandled. They can only give you tools to hopefully prevent that, but there are no guarantees.

            Moreover, this policy does not exclude them from including third-party functionality and warning the user when they are communicating with somebody that isn’t using encryption.

            Too many of these apps and services are getting away with the “security” excuse for what is effectively just creating a walled garden to lock users in. Ask yourself how you can get your own data out of these services when you decide to quit them, and it becomes more apparent what they’re doing.

            • rottingleaf@lemmy.world
              link
              fedilink
              arrow-up
              2
              ·
              4 months ago

              A lot of software nowadays is doing a real disservice to their users by continuing to lie to them like this by selling them the notion that they can control their information after it has been sent. It’s really making people forget basic information hygiene. No app can guarantee that message won’t be intercepted or mishandled. They can only give you tools to hopefully prevent that, but there are no guarantees.

              Oh, yes. These “deleted messages”, or these “hidden likes”, or whatever else.

              I mean, there are fundamental things and algorithms allowing to create such a system, with blinded keys, ghost keys and what not, only these disgusting cheats have a centralized service where any employee can see everything, yet pretend that they have “a security feature”.

            • ahal@lemmy.ca
              link
              fedilink
              arrow-up
              2
              arrow-down
              1
              ·
              4 months ago

              Of course, I fully agree! My point was just that you can eliminate the risk of poorly implemented cryptography at the endpoints. Obviously there’s a thousand and one other ways things could go wrong. But we do the best we can with security.

              Anyway apparently third party clients are allowed after all? So it’s a moot point.

            • ahal@lemmy.ca
              link
              fedilink
              arrow-up
              2
              arrow-down
              1
              ·
              4 months ago

              You do if third party clients aren’t possible? You have control over what client the receiving end is using.

              But apparently third party clients are possible, so it’s moot.

        • Possibly linux@lemmy.zip
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          4
          ·
          4 months ago

          Signal third party clients base off the Signal code base. They just add patches and remove certain dependencies. Also they are often more secure. You logic is from the Apple PR department.

          • ramenu@lemmy.ml
            link
            fedilink
            English
            arrow-up
            2
            ·
            4 months ago

            Again, having third party clients would not definitively mean the client is bad. Obviously, if it’s a simple fork with hopefully small patches that are just UI changes, it’s probably not going to harm the security model.

            I should have phrased this better in my original post. When I was thinking about third party clients, Matrix and XMPP immediately came to my mind. Not very simple forks. So I’ll phrase this better: “Having non-trivial third party clients is not good for security.” What non-trivial means is left to interpretation though, I suppose.

    • PlexSheep@infosec.pub
      link
      fedilink
      arrow-up
      1
      ·
      4 months ago

      Why do you think so? I see it as a strength in diversity and a great driving force for a proper server api