• 0 Posts
  • 87 Comments
Joined 1 year ago
cake
Cake day: July 30th, 2023

help-circle



  • matter@lemmy.worldtoLemmy Shitpost@lemmy.worldCrypto genius
    link
    fedilink
    arrow-up
    10
    ·
    edit-2
    11 months ago

    Yes, I understand how monero works. Yeah you’ll get away with buying some groceries or whatever with it, but people who go through bankruptcy (especially who aren’t rich, and are felons) have a close eye from the government on their finances. If you try to buy a house or a car or anything actually life changing with that, you’re pretty likely to get caught and charged with fraud etc., unless you legitimise it, that is, launder it.









  • It should most definitely be a valid assumption.

    If the key passes through their servers at all (and it probably does,) then they have access to the keys and sufficient information to decrypt it. it’s possible the app does send keys independent of their server- I don’t know- but I very much doubt it.

    The keys shouldn’t be on or go through a server anywhere, that would be an absolute joke.

    What makes you think that private keys are being sent anywhere? This app uses a slightly modified version of the Signal protocol (because of course it does), as they describe here, section 27, page 90. Only public keys should ever leave your device, otherwise no amount of showing the code would make it secure. That’s the whole point.

    Again, with the client code you should be able to tell that the keys are generated there and not sent anywhere.

    As I said, with any app, just because they publish some server code does not mean that that’s what they’re running on their server - for security you have to be sure that the app is sufficiently secure on its own. Even if they were running the exact public code that “didn’t save the keys” the server could harvest them from memory.



  • You’ve misunderstood. With the client code you can be sure that your messages are properly encrypted before leaving the device. If that’s done correctly, you don’t need to trust the server, because it can’t read your messages just like some attacker couldn’t. Signal is pretty similar, they didn’t update the public server source for a few years, and even with the source, we can’t know that that is what they’re actually running. But with a verified build of the client code we can know that our messages are encrypted such that, even if they held on to them until quantum computers became mainstream, they’d still be properly protected.