#encrypted signals
Explore tagged Tumblr posts
epicstoriestime · 29 days ago
Text
Signal Blink: May 27 — The Calibration
Posted by Eric Kliq410 | 03:33 AM, May 27, 2025 [SYSTEM OVERRIDE DETECTED][FEED STABILIZING… 33%][HARMONIC LOCK INITIATED] 03:00 AM — Static Crescendo The streetlights didn’t flicker tonight—they breathed. Pulsing in threes, synced to a rhythm older than the grid. I pressed my palm to the window, and the hum sank into my teeth, grinding like a bone saw through marrow. The air thickened,…
Tumblr media
View On WordPress
0 notes
abbiistabbii · 8 months ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
4K notes · View notes
fuck-u-maga · 3 months ago
Text
Tumblr media
225 notes · View notes
nyancrimew · 3 months ago
Note
Thoughts on Snikket? End to end encrypted XMPP server/client kinda like signal, but decentralized and self hosted with OMEMO encryption instead of signals deal (though apparently OMEMO is based on Signal or something?) and the only E2EE xmpp client with iOS support that I’ve seen
Also doesn’t use a phone number (since it’s self hosted they don’t need to protect against signup abuse and let server admins manage invites) which seems to be the only thing the government can use to know you were using it with all of signals warrants for phone numbers, though I guess it doesn’t matter much since they can’t see your messages either way
ironically the advantage signal has over most other (usually more decentralized) solutions including xmpp is that signal requires (and thus stores) significantly less metadata due to being centralized, a federated system requires metadata for servers to talk to each other and given usually servers only have a small number of users on them each simple traffic analysis between servers can reveal a lot about who might be talking to whom which can be all you need to know. matrix kind of suffers from similar issues where privacy is only really guaranteed if you run a small server that does not federate and only communicate within this same server.
199 notes · View notes
kaiist · 1 month ago
Note
made us wait so long for nothing 🙏
??? Are you the same anon as this? Damn, if only you had the nerve to show yourself.
Why bother reading if you don’t like it? I’m so confused. I can’t post anything I want here anymore? 💀
Whoever this coward is hiding behind anon—I genuinely wish you had the balls to DM me so I could block you right away. People like you are pathetic and make me sick.
84 notes · View notes
gonethroughthevhstapes · 20 days ago
Text
if the online safety bill is making true encryption illegal, then what about like tor browser and shit?
17 notes · View notes
amethystsoda · 8 months ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
I’ve never used Signal, but I’m looking into it 👀 also note the notification preview tip ^^
15 notes · View notes
hagbrigade · 3 months ago
Text
tbh unsurprising that they were using signal but still. fascinating that they just added so many people to a chat like that and didn’t even double check who was who. also from the screenshots cannot believe some of them had honest to goodness white background headshots as their profile pic. On signal.
4 notes · View notes
phoenixbyte · 18 days ago
Text
Tumblr media
intercept: byte_452-k // node alive // trace incomplete
2 notes · View notes
tumorhead · 4 months ago
Text
PLEASE don't rely on Signal to keep you safe. Please please please please please don't trust any technology to be perfectly private and secure. TL:DR- Signal's developers, funders, board members, and workers are a rotating cast of Silicon Valley technocrats (Google & Amazon guys etc) and US State Department regime change freaks. While messages are encrypted, there is still metadata they collect, and they have given data to the state department before (!!!!). Even if they only have your phone number, that can be used with data from other sources to find out a LOT of info. TOR, VPNs, and crypto (duh) are all similarly too slimy to trust. I don't have a good alternative. we should use messenger pigeons or some shit idk.
3 notes · View notes
nando161mando · 5 months ago
Text
If you don't have Signal installed on your phone, please fix that.
You may not need the security for yourself, but someone you talk to will.
Everyone needs to have it. ⚧️
https://signal.org/
4 notes · View notes
black-in-kansas · 10 months ago
Text
Our Privacy Is In Serious Danger By The Government Right Now...
youtube
6 notes · View notes
abbiistabbii · 8 months ago
Text
Tumblr media Tumblr media Tumblr media
Considering the Upcoming US administration is going to be on the Warpath, and social media and messaging companies are more than willing to hand them your chats, encrypting your comms is more important than ever.
Get Signal.
4 notes · View notes
kaiist · 3 months ago
Note
Can you make one where MC/Reader snaps at them? Where they are like annoying her and then she snaps and yells at them loudly? Or the opposite?? ^^
Annonie...
Tumblr media
How did you know 😲 /le gasps/
Let’s do all three of them—you snap at him, he snaps at you, and he snaps at his kid(s) 😼
The idea shall be added to my draft, stay tuned! (⁠ʃ⁠ƪ⁠^⁠3⁠^⁠)
82 notes · View notes
werbooz · 10 months ago
Text
Understanding Encryption: How Signal & Telegram Ensure Secure Communication
Tumblr media
Signal vs. Telegram: A Comparative Analysis
Tumblr media
Signal vs Telegram
Security Features Comparison
Signal:
Encryption: Uses the Signal Protocol for strong E2EE across all communications.
Metadata Protection: User privacy is protected because minimum metadata is collected.
Open Source: Code publicly available for scrutiny, anyone can download and inspect the source code to verify the claims.
Telegram:
Encryption: Telegram uses MTProto for encryption, it also uses E2EE but it is limited to Secret Chats only.
Cloud Storage: Stores regular chat data in the cloud, which can be a potential security risk.
Customization: Offers more features and customization options but at the potential cost of security.
Usability and Performance Comparison
Signal:
User Interface: Simple and intuitive, focused on secure communication.
Performance: Privacy is prioritized over performance, the main focus is on minimizing the data collection.
Cross-Platform Support: It is also available on multiple platforms. Like Android, iOS, and desktop.
Telegram:
User Interface: Numerous customization options for its audience, thus making it feature rich for its intended audience.
Performance: Generally fast and responsive, but security features may be less robust.
Cross-Platform Support: It is also available on multiple platforms, with seamless synchronization across devices because all the data is stored on Telegram cloud.
Privacy Policies and Data Handling
Signal:
Privacy Policy: Signal’s privacy policy is straightforward, it focuses on minimal data collection and strong user privacy. Because it's an independent non-profit company.
Data Handling: Signal does not store any message data on its servers and most of the data remains on the user's own device thus user privacy is prioritized over anything.
Telegram:
Privacy Policy: Telegram stores messages on its servers, which raises concerns about privacy, because  theoretically the data can be accessed by the service provider.
Data Handling: While Telegram offers secure end to end encrypted options like Secret Chats, its regular chats are still stored on its servers, potentially making them accessible to Telegram or third parties.
Designing a Solution for Secure Communication
Key Components of a Secure Communication System
Designing a secure communication system involves several key components:
Strong Encryption: The system should employ adequate encryption standards (e.g. AES, RSA ) when data is being transmitted or when stored.
End-to-End Encryption: E2EE guarantees that attackers cannot read any of the communication, meaning that the intended recipients are the only ones who have access to it.
Authentication: It is necessary to identify the users using secure means such as Two Factor Authentication (2FA) to restrict unauthorized access.
Key Management: The system should incorporate safe procedures for creating, storing and sharing encryption keys.
Data Integrity: Some standard mechanisms must be followed in order to ensure that the data is not altered during its transmission; For instance : digital signatures or hashing.
User Education: To ensure the best performance and security of the system, users should be informed about security and the appropriate use of the system such practices.
Best Practices for Implementing Encryption
To implement encryption effectively, consider the following best practices:
Use Proven Algorithms: Do not implement proprietary solutions that are untested, because these algorithms are the ones which haven't gone through a number of testing phases by the cryptographic community. On the other hand, use well-established algorithms that are already known and tested for use – such as AES and RSA.
Keep Software Updated: Software and encryption guidelines must be frequently updated because these technologies get out of date quickly and are usually found with newly discovered vulnerabilities.
Implement Perfect Forward Secrecy (PFS): PFS ensures that if one of the encryption keys is compromised then the past communications must remain secure, After every session a new key must be generated.
Data must be Encrypted at All Stages: Ensure that the user data is encrypted every-time, during transit as well as at rest – To protect user data from interception and unauthorized access.
Use Strong Passwords and 2FA: Encourage users to use strong & unique passwords that can not be guessed so easily. Also, motivate users to enable the two-factor authentication option to protect their accounts and have an extra layer of security.
User Experience and Security Trade-offs
While security is important, but it's also important to take care of the user experience when designing a secure communication system. If your security measures are overly complex then users might face difficulties in adopting the system or they might make mistakes in desperation which might compromise security.
To balance security and usability, developers should:
Tumblr media
Balancing Security And Usability
Facilitate Key Management: Introduce automated key generation and exchange mechanisms in order to lessen user's overhead
Help Users: Ensure that simple and effective directions are provided in relation to using security aspects.
Provide Control: Let the users say to what degree they want to secure themselves e.g., if they want to make use of E2EE or not.
Track and Change: Always stay alert and hands-on in the system monitoring for security breaches as well as for users, and where there is an issue, do something about it and change
Challenges and Limitations of Encryption Potential Weaknesses in Encryption
Encryption is without a doubt one of the most effective ways of safeguarding that communications are secured. However, it too has its drawbacks and weaknesses that it is prone to:
Key Management: Managing and ensuring the safety of the encryption keys is one of the most painful heads in encryption that one has to bear. When keys get lost or fall into unsafe hands, the encrypted information is also at risk.
Vulnerabilities in Algorithms: As far as encryption is concerned the advanced encryption methods are safe and developed well, but it is not given that vulnerabilities will not pop up over the years. Such vulnerabilities are meant for exploitation by attackers especially where the algorithm in question is not updated as frequently as it should be.
Human Error: The strongest encryption can be undermined by human error. People sometimes use weak usernames and passwords, where they are not supposed to, and or even share their credentials with other persons without considering the consequences.
Backdoors: In some cases, businesses are pressured by Governments or law officials into adding back doors to the encryption software. These backdoors can be exploited by malicious actors if discovered.
Conclusion
Although technology has made it possible to keep in touch with others with minimal effort regardless of their geographical location, the importance of encryption services still persists as it allows us to protect ourselves and our information from external invaders. The development of apps like Signal and Telegram has essentially transformed the aspect of messaging and provided their clients with the best security features covering the use of multiple types of encryption and other means to enhance user privacy. Still, to design a secure communication system, it's not only designing the hardware or software with anti-eavesdropping features, but it factors in the design of systems that relate to the management of keys, communication of the target users, and the trade-off between security and usability. 
However, technology will evolve, followed by the issues and the solutions in secure communications. However by keeping up with pace and looking for better ways to protect privacy we can provide people the privacy that they are searching for. 
Find Out More
3 notes · View notes
sw5w · 7 months ago
Text
Anakin...
Tumblr media Tumblr media Tumblr media
STAR WARS EPISODE II: Attack of the Clones 00:30:41
3 notes · View notes