What is Palantir, and how do we avoid getting spied on

You are referring to this and the removal of forward secrecy?


Note I put Session's rebuttal above.

Thanks for your thoughts.
i believe that blog is made by a retard.

he is critizing their encryption without understanding it. the 128-bit seed is further ran through SHA-512 Hashing.

the tradeoffs for the pfs were for onion anonymity and decetralization, that blog is purely against anonymity or dont have enough cybersec knowledge.

im critizing session for storing messages longer than needed, which other apps dont. but thats about it their security is 100x signal or telegram
 
i believe that blog is made by a retard.

he is critizing their encryption without understanding it. the 128-bit seed is further ran through SHA-512 Hashing.

the tradeoffs for the pfs were for onion anonymity and decetralization, that blog is purely against anonymity or dont have enough cybersec knowledge.

im critizing session for storing messages longer than needed, which other apps dont. but thats about it their security is 100x signal or telegram
Good point on the 14 days. Signal loses me with the phone number requirement right off the bat.
 
Session has been terrible for me. I currently only have on contact in there, but messages don't pushed through, it crashes and whatelse.
As the only messenger this would make it unusable. If I don't get my messages delivered, or get other messages delivered to me, what is the point of using that messenger?
Very high security. Even you may not get your messages, haha.
 
Signal loses me with the phone number requirement
also telegram, although im still there since everyone is there. i would never do anything wildly illegal there.

you could download session and set it up on a anon device if you wanted to. cant do that with telegram. have to buy virtual numbers with crypto that can recieve the message for you. and that leaves a phone number with metadata in the end.
 
Very high security. Even you may not get your messages, haha.
The whole "not getting my messages" aspect kinda defeats the high security aspect of it IMO, but YMMV.

also telegram, although im still there since everyone is there. i would never do anything wildly illegal there.

you could download session and set it up on a anon device if you wanted to. cant do that with telegram. have to buy virtual numbers with crypto that can recieve the message for you. and that leaves a phone number with metadata in the end.
Serious question:
Why would it matter, if I buy the number and use TG within a safe container that *in theory* should not leak any metadata to TG?
 
Serious question:
Why would it matter, if I buy the number and use TG within a safe container that *in theory* should not leak any metadata to TG?
this is just far fetched and no one would use the ressources on "banana joe" for it. rather big terrorists or dangerous hackers maybe.

but that safe container im assuming you recieved a message on with the bought number, have now leaked either your last tor node, and crypto address. assuming you did it correctly.

that is 2 lead head start to the cops you just handed out for free, assuming you did everything right and never logged into telegram at all.

you wouldn't have given that with session.
 
The whole "not getting my messages" aspect kinda defeats the high security aspect of it IMO, but YMMV.


Serious question:
Why would it matter, if I buy the number and use TG within a safe container that *in theory* should not leak any metadata to TG?
TG really is a non starter in this thread IMO.


 
this is just far fetched and no one would use the ressources on "banana joe" for it. rather big terrorists or dangerous hackers maybe.

but that safe container im assuming you recieved a message on with the bought number, have now leaked either your last tor node, and crypto address. assuming you did it correctly.

that is 2 lead head start to the cops you just handed out for free, assuming you did everything right and never logged into telegram at all.

you wouldn't have given that with session.
Assuming I will use XMR correctly, that would leave only the Tor node as attack vector, right?
As far as my limited technical understanding is concerned, you would have to do some very, very serious shit (or be an adversary to anyone being able to unmask Tor nodes...) to get caught that way.

I don't think any of those two scenarios apply to me. Or am I wrong?
 
that would leave only the Tor node as attack vector, right?
As far as my limited technical understanding is concerned
yes, they would have to hack both the entry node and exit node to come back to you, and even with both those nodes, its kinda hopeless without fingerprinting you. assuming you have done everything correctly.

now if you have basically everything from my ressource list.

mullvad vpn stacked onto all data rerouted through onion network > vm > same setup preferably both os on main pc is secure. you have now both double layered protection, and double encryption on both drives.

that ultimately leaves finding a vendor which you can buy using crypto from on the vm device.

and i do believe in closing all doors, before they'll one day come back and bite you in the ass, so i would prefer 0 doors left instead of 1 because i was using telegram. but this is strictly cybersec talk and not relevant to banana joes online steroid purchases.
 
i appreciate the post and maybe its something to look into but idk if its effective, maybe im just hopeless and am being nihilistic lol.
any rules we think theyre playing by they arent. they have access to anything they want if they care enough. I dont see me buying peps and test as being their biggest fish to fry so im just gonna keep doing me.


they've won - at least for now. just have to hope class conciousness continues to spread.
-
they have more wealth than they could spend over dozens of lifetimes but it just isnt enough, how crazy is that??
 

Sponsors

Back
Top