Posted on 01/11/2021 7:02:59 AM PST by Alas Babylon!
Tech mogul Elon Musk -- known as widely for slinging cars into the sun's orbit as he is for advocating against COVID-19 safety measures -- took to Twitter Thursday to slam Facebook over its latest privacy policy updates for its supposedly secure encrypted messaging app WhatsApp. Musk instead recommended users choose encrypted messaging app Signal.
This isn't the first time Musk has publicly sparred with Facebook over privacy concerns. In 2018, he not only had his own personal Facebook page removed, but those of his companies Tesla and SpaceX. His take on the long-fought battle between Signal and WhatsApp isn't off-base, though.
Both of the encrypted messaging apps have been found to have security bugs over the years that have been resolved. For years, WhatsApp has openly collected certain user data to share with parent company Facebook. Its latest policy change just expands that. Signal, on the other hand, has a history of fighting any entity that asks for your data, and adds features to further anonymize you where possible.
Their business model is dependent on software that any coder can write in a week.
I believe Twitter and Facebook run on at least tens of thousands lines of code.
Most people that had a major change impact on society over the history of mankind were considered nuts at one point.
I have changed my mind on Musk. I am now a big fan and a supporter.
MeWe is a fine replacement for fakebook. No games though. They have chat which is pretty much messaging. Can be one on one or many people.
No ads and they don’t sell data. They make their money by selling goodies like themes and smilie/icon packs and also have a premium membership. They charge for Pages and those Pages aren’t publicly viewable which I think is bs. They sell cloud storage. They have unlimited voice & video calling for $1.99/mth.
The whole thing is a closed system however. Nothing can be seen unless you register/login. I guess I don’t mind it except for the Pages. For $1.99/mth, I want the world to be able to see it, not just fellow members. Might as well just get a website.
Great report, FRiend!
Muchas gracias!
He may be nuts. But he is not stupid.
Yeah for a rich techno genius, he’s pretty down to earth and has a decent sense of humor. With the left losing their farkin minds and going full commie, I think he’s sliding towards the right.
Secure enough. Complete security is a device turned off.
This past week, I signed up on Bitchute, Parler, Rumble and now attempting Gab. I can't even sign up for Gab as it is too busy. Or, are THEY attacking it already?
Now as I think it through, the advantage Facebook, Twitter, Instagram all have is so many users congregate there.
If conservatives are going to go elsewhere, they should decide what would the best place, that is, where they can be ALL heard.
I don't have a problem with the market deciding that just based on volume.
So last week I went to Parler. I followed Hannity, Levin, Nunces, etc., and that seemed to be the place to go.
But they shut it down.
Now I think if Elon builds it--people will come in droves, and THEY won't be able to shut him down.
Think Starlink won’t have its own server farms for “cloud” services? The biggest expense for server farms is the electrical power required — Hmmm, know anyone with efficient distributed power technology?
Musk knows that a strong, free market economy is necessary for his Mars project. He knows that minimal government taxation and regulation are necessary for his Mars project. Don’t get in the way of Elon Musk’s Mars project.
War Room just had on the CEO of Clout Hub, and it sounds pretty good.
You people who say dumb s*** like this are both hilarious and pathetic.
Oh no, my "Social Score"...lol. W-T actual F.
Stop sniveling - like some little bitch - and stand up like an American.
There are millions more of us than them, and we'll never smash any commies if you're some beta-boy hiding under your fkn bed.
That’s the impression i get from him, i don’t think he like’s censorship in any form period.
There are millions more of us than them,
—
At last count the entire population of the US is a rounding error compared to the Chinese population. Where your new masters are coming from - Don’t believe it? Just ask your new wholly Chinese owned President.
Comments are issued as warnings not personal plans of actions - I spent 30 years fighting these guys - your turn. Hope you have better luck.
And watch the personal attacks this is not the time to eat your own or haven’t you noticed where that loosing tactic got you in the first place?
Don Jr. is on WeGo.Social.
Also suggested AnonUp.com
Here is a preliminary draft of a proposed encryption device of my own design.
The problem is how to send secure data over an insecure network (the internet) using insecure devices (your PC, smart-phone..etc)
There is NO practical way to make the internet secure, and there is NO practical way to make a PC or smart-phone secure...the powers that be would throw a monkey wrench into the effort.
The ONLY way to achieve security under these conditions is a vetted, secure, encrypted device that you control.
No encryption software running on a PC or smartphone will be secure because the device it is running on is insecure...it is mandatory that encryption be performed in a secure device that is totally open-source...anyone must be able to look at the device and test it. There is no security in obscurity and no encryption method that is secret/proprietary can be trusted.
The device must be simple, open-source and open hardware. The integrated circuits used in its construction must be of a sort that can be easily decapped and scrutinized by the curious... see-> https://jcjc-dev.com/2020/10/20/learning-to-decap-ics
It can be something as simple as a hand-held device for sending short text messages... such a device could transfer the data as audio tones using smartphones...or it can be used as an air-gap device to send enormous amounts of data from PC to PC. The important thing is to keep the encryption entirely within the device...the PC and the network must NEVER have access to the unencrypted data to be exchanged!
Such a device can be easily constructed using public-key encryption and will work flawlessly if well designed.
But public-key encryption is nearing its end-of-life.
To remain secure into the future an encryption device must use the ONLY encryption type that is mathematically provable to be unbreakable without the key.
The only unbreakable encryption is very old tech. It is the same idea behind the Enigma cypher machine of WW2 infamy...the thing Alan Turing was able to break because he discerned the flaws introduced into the Enigma machine and the methods of its operation.
The most fatal flaw of Enigma was its use of a mechanical random-number generator...no Newtonian device can generate true random numbers...it’s impossible. No software algorithm can do so either...only quantum events can generate true random numbers... diode noise, Brownian motion..etc.. the flipping of a coin comes close..but is not quite perfect. The Enigma machine also suffered from flaws introduced by designers who lacking the skills of true cryptographers made serious design mistakes...chief among them the mistake of never letting a character be encrypted as itself..i.e. A in plaintext could never become A in the ciphertext...this was an amateur mistake :-/
There are two types of encryption in common use.. private-key and public-key.
Private-key is the most secure type.. a 256bit AES key is damned good. But it suffers from the key-exchange problem.. You must transfer the key to the person you wish to send secure data to...this is an obvious drawback!
Public-key encryption removes the need for key-exchange. You can send secure data to anyone who publishes their public-key. The problem is that such encryption depends upon the difficulty of solving a mathematical problem, like factoring of large prime numbers. The public-key method will fall someday soon to Quantum computers... they will be VERY good at solving problems like factoring.
The Enigma machine uses a very old encryption scheme...it is often referred to as the One-Time-Pad.
The one-time-pad is indeed unbreakable without the key..the problem with the scheme are both the key-exchange problem and the fact that the key is the same length as the data to be encrypted...this make it very tedious indeed.
The one-time-pad uses a simple mathematical method of encryption, the XOR function.. if you wish an exhaustive explanation of XOR and its application to cryptography then see this page.. https://blog.abdullahtalayhan.com/otp-xor-visual-example/
One-Time-Pad or XOR encryption has been discarded as too cumbersome to deal with...but advances in data storage have made it possible to be utilized again....what is old is new again.
With XOR encryption the secret key is the same length as the data to be secured...whew, a 4gb video file would have a 4gb key! Such a method of encryption would appear to be totally unusable.
The ability to store vast amounts of data on a minuscule micro-SD card changes the equation...it changes the key-exchange problem into a one time only problem.
Two SD cards, each containing a multi-gigabyte sized chunk of true random numbers is what makes XOR encryption a usable technology.
If two individuals hold an identical set of random numbers on SD cards then they will be able to communicate with absolute security for as long as they wish. There is always the rubber-hose problem...but all encryption contains that problem. If your adversary has custody of you they can coerce the data using force.
The other perceived problem with using an XOR based hand-held encryption device is the thought that if the device is captured then all the data that it has been used to send is compromised. That is not so, all that need be done is to over-write the small portion of the random numbers used to exchange each message immediately after the message has been sent and received...there is then no way to decode any previously sent messages.
Public-key cryptography is mostly used not to exchange the actual data but to transfer a temporary, randomly generated symmetric key between two devices i.e. a 256bit AES key. That random key is then discarded. But public-key security is going to fail soon because of advances in Quantum computing....some claim it has already fallen but I doubt it since a break would become known since intelligence agencies put out fake messages regularly to see if anyone takes actions based on the data contained in public-key encrypted files. The “Coventry test” You see, Churchill allowed a bombing raid to proceed against the city of Coventry to conceal the fact that Enigma had been broken. But there are things that could be placed into a fake public-key message that would have to be acted upon as the stakes would be too high.
One must remember that a symmetric key can be exchanged using an XOR system... to safely transfer an enormous file you only need to XOR encrypt the symmetric key and exchange that...you do not need to send the entire file as XOR data...thus you only use up a tiny amount of your random data stored on an SD card...you can even send an entire SD cards worth of new random numbers but be aware that its security would then only be equal to the strength of the symmetric algorithm used to encode it..it would no longer have the same absolute security that XOR data has... but again, 256bit AES is damned good and quantum computing has its limits when it comes to something like AES.
At present, a small encryption device would be most useful if it contained both the ability to transfer data using public-key methods as well as the ability to use XOR methods to send data that required ultimate and eternal security. The device could be engineered to make it very difficult to ascertain which method was used. Public-key could be used by the mass of people who only need to protect “ordinary” secrets.
If put into widespread use a small device for encryption would render impossible the mass collection of data as choices would have to be made by any adversary regarding what data was important enough to expend significant computing power to decrypt.... and they would be frustrated by the fact that the most important data would be sent using XOR and they would be wasting their time attempting to decode such data.
The device could be fashioned into a snap-on hard case for popular smartphones and use DTMF tones to exchange encrypted txt messages... such a device is actually simple to construct.
Blockchain for platform-independent social media. Anonymization. Interesting. Good idea.
A bigger question would be is why would you be concerned with online privacy when the powers-that-be won’t allow you to even be online?
That’s where they’re going with this.
Everyone will know because on the news they will label the people involved as domestic terrorist, white nationalists and ultra conservatives, etc.
Who was that?
ARTICLE: “Tech mogul Elon Musk . . . took to Twitter Thursday to slam Facebook over its latest privacy policy updates for its supposedly secure encrypted messaging app WhatsApp. Musk instead recommended users choose encrypted messaging app Signal.”
ACTUAL TWEET: “Use Signal”
maybe because a lot of people use Messenger to text which is tied to Facebook.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.