- cross-posted to:
- world@lemmy.world
- pulse_of_truth@infosec.pub
- technology@lemmy.ml
- cross-posted to:
- world@lemmy.world
- pulse_of_truth@infosec.pub
- technology@lemmy.ml
“Signal is being blocked in Venezuela and Russia. The app is a popular choice for encrypted messaging and people trying to avoid government censorship, and the blocks appear to be part of a crackdown on internal dissent in both countries…”
could matrix.org be as easily blocked, since it’s decentralized I’m wondering?
At least it means that Signal is working as intended if they are blocking it, I guess that they don’t have back doors.
Being decentralized prevents DNS or IP blocks but not blocks through DPI.
Signal has an option to masquerade it’s traffic as regular HTTPS, I don’t know if Matrix can do such a thing.
I can answer this! All matrix calls are over https APIs. Ports and addresses are stored in a text file on the base domain or in DNS txt entry.
Thanks, nice to have someone knowledgeable.
Would you say matrix is censorship resistant? I’ve very limited knowledge of it but given what you said I imagine that if I was trying to block matrix I would just need to query the url of the text file and check the DNS text entry, if either exist just add the domain to the blocklist.
I was trying to block matrix I would just need to query the url of the text file
Ok this raises a question for me. How do you find a url like this which wouldn’t be like, “linked on their site” or something? I know it must be possible to like dump a URL list for a site to a textfile, I’m just wondering how.
Like say I want to find all the super secret pages on www.subgenius.com, they link some but say www.subgenius.com/pam1/pamphlet.html wasn’t directly linked (it is, but pretend lol) but could be accessed by the URL, how would I find that URL? Can you just run like
someprogram -a www.subgenius.com -o subgenius.txt
because that would be cool.Maybe I’ve misunderstood how it works. I thought that when connecting to a matrix instance you would point to the domain name and the text file would be on a standard location (as with
/robots.txt
or all the files in/.well-known/
) so it would be easily discoverable. In fact I just checked and matrix does use/.well-known/
so one should be able to identify matrix servers by querying these URLs. Unless their is a way to use a non-standard location, but that would require further configuration on the client I guess.And just to answer your question, the only way to find some hidden file would be to brute force. This could obviously be extremely time consuming if the URL is long and random enough, especially if you add rate limiting (this last thing could be circumvented by using multiple IPs to scan, which would be easy for a state actor).
Edit: I’ve just realized I wasn’t answering to the same person, the first part of the message was more for @TarantulaFudge@startrek.website
Ah maybe I’ve misunderstood then, lol. I didn’t know any of that. Oh well!
Yeah the main thing is that the ports and addresses can change and it’s nbd. From a firewall perspective, it’s impossible to block them all. Especially when the clients are doing mundane https requests. Even if the server goes down or partial connectivity, the channel can still be used.
But this seems easy to automatically block, no? If a client is querying an unknown domain check for some Matrix related data in
/.well-known/
and add it to the block list if there is. And since the servers are publicly advertising the port used you just need to periodically check the list of known matrix domains you are creating in the first step.Russia is already doing DPI and blocking ESNI so that seems easy. A more widespread usage of ECH would help everyone, as is Signal advocating, but that’s not the case yet.
Matrix is in fact decentralized but in reality it is not so much, I don’t know the number exactly but the majority of users use the matrix.org server
Those numbers only include instances that have telemetry enabled
Do you have numbers without?
How would you?
No clue, not familiar with Matrix to that level.
I mean, that’s not specific to Matrix. Telemetry is the tool used to get the numbers, so I don’t see how you would collect numbers on servers that don’t report numbers.
Theoretically they could be reported by federated servers that do have it enabled
Im surprised there are zero calls to any official matrix server(s) from those instances.
Not even random API for metadata, update status, etc?
Telemtry is a word. It only means as much as it means in each context, and without full context it means little atm.
Do you have a resource where I could learn more about what data Matrix considers telemetry?
People who live in countries where DNS and IP blocks are common probably use a different server. I’ve been running my own for over a year and it works like a dream
could matrix.org be as easily blocked, since it’s decentralized I’m wondering?>
Or SimpleX?
It cannot be easily blocked especially if you use your own homeserver every homeserver replicates the channel and it can operate without the original server! That’s why signal and telegram are inherently flawed.
To be devils advocate in a sense, this may mean that it doesn’t have any backdoors that Russia or Venezuela can use, but the NSA or something still could have one of their own.
Matrix doesn’t have encryption as the default
Also Signal doesn’t have any backdoors. I can say that with high certainty as it has been audited more than any other messager.
It doesn’t matter if it is a business entity operating under a government then you can never really know because gag orders. Centralized servers can be blocked. Telegram and Signal apps could have a back door. This is why open stack is important. And not just the code. Also encryption is default for p2p one on one conversations. It’s not in channels by default because it can complicate public use.
Yes
Signal honored!
Would peer to peer apps be resistant to this sort of thing?
Yes, but you’ll have to install them from sources other than what governments deem official. Like F-droid.
Now, if they block p2p traffic that’s a different story
I am totally cool with F-droid.
It depends. Somehow it has to discover the peers. Other than that, they could block traffic between residential IP addresses and there goes large part of the P2P network
Russia and Venezuela are huge hotbeds of piracy from populations without access or capital to access most forms of entertainment.
Breaking P2P in this manner would basically be getting rid of the circus part of bread and circuses. Not a good move for an authoritarian.
Peer to peer apps do not work without a centralized relay to get you around the CG-Nat that cellphones live behind. So they’re not really peer to peer. You would be playing whack-a-mole with the relays, having to spin them up as they get blocked. Many ISPs implement CG-NAT as well. Its really dependent on how the network providers structure things. Someone from the country with local knowledge would have to test it.
IPv6 doesn’t need CGNAT. So as long as it’s capable of doing IPv6, it can directly communicate peer to peer using globally unique addresses. How do I know this? Simple because my ISP on IPv4 is completely CGNAT and I cannot get anything past it. So I am completely forced to use IPv6 for any service I want to run and access from outside my network.
Sure, but ipv6 is not widely adopted. I’m behind a CG-NAT but can’t get an ipv6 so I have to operate a vps bridge to host my services. Some cell networks have ipv6 support but a few implement a NAT for it as well. AT&T only allows port 80 and 443.
Its not consistent enough to be useful without a centralized relay.
Non ipv6 parts of the internet are considered derelict at at this point.
And… That doesn’t change the fact it’s not widely adopted enough for peer2peer chat services without the need of a relay.
I think that really depends on where you are. Here in the US, for example, IPv6 is pretty darn well adopted. And even 45% of Google’s internet traffic is done over IPv6.
Sure but if your looking to use a chat service, 45% is not a high enough watermark to have reliability. Its so contingent on the network operator to allow for an IPV6 connection. And like I said, places like AT&T have a NAT on their IPV6 network.
True, the only other option is something like simplex through tor. There are also p2p options like meshtastic as well.
IPv6 doesn’t need CGnet. So as long as it’s capable of doing IPv6, it can directly communicate peer to peer using globally unique addresses. How do I know this? Simple because my ISP on IPv4 is completely CG NAT and I cannot get anything past it. So I am completely forced to use IPv6 for any service I want to run and access from outside my network.
why telegram is not blocked? makes you think…
WhatsApp supposedly uses Signal protocol.
Why is THAT not blocked? Certainly they wouldnt roll their own encryption and bypass Signal security protocols after having Moxie come in, right? Right???
Russia is reportedly planning to block WhatsApp as well.
It is owned by Meta and is proprietary
Telegram is not secure, I guess if you can listen to it better not block it.
I mean it was blocked before Signal was blocked. Russia somewhat famously badly broke their Internet trying to shutdown telegram… and eventually gave up.
I’m guessing Signal finally has enough market share to get the Russian government’s attention but not enough market share that they think the web of proxies that kept Telegram online will keep Signal online.
and eventually gave up
or maybe they came to an agreement on mutually beneficial terms
Maybe, maybe not, maybe I’m a duck in a suite.
On April 16, 2018, the Russian government began blocking access to Telegram, an instant messaging service. The blocking led to interruptions in the operation of many third-party services, but practically did not affect the availability of Telegram in Russia. It was officially unblocked on June 19, 2020
Some say it was unblocked because they made a deal with Durov. Another opinion is that too many people and services including officials continued to rely on it even during the time it was blocked. Regardless, Telegram did a huge job on circumventing those blocks.
It isn’t private
blocks appear to be part of a crackdown on internal dissent in both countries.
Or… you know… at least for Venezuela, the USA constantly fucking around with their elections and politics and local assets using Signal or something. Maybe, I dunno?
Yeah. Telegram, should be next, there’s a huge risk with it too. And email! Social networks too, just in case. And postal mail, we can’t forget that. We should crack down any form of uncensored communication.
All for the benefit of the people, of course. \s
In UK don’t ban them, but jail you if they don’t like your posts, more democratic.
The people inciting race riots deserve everything they get.
I’m not aware of the kingdom of whataboutistan. Is it related to this post somehow?
Yes, different kind of censorship in the world. A more broad vision.
Keep going, then. Any other country to mention, seeing how it’s important to you? Russia? China? Italy? India? Pakistan?
I somehow feel your “broad” is actually quite narrow. Usually happens with the whatabautisms
Why going so long when we have a near, english-speaking , clean example of a country famous for the free speech. If you have the highest example of human rights why check the rest.
So much from broadening… As soon as I mention any other suddenly there’s no point checking other countries.
While I don’t live in the UK I do believe they have protections on free speech.
If you are concerned you can always hide your identity.
I’m not living in uk, i live in italy. I saw every kind of comment written on italian social networks and i have never seen a conviction. When the police had taken the names of protesters, ( not arrested ) we had a public outcry. We had arrest for direct call for violence, not simply rants. So seeing people jailed for rants on twitter scares me. We have actual fascists and communists, both parties were strong, and we had an actual civil war. We have strong linguistic minorities and regional parties. So a lot of people hating each other. Who decide the right speech in such a situation?
I have some bad news for you. There is no right answer
And normaly it is very difficult to be comdemned for a generic rant. It is easier in case of insults or defamtion, but it is mostly an high fee. Jailing a political adversary for a speech ( when we had a lot of political/mafia killing in the past ) is a big no. We had actual people killed for their speech.
That movie director that got killed 50 years ago is a wild story.
Are people really jailed for rants in the UK? I’ve only seen stories of actual call to violence.
The line between rants and call for violence is quite blurred in some cases IMHO
Can you give an exemple of such case in the recent events in the UK?
I mean signal was funded in part by the US intelligence community up until last year.
The current president of Signal is also still happy to do interviews with US-defense-oriented think tanks like Lawfare.
They probably still are funded by USIntel, considering how interested RFA was in pushing Signal in privacy-oriented spaces.
Unrelated to what the previous person is saying (banned because it was used by dissidents), but still, we have the source code. If you’re arguing they are somehow accessing the data, what’s encrypted and what isn’t is known.
Signal knows who you are taking to. You can build a network of contacts based on that information. When you send messages your phone number is protected but your ip address is not, and the receivers phone number is not protected. So you can find two people chatting based on that information. The app automatically sends a delivery receipt when a message is received to the other user, exposing the senders phone number and IP address.
However, opposition in the country is backed by western agencies and NGOs, and likely their primary means of communication is signal since it’s backed by western intelligence, meaning, western actors believe it to be safe from external interference.
I’m not arguing that the west is reading messages. I’m arguing that they believe it’s a safe haven for their agents because they pay money to ensure it’s safe for their agents. If it wasn’t, they wouldn’t use it. Its the same reason why the intelligence community in the west is a large supporter of the tor network. They use it in the field and operate their own exit nodes to protect their operations.
That’s what you fail to understand. It’s open source, it has been audited. Venezuela and any other country can check and crack the encryption if has holes in it. The long first paragraph is something that’s not a secret, but widely known.
You know what’s also safe? Encrypted emails. VPNs. Matrix.
If you think this is a movement against foreign agents, you should think it’s useless too. For a sufficiently motivated agent, this will be trivial to overcome. For the general population? Not so much.
Unless next all forms of private communication re forbidden, of curse. Surely what people on a privacy community advocate for.
Is the opposition using those services?
Which ones? Signal? Likely. Secure mail and VPN? For sure. Can “foreign agents” use them? Certainly.
Who will have a hard time to use them? General population. Signal is the privacy communication service with the lowest barrier to entry, in terms of cost and setup complexity. Not a tool for spies, but for average Joe.
What service do you recommend BTW? That ensures government cannot snoop and prevents “foreign agents”. It seems that any privacy is a risk, so I’m curious what a privacy minded person thinks should be OK.
deleted by creator
Self defense is self defense, would we expect some different behavior from a country being attacked from outside interests with publicly accessible end to end encryption services?
Publicly accessible: reviewed and audited by hundreds of teams that confirmed there’s no backdoor. Venezuelan, Russian and Chinese governments didn’t find the holes, even having access to the code. If they did, they would be exploiting it to… reeducate.
Yeah, I would expect to trust that. Still, you said yourself, the problem is that is used by dissidents. And we can’t have that, right?
they do seem to have blocked reddit and twitter
We can’t have individual thinkers running around can we. We need a shared vision that is dictated from the top down.
For their own good. Individual thinkers tend to have short lives. Just look how many people thinked themselves of a window in Russia on the last year.
I’m pretty sure Venezuela was unstable before the US started getting involved.
Anyway Signal is secure so that shouldn’t be the problem. It has more to do with the government working to crush civil liberties and independent thought.
Same story in all authoritarian countries
Honestly I would’ve expected it to be blocked much earlier
You need a certain market saturation before a ban becomes useful. If very few people are using the service, there’s little incentive to invest time/energy in a block.
I suspect the recent wave of riots in the wake of the election is driving the urgency.
would have* expected it
That’s what would’ve means?
Why countries that do not prosecute political dissent bock apps used by political dissenters? /s
So signel proxy for the win?
deleted by creator
matrix stays winning
Matrix isn’t secure depending on how you use it. It also doesn’t protect individual identities terribly well.
Simplex Chat would be the better option however the main Simplex Chat server and matrix server could end up blocked as well.
Matrix is entirely self-hostable, and you can turn off both federation, and the requirements for any linkable identifiers.
Signal by contrast requires your phone number, isn’t self-hostable, and is based in a five-eyes country.
Matrix doesn’t protect metadata, which is arguably just as (if not more) important than message data. Signal by contrast does protect metadata and proper implements Perfect Forward Secrecy for all chats. I do think Signal’s centralized design and phone number requirements problematic, but Signal still has many merits. Such as its massive user base for a AGPL-only project.
Matrix also implements Perfect Forward Secrecy, and that’s been the case for a very long time: https://security.stackexchange.com/questions/162773/are-matrix-messages-encrypted-using-perfect-forward-secrecy
What do you mean by AGPL-only? Synapse is also AGPL. And you can only guarantee that there won’t be projects with other licenses if you prevent them from existing… which is not something to be desired
- AGPL-only is a license, I didn’t want to misrepresent the license by being general. I was just trying to say that it is surprising that a fully open source application like signal has a large user base.
- PFS isnt enabled by default for group chats and generally feels messy as the end user to deal with. I was unaware that they have properly implemented it for group chats as well.
- My point about metadata still stands. Matrix still does not protect metadata (one eg: reactions to messages are in unencrypted).
PFS isnt enabled by default for group chats and generally feels messy as the end user to deal with. I was unaware that they have properly implemented it for group chats as well.
Isn’t it? Maybe I’m misunderstanding something, so let’s start from the definition. PFS is when future joined users can’t read messages sent before they have joined, right?
In that case, it is not just implemented, but cannot be avoided and is a major hassle to deal with. In my understanding when someone joins, all members start a new olm session, meaning they now encrypt future messages with a new key. The old keys are not being sent to the joined users, not even if the room has been set up to allow reading history, and this results in them only seeing undecryptable messages, and all the metadata you’re taking about (except when the client hides these to reduce new user’s confusion).Former keys are not shared among clients for now because there’s no mechanism (for now, but this is planned) to verify that a new member is actually a legit member, not just someone popped in by the server admin by DB editing or whatever.
Earlier there was a workaround mechanism, where with element clients, when you have invited someone, your client has sent keys to all the previous messages which it had, to the invited user. That was not (yet?) reimplemented in their new crypto library, but apparently they’re working on it.But the point is, that afaik PFS is on and cannot be disabled for encrypted rooms, new rooms are encrypted by default, you have to toggle that off by yourself if you don’t want it, and it can’t be toggled off after room creation.
My point about metadata still stands. Matrix still does not protect metadata (one eg: reactions to messages are in unencrypted).
That’s right. I don’t think that’ll ever change, but it’s for sure that it’ll not change for a long time, because fundamental changes would be needed.
But! For when that is a concern, you are not entirely unprotected. For example you can set up a room to never federate, or only federate with specific homeservers. If your group runs their own, on owned real hardware, information can’t really leak from your control.In my experience, room encryption is opt-in and permanent for a room.
for a AGPL-only project.
Citation needed. It is undisputed that the software that runs on their servers is not identical to the code they release; if they release at all because sometimes they just stop for a year, until people complain 🫠
deleted by creator
This is false. You still need a phone number to sign up and it is used as an internal identifier.
All they did is to optionally allow you to hide your phone number from other users.
plenty of servers for both though
Couldn’t they block them too? Monitor the domains people connect to, check if it’s a Matrix server and block it if it is.
deleted by creator
What would a blockchain provide here?
buzzwords
Overhead
You don’t need any blockchain there, you need mixnets and hidden services like with tor and i2p
The overwhelming majority of users are on the main servers. It also impacts self hosted Matrix servers that use the matrox.org identity server.
Probably mostly because almost nobody uses it.
Couple million is absolutely nobody /s
Almost is absolutely \s
deleted by creator
Unless you click the “unblock” button.
Gotta love Verge.
Are you mad at verge for not expounding on what that button does, or trying to display the issue itself?
Smart move, considering Signal is a US-hosted centralized service that has to comply with US NSL laws.
These comments below seem to be unaware of all the issues privacy advocates have of signal.
I don’t get it, are you really arguing that Russia and Venezuela are blocking Signal to protect their citizens from American snooping?
All countries should ban US-domiciled companies like signal, or any communication platform hosted in Five-eyes countries, and especially ones domiciled in the US, which has to adhere to National Security Letters.
Isn’t the whole point of something like End-to-End Encryption so that not even the company themselves can read your messages?
In that case it wouldn’t matter even if they did turn the info over.
Edit: I read more into the page you linked. Looks like those NSLs can’t even be used to request the contents either way:
Can the FBI obtain content—like e-mails or the content of phone calls—with an NSL?
Not legally. While each type of NSL allows the FBI to obtain a different type of information, that information is limited to records—such as “subscriber information and toll billing records information” from telephone companies.
You can read my article, or Drew Devaults on why he doesn’t trust signal, which get more into this, but the short version is that US security forces don’t have time to read the content of everyone’s message anyway, they care more about the metadata: message timestamps and social graphs.
Signal stores all that data (via required phone numbers, meaning its linked to your real name and address), and via the US’s key disclosure laws, it would be illegal for them to tell you that the US government is hoovering up that data.
Most security experts who actually know what they are talking about do recommend Signal for most users, including [https://twitter.com/Snowden/status/661313394906161152](Edward Snowden), [https://www.schneier.com/blog/archives/2018/06/russian_censors.html] (Bruce Schneier) and [https://linktr.ee/glenngreenwald](Glenn Greenwald). Eveyone should consider whether they would rather follow the advise of people who have literally fought the NSA and read the entire Snowden documents or belive in the FUD spread by some people here.
The company, or any middleman, can read your messages if they have the keys. In many services, the keys come from the company. EEE is only as trustworthy as the clients and processes you use.
deleted by creator
Mass censorship is never good for civil liberties. Let people decide on there own.
Also Signal is cryptographically sound. Many other messagers use a similar protocol
As I commented below, US security forces aren’t that interested in message content anyway, since they don’t have time to parse through every message to construct meaning. Signal does require your phone number tho, as well as message timestamps, meaning they can build social graphs of real people. Tons of metadata living on a single US-based server.
It doesn’t matter if it is US based. You shouldn’t trust the server.
Signal has known issues. That doesn’t mean it is entirely bad though. Saying things like Signal is insecure is simply untrue. It has weaknesses but it also has the benefit of protecting your messages completely and being well established.
My question was more about the motives in this case.
Well IMO all countries should have the motivation to prevent US spying on their country’s populations. You generally don’t know about honey pots before they get exposed.
The question of what should be done can be interesting, but that was not my question. It’s obvious this is not the motive here.
If you are in your own country opposition it’s better to use a foreign tool, even better if it’s in a country that’s not gonna collaborate with yours.
I imagine just using metadata you can look for people who are discontent, then provides list of those people to the opposition to contact and mobilize them and get them to protest.
Or target them with stories and bots to turn them into a revolutionary force, but that would be more useful for social media networks instead of signal.
Signal has strong cryptographic protocols that are not easily broken. It pioneered the use of double ratchet encryption. (Different keys for each message)
It does expose phone numbers to Signal and the US government but that may or may no be a concern depending on what your threat model is.
they hated him because he spoke the truth smh
use matrix, briar, simplex in that order
also what email platforms + vpns do you recommend, out of curiosity?
Matrix isn’t as good as Simplex Chat. Briar is good as it is very hard to censor but it does use battery and requires you to be only all the time. (unless you count Briar mailbox)
sure, simplex is very private, but its also a pain in the ass to use currently. i feel like matrix makes a decent tradeoff between easy use and privacy
they figured it out that it’s CIA :)