• 119 Posts
  • 1.04K Comments
Joined 6 years ago
cake
Cake day: April 17th, 2019

help-circle






  • But they don’t have to know who the message comes from, hence why the sealed sender technique works.

    Anyone who’s worked with centralized databases can tell you that even if they did add something like that, with message timestamps, it’d be trivial to find the real sender of a message. You have no proof that they even use that, because the server is centralized, and closed source. Again, if their response is “just trust us”, then its not secure.




  • They have your phone number (meaning your full identity, and even current address), and as the primary identifier, it means they have message timestamps and social graphs.

    Its impossible to verify what code their server is running. Or that they delete their logs, because they say they do? You should never rely on someone saying “just trust us”. Truly secure systems have much harder verifiability tests to pass.