• @sbv
    link
    English
    547 months ago

    It’s bizarre that Sunbird touted their solution as end-to-end encrypted, when it can’t be - iMessage drops to plaintext on the Mac farm.

    • @[email protected]
      link
      fedilink
      English
      157 months ago

      Well not sure about Sunbird. Beeper advertises this also but it’s not entirely untrue. It’s E2EE from the sender to your Beeper server, where it’s decrypted, then re-encypted as a Matrix message. But it’s all open source so you can see what’s going on.

      You can get around this vulnerability by hosting your own Beeper server.

      • @[email protected]
        link
        fedilink
        English
        397 months ago

        While it’s a good solution, it is entirely untrue. A message is either End to End Encrypted or it is not. If the message is decrypted at any point between the sender and the intended recipient, it is definitively not End to End Encrypted.

        • @[email protected]
          link
          fedilink
          English
          -67 months ago

          While it’s a good solution, it is entirely untrue.

          It’s not though. It’s still encrypted from beginning to end. It just changes encryption in the middle.

      • @[email protected]
        link
        fedilink
        English
        247 months ago

        E2EE means it’s End-to-End Encrypted. If it’s decrypted at any point during transit then it’s by definition not E2EE and Beeper shouldn’t be making that claim.

      • Skull giver
        link
        fedilink
        English
        20
        edit-2
        7 months ago

        [This comment has been deleted by an automated system]

        • @[email protected]
          link
          fedilink
          English
          17 months ago

          Now you’re back to “all of my messages can be stolen if a server gets hacked” again

          Except you’re not because your decrypted messages aren’t stored anywhere.

      • @[email protected]
        link
        fedilink
        English
        9
        edit-2
        7 months ago

        It’s E2EE from the sender to your Beeper server, where it’s decrypted, then re-encypted as a Matrix message.

        Then it’s not E2E encrypted.

        One end is your device, the other end is the other device. It’s only E2E encrypted if it is not decrypted until it reaches the other device.

          • @[email protected]
            link
            fedilink
            English
            77 months ago

            Sticking two E2EE tunnels together with a plaintext middleman doesn’t result in a single E2EE tunnel.

            The reason the distinction is important is because the security profile is vastly different—a compromised server leads to a compromised message—which isn’t true for actual E2EE services like a pure Matrix link.

            Side note: the first thing you should ask of a “end-to-end encrypted” product to you is “which ‘ends’ do you mean?” I’ve seen TLS advertised as E2EE before.

            • @[email protected]
              link
              fedilink
              English
              1
              edit-2
              7 months ago

              Adding: TLS is actually a pretty apt analogy here.

              You could make a chat server that just accepts plain text messages over a TLS link, and that’s basically the same security topology as with this Beeper bridge.

              But no one would call that a E2EE chat.

    • Dandroid
      link
      fedilink
      English
      97 months ago

      As someone who works in the tech industry, this is not surprising to me at all. Typically the people who communicate with the media and customers don’t know a single thing about tech. They don’t know what end to end encryption means. They know just know encryption is involved and they have heard the buzzword, so they repeat it.