this post was submitted on 25 Mar 2025
992 points (99.3% liked)

politics

22568 readers
3795 users here now

Welcome to the discussion of US Politics!

Rules:

  1. Post only links to articles, Title must fairly describe link contents. If your title differs from the site’s, it should only be to add context or be more descriptive. Do not post entire articles in the body or in the comments.

Links must be to the original source, not an aggregator like Google Amp, MSN, or Yahoo.

Example:

  1. Articles must be relevant to politics. Links must be to quality and original content. Articles should be worth reading. Clickbait, stub articles, and rehosted or stolen content are not allowed. Check your source for Reliability and Bias here.
  2. Be civil, No violations of TOS. It’s OK to say the subject of an article is behaving like a (pejorative, pejorative). It’s NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
  3. No memes, trolling, or low-effort comments. Reposts, misinformation, off-topic, trolling, or offensive. Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
  4. Vote based on comment quality, not agreement. This community aims to foster discussion; please reward people for putting effort into articulating their viewpoint, even if you disagree with it.
  5. No hate speech, slurs, celebrating death, advocating violence, or abusive language. This will result in a ban. Usernames containing racist, or inappropriate slurs will be banned without warning

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.

That's all the rules!

Civic Links

Register To Vote

Citizenship Resource Center

Congressional Awards Program

Federal Government Agencies

Library of Congress Legislative Resources

The White House

U.S. House of Representatives

U.S. Senate

Partnered Communities:

News

World News

Business News

Political Discussion

Ask Politics

Military News

Global Politics

Moderate Politics

Progressive Politics

UK Politics

Canadian Politics

Australian Politics

New Zealand Politics

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] HubertManne@piefed.social 8 points 1 week ago (2 children)

I don't think anything can be proven unless you have admin rights to the server at all times. signals are encrypted every time they are sent encrypted. can it be turned off with a flag? does it run in dev without it for troubleshooting and if so is it impossible to enable in prod.

[–] greybeard@lemmy.one 2 points 6 days ago (2 children)

The server can't decrypt it if it doesn't have the keys to do so. It can be proven that private keys never leave the local device. It can also be proven that the proper public keys are being provided, and that the local device alerts on public key changes with a partner are announced.

Of course, nobody as part of the linked article did any of that verification, but still, a server doesn't need to be trusted to be functional.

[–] Gawdsausage@lemm.ee 1 points 6 days ago* (last edited 6 days ago) (1 children)

Doesn't matter. Signal desktop app can sync messages and be installed on compromised computers. One of the guys in the chat was in Russia visiting Putin. It would be trivial to sync the account to the app installed on compromised machines and basically become an invisible backdoor into every secure communication for that user. I have no doubt one of the users in the chat is setup like this.

[–] greybeard@lemmy.one 1 points 6 days ago

Oh, I'm not defending these dumb-asses doing illegal things to avoid systems setup to safeguard American and its people. They absolutely could have synced things to compromised devices. Just that Signal, themselves, couldn't do that.

[–] HubertManne@piefed.social 1 points 6 days ago (1 children)

I think we are more talking about can the server decrypt the data. Not that the data is encrypted.

[–] greybeard@lemmy.one 2 points 6 days ago (1 children)

In the case of signal, it is provable that it cannot. They do not hold the keys to decrypt. The closest risk is the server injecting a new public key into the conversation, which the Signal app will warn about.

[–] HubertManne@piefed.social 1 points 6 days ago (1 children)

Yeah I just don't get this. How does a person added to a chat get keys then?

[–] greybeard@lemmy.one 2 points 6 days ago (1 children)

Signal does hold the public keys for every user. But having the public key doesn't let you decrypt anything. You need the private key to decrypt data encrypted with the public key. So in a chat example, if you and I exchange public keys, I can encrypt the message using your public key, but only you can decrypt it, using your private key.

Signal does run the key exchange, which means they could hand a user the wrong public key, a public key which they have the private key for, instead of the other person's. That is a threat model for this type of communications, however, signal users can see the key thumbprints of their fellow chat participants and verify them manually. And once a chat has begun, any changes to that key alerts all parties in the chat so they know a change has happened. The new key wont have access to any previous or pending messages, only new ones after the change took place.

[–] HubertManne@piefed.social 1 points 6 days ago (1 children)

I mean I still don't see how it can be encrypted for a private key with the deryption at some point running through the server unless the members devices at some point communicate with each other without the server as an intermediary. Is that what happens at some point?

[–] Waraugh@lemmy.dbzer0.com 2 points 6 days ago (1 children)

The way they explained things is how it works, do you not understand how public/private key pairs are used in encrypted communications?

Does this picture help?

I’m not trying to be an ass if my post comes across that way, I’m just unsure of your level of knowledge so I don’t want to offend by providing basic level info if it’s not wanted.

[–] HubertManne@piefed.social 1 points 6 days ago (1 children)

my experience with public/private keys is ssh where I have logins in both places and I login without keys and move it to the .ssh file. That is what gets me. how is the key moved over for communication and if the server moves it then it could theoretically hold onto it. So in the picture above it takes the public key in step 2 and sends it on in step 3 which is used to encrypt the message. I just don't see how the public key in that case can encrypt the message but not decrypt it.

[–] Waraugh@lemmy.dbzer0.com 2 points 6 days ago (1 children)

An encrypted message requires the key pair to decrypt. So if I’m sending you a message I use your public key to encrypt, then you use your private key to decrypt. Only you have your private key. If I were going to sign something, rather than encrypt it, I would use my private key, then everyone could verify it was me by using my public key.

https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption

[–] HubertManne@piefed.social 1 points 6 days ago (4 children)

yeah I just don't see how you can encrypt something with a key and not be able to decrypt it with the same key (I looked at the khan academy thing and have seen others. I never got the math around it).

[–] greybeard@lemmy.one 1 points 6 days ago

So I and some others here have probably sounded a bit antagonistic to you, but good on you for asking and trying to understand. Public Key Cryptography feels like magic to me too, it's just magic that I've accepted exists without understanding the base math of it all. Without it, however, most of the security of the Internet doesn't work.

Even most symmetrical encryption (Like AES, which is how you are picturing encryption working) layers on asymmetrical encryption as a negotiation layer to share a key that both parties have but that nobody eves dropping can read. Then once the key is exchanged, they use that because symmetrical encryption is way easier for computers. But for short messages like Signal sends, it wouldn't surprise me if they stay asymmetrical for the entire communication.

[–] Arcka@midwest.social 1 points 6 days ago

That's literally the defining feature of asymmetric cryptography. There are many explanations of how it works which you can easily find. One example is the Wikipedia article: https://en.m.wikipedia.org/wiki/Public-key_cryptography

If you educate yourself and are still confused, you should probably just accept the fact that even though you can't understand the specifics, information encoded with the public key cannot be decoded with the same public key.

[–] Waraugh@lemmy.dbzer0.com 1 points 6 days ago

As an aside, if this is a topic that interests you, I recommend Code by Charles Petzold and The Code Book by Simon Singh. They are both exceptional books and very approachable.

[–] Waraugh@lemmy.dbzer0.com 1 points 6 days ago* (last edited 6 days ago)

While the public and private key are separate, they are mathematically related.

Say two large prime numbers are generated. Their product is used as part of the public and private keys. When you multiply two prime numbers together it is extremely difficult to “guess” what those two prime numbers were from the product, but if you have the private key you know the missing part of the equation that makes it difficult to reverse so you can easily reverse the equation and decrypt the message.