[LINK] session encrypted app
Kim Holburn
kim at holburn.net
Mon Oct 11 11:24:10 AEDT 2021
https://restoreprivacy.com/secure-encrypted-messaging-apps/session/
Desktop, Android and iOS apps
Lots of technical detail:
> Session messenger is making a play for the position as the best secure messaging app. In this, it is going up against some intense
> competition from the likes of Signal <https://restoreprivacy.com/secure-encrypted-messaging-apps/signal/> and the other top apps
> we cover in our Best Secure and Encrypted Messaging Apps review <https://restoreprivacy.com/secure-encrypted-messaging-apps/>. In
> this updated Session review, we’ll look at Session’s capabilities — both those active today and those comings soon.
>
> Signal merits special mention in this Session review. That’s because Session is a fork
> <https://en.wikipedia.org/wiki/Fork_(software_development)> of Signal, meaning that much of the guts of Session originally came
> from Signal. This is excellent since Signal has long been considered the most secure of the secure messaging services. Thanks to
> the excellent end-to-end (E2E) encryption provided by the Signal Protocol, Signal is about as secure as a messenger app can be.
>
> But Signal isn’t as strong on privacy as it is on security. It collects some metadata and doesn’t have a corporate sponsor like
> Facebook sucking up and monetizing that metadata. More importantly, *Signal requires you to submit a phone number* to create an
> account. Signal also relies on central servers to manage message flow and hold the metadata it does collect.
>
> Because Session is a fork of Signal, it inherited Signal’s strong security. From there, the Session team built an anonymized,
> decentralized system that provides superior privacy and anonymity for its users. Are you ready to learn more about this challenger
> for the throne of the best secure and private messenger app? Then let’s dive in with this Session review.
>
...
>
> Concerns about Australia and data security
>
> On the topics of privacy and the security of your data, we must discuss where Session is based. As noted above, Session is based
> in Australia. Unfortunately, Australia is not a very good privacy jurisdiction for a few reasons.
>
> As we recently discussed in our guide on the best VPNs for Australia <https://restoreprivacy.com/vpn/best/australia/>, the country
> passed a law to undermine encryption and data security in 2018. Here’s a quick overview
> <https://www.nytimes.com/2018/12/06/world/australia/encryption-bill-nauru.html> of this law:
>
> The Australian Parliament passed a contentious encryption bill on Thursday to require technology companies to *provide law
> enforcement and security agencies with access to encrypted communications*. Privacy advocates, technology companies and other
> businesses had strongly opposed the bill, but Prime Minister Scott Morrison’s government said it was needed to thwart
> criminals and terrorists who use encrypted messaging programs to communicate.
>
> The Loki Foundation that is behind Session addressed this thorny issue in a blog post
> <https://loki.network/2018/12/10/lokis-response-to-the-assistance-and-access-bill-2018/>:
>
> Obviously, we were terrified when we first saw this bill. The potential for the project to be entirely undermined by this
> legislation did not go unnoticed. We had begun to consider how we might set up failsafes to allow people to catch bad code
> being injected into our codebase, or to pay someone external to Loki to do regular inspections of our binaries that we release
> and ensure they are not leaking extra information or mismatching the codebase in some way. If we were to be issued a TCN
> [Technical Capability Notice], we would not be able to tell anyone about it. If we set up some sort of canary system, we could
> be imprisoned. So whatever failsafe we did set up would have to be external to Loki, and would have to be regularly auditing
> us to make sure we haven’t been compromised before a TCN was issued.
>
> Ultimately, the Loki Foundation believes they can still operate a secure messenger service in this perilous legal environment.
> Their blog post <https://loki.network/2018/12/10/lokis-response-to-the-assistance-and-access-bill-2018/> on the topic really goes
> deep into technical and legal details, which you can investigate if you have the time and inclination. In addition, they address
> the issue in the FAQ topic titled, ” Does the Australian government’s anti-encryption stance pose a risk to Session?” as well as
> in this update to their original blog post <https://loki.network/2019/12/06/the-assistance-and-access-bill-one-year-later/>.
>
...
>
> Other privacy concerns with Australia
>
> It’s also worth noting that the anti-encryption legislation is not the only privacy issue that plagues Australia. Consider this:
>
> * *Mandatory data retention* – In 2017, Australia implemented a mandatory data retention framework. This forces all internet
> providers and telephone companies to store connection data for government agencies for a full two years.
> * *Five Eyes* – We have also noted before that Australia is a member of the Five Eyes
> <https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/> surveillance alliance. This alliance works together to collect and share
> mass surveillance data.
>
--
Kim Holburn
IT Network & Security Consultant
+61 404072753
mailto:kim at holburn.net aim://kimholburn
skype://kholburn - PGP Public Key on request
More information about the Link
mailing list