@0xmrtn But only if you don't want to sleep yourself of course. 😜

For reference: that's a major antivirus vendor. And there is a very obvious correct way to do this. In fact, I think it's the first time I see somebody mess this up.

Show thread

The code below is from a browser extension. Question: what does it do when executed in Firefox?

let script = document.createElement("script");
script.src = "chrome-extension://" + chrome.runtime.id + "/app/scripts/" + fileName;

Note that even the privacy policy on Firefox Add-ons doesn't mention why you need to generate a UUID for each user and send it along with each database update (not merely telemetry requests). Nor does it explain the impact of that telemetry setting.

Show thread

Hi @Malwarebytes@twitter.com, do you have a proper privacy policy for your Browser Guard extension? The one under addons.mozilla.org/en-US/firef is unformatted, so it is unreadable (yes, formatting is supported here). And the link from Chrome Web Store is generic info, not for the extension.

@leip4Ier Sure, these experiments suffer from human assumptions. All the more reason to doubt a video which shows these very human assumptions validated. 😜

@leip4Ier I'm only half believing what I see there. Supposedly, cats cannot recognize themselves in a mirror, much less try to find their ears. So I wouldn't be surprised if the whole thing was staged somehow. But it's really fun to watch.

@jiefk Yes, so far Riot still shows most potential despite the shortcomings. And I'm explicitly not saying "Matrix" because as of now there is no real selection of usable and secure clients.

Will continue looking but I have little hope to still find a good Signal replacement.

@jr Mind you, I'm not blaming the devs. I've been there myself, I know exactly how this happens. Doesn't mean that I have a simple answer. There is a reason why mature projects don't let developers design user interfaces.

@jr It's not really an isolated incident. It's a general symptom of a UI which wasn't designed with less knowledgeable users in mind. And opening issues only gets you so far...

@jr Yes, that for example. When registering I had to enter a user name and select a server, yet it expected me to compose a Jabber ID myself when logging in. And it genuinely confused me when I tried to join a channel, I didn't realize that channel IDs were composed in the same way.

Maybe and its forks are good clients. From what I've read there should be solid end-to-end encryption enabled by default. But it's only one client on one platform. And other clients have wildly inconsistent encryption support, same issue as with .

Show thread

I did not bother installing /Psi+ any more. These messengers still try hard to imitate the ICQ client as well as contemporary IRC clients. Judging by discussions, encryption is not only not default, there are issues enabling it at all. Encrypting files is unsupported.

Show thread

Next one was which looks better but expects knowledge of things like identifiers without providing any explanation when something is wrong (yes, version 0.1). Here as well, encryption isn't the default. At least the discussions are younger. github.com/dino/dino/issues/84

Show thread

I started looking into clients with end-to-end-encryption support. First one was , with its "charming" 90s messenger style. Encryption isn't the default here however, no progress on the corresponding issue. dev.gajim.org/gajim/gajim-plug

Note that with a central server instance one has many of the same concerns - but compromising a server is a bigger hurdle than running a bunch of OpenDHT nodes, and there is also a higher chance that some irregularities will be noticed.

Show thread

That's the issue I see here: end-to-end encryption is great, but a setup where any party can start collecting metadata fairly easily probably isn't too privacy-friendly. And the issue is known of course, so devs recommend using VPN or Tor.


Show thread

And not just that, these nodes (presumably run by the project) can see who is talking to whom as they deliver messages.

What if NSA or somebody else decided to run a dozen nodes? How much of the network graph would they see this way?

Show thread
Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.