• Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      22
      ·
      edit-2
      14 hours ago

      No they can’t.

      E: if someone wants to provide evidence to the contrary instead of just downvoting and moving on, please, go ahead.

          • Roughknite@lemm.ee
            link
            fedilink
            English
            arrow-up
            1
            ·
            14 minutes ago

            How dumb are you? Like someone said the point is they can see the fact that you sent a secured message period. Not with the guardian app though. Pretty easy to comprehend so I am confused why you are acting so stupid.

            • Ulrich@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              ·
              9 minutes ago

              Like someone said the point is they can see the fact that you sent a secured message period. Not with the guardian app though.

              The entire point of the article in the OP is that you can send secured messages with The Guardian app. 🤦‍♂️

          • I Cast Fist@programming.dev
            link
            fedilink
            English
            arrow-up
            4
            ·
            4 hours ago

            Packet data has headers that can identify where it’s coming from and where it’s going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal’s servers use (which is public information), it’s trivial to know when a device is sending/receiving messages with Signal.

            This is also why something like Tor manages to circumvent packet sniffing, it’s impossible to know the actual destination because that’s part of the encrypted payload that a different node will decrypt and forward.

            • Ulrich@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              6 minutes ago

              Packet data has headers that can identify where it’s coming from and where it’s going to

              Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

              This is also why something like Tor manages to circumvent packet sniffing

              TOR is what their already-existing tip tool uses.

          • papertowels@mander.xyz
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            4 hours ago

            How exactly do you think encryption prevents the analysis of seeing when an encrypted message is sent? It feels like you’re trying to hand-waive away by saying “encryption means you’re good!”

            Cyber security is not my thing, but my understanding is that you’d still see network traffic - you just wouldn’t know what it says.

          • Natanael@infosec.pub
            link
            fedilink
            English
            arrow-up
            3
            ·
            4 hours ago

            I run a cryptography forum

            Encryption doesn’t hide data sizes unless you take extra steps