The most secure messenger | Choose the best



Rep: (333)
IFrIT1439 @ 17.07.18, 21:44*
* Skalana, for example, I compile, sign one key, skins here hashes compiled APK and original, but would you believe me?

You say that compiled will not work?



Rep: (403)
* skalana I'm not going to get you "chew" all the information about it on the net. You even F-Droid is not an authority.



Rep: (333)
IFrIT1439 @ 17.07.18, 21:52*
* Skalana, I'm not going to get you "chew" all the information about it on the net. You even F-Droid is not an authority.

Well, you represent that you compiled from source is not able to connect to the server. And when you are asked to justify proposing to prove the opposite. Where is the logic? And where does the F-Droid?



Rep: (311)
skalana @ 16.07.18, 23:54*
What specifically blobov?
binary :)
Where are they, for example, in repah rosalinuks the load to the source, if all types of open?
skalana @ 16.07.18, 23:54*
Uverzhdenie "
is my value judgment based on available information, including public statements Pavlik;)
skalana @ 16.07.18, 23:54*
In each secret chat, you can check the fingerprint of the other party’s key to ensure that there is no MITM attack.
Very easy to make a mistake when comparing the squares, which are not even colorful, but only shades of blue: grabli:
skalana @ 16.07.18, 23:54*
I will not even discuss the storage of contacts, since it does not concern the issue of security of correspondence in transit.
On the other hand it refers to the security of the whole.
skalana @ 16.07.18, 23:54*
To establish this fact (the correspondence of two nodes) telegrams is not necessary
Pinging between the addresses does not mean the conversation, it may be even correspondence not familiar people, for example, users of the torrent, and the like, and need technical possibility of packet sniffing.
In addition, there is a VPN, proxy, torus, etc.
A telegram using metadata can establish that no exchange of packets between the IP-addresses, namely communication of specific subscribers, and is available to any interested person, and even do not need to know the IP.
skalana @ 16.07.18, 23:54*
What does this have to do with the security of the content of the correspondence in transit between the interlocutors?
It refers to the security of the whole.
skalana @ 16.07.18, 23:54*
The source code is open and posted on githabe.
As advertising noodles for the faithful of "open": rabbi:
And in fact not open. Update, such as gugloplee there this month and it is not only for 7 months, and the last githabe Komichi 7 months ago. Openness ancient version does not guarantee the safety of the newest versions.



Rep: (19)
VC



Rep: (403)
* MrLinuxCore , The same as the telegrams. It's better, my way enjoy!



Rep: (403)
IFrIT1439 @ 3.03.18, 23:28*
The safest way to communicate!

ProtonMail server and ProtonVPN suffered DDoS attacks.
Dear ProtonMail Community,

We want to give everyone an update regarding the connectivity issues some of you may have experienced recently. Over the past couple of days ProtonMail has been under extremely heavy DDoS (Distributed-Denial-of-Service) attack.

During these incidents, some users may have experienced intermittent connectivity problems or delays sending / receiving emails. We are working closely with engineers at Radware, our DDoS protection provider, to resolve these issues. At this time, the attacks are still continuing.

Despite the intermittent connection problems, no emails were lost, no data was lost, and no data was breached. In any case, we utilize zero-access encryption which keeps your emails secure even in the event of a breach.

While ProtonMail defends against DDoS and other cyber attacks on a daily basis, the attacks we faced this week posed a particularly difficult challenge because it is a new type of DDoS from a previous unknown network of compromised devices. To assist in the attack mitigation effort, we have partnered with F5 Networks to help deal with this new threat.

Our infrastructure team and the Radware and F5 Network engineering teams have put in a huge effort while working around the clock to manage this new threat. As a result of their hard work, most of the attacks in the past 24 hours have been well mitigated with minimal user impact.

We understand how important it is for ProtonMail to be not only secure and encrypted, but also always available. It is essential for the millions around the world who depend on us, and essential for our mission of making privacy and security accessible to all.

This mission is challenging. There will be setbacks from time to time, and there are also those who wish us harm. However, we have your support, and a team of experts, which will allow us to overcome these challenges.

We would like to thank you for your continued support and understanding. We will not stop fighting for you, and for your right to privacy and security.

Best Regards, The ProtonMail Team



Post has been editedIFrIT1439 - 26.07.18, 08:34



Rep: (333)
IFrIT1439 @ 26.07.18, 08:31*
The safest way to communicate!

Why all these difficulties.
Shifruesh text file or PGP and sends any convenient way.



Rep: (403)
* skalana And supercomputers, huge "global" botnet? Bruteforce!



Rep: (333)
* IFrIT1439 , will not help



Rep: (403)
* skalana , will help. It is only a matter of time.



Rep: (311)
IFrIT1439 @ 27.07.18, 10:49*
It is only a matter of time.

By the time I will be able to decipher the result is already fucking nobody wants to be :)



Rep: (333)
IFrIT1439 @ 27.07.18, 10:49*
* Skalana, will help. It is only a matter of time.

Does not help, learn materiel :)



Rep: (403)
* skalana , Well, why? Choose the private key to the public.

* Dr.Livesey , Whichever results.



Rep: (333)
IFrIT1439 @ 27.07.18, 18:08*
* Skalana, well, why? Choose the private key to the public.

Capacity is not enough.



Rep: (403)
* skalana Enough!
IFrIT1439 @ 27.07.18, 1:32 *
supercomputers, huge "global" botnets



Rep: (333)
* IFrIT1439 , A drop in the sea, zero.



Rep: (403)
* skalana For one millisecond, may drop in the ocean, and for a year - the ocean!

Post has been editedIFrIT1439 - 27.07.18, 22:54



Rep: (333)
* IFrIT1439 , The ocean got through hundreds sextillions sextillions years.



Rep: (403)
* skalana If you use a processor from the camera - yes!

Posted 27/07/2018 23:00:

skalana @ 27.07.18, 22:55*
hundreds sextillions sextillions years
ahem, this number is not! About the scientific notation numbers have not heard ?! About Google Plex?

Themselves have calculated? : Rofl:

Post has been editedIFrIT1439 - 27.07.18, 23:00


Full version    

Help     rules

Time is now: 24/05/20, 11:59