this post was submitted on 15 Apr 2024
87 points (94.8% liked)

Privacy

31814 readers
312 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I'm thinking of the things listed on the Privacy Guides real-time communication section

https://www.privacyguides.org/en/real-time-communication/

you are viewing a single comment's thread
view the rest of the comments
[–] ryannathans@aussie.zone 3 points 6 months ago (1 children)

Most people who care* I guess would be more apt

[–] jet@hackertalks.com 1 points 6 months ago (1 children)

For the people who really care, they can disable The pin. I believe the client will generate a BIP 38 password randomly, and use that for the data encrypted in the SVR. But all the data is still uploaded to the cloud. So if there's a problem with the SVR encoding, the BIP 38 password generation etc the data is still exploited

Not only do you have to care, everyone you talk to has to do the same thing, because if your counterparty has their key in the cloud, the conversation is at risk.

[–] ryannathans@aussie.zone 2 points 6 months ago (1 children)

Regardless, the master key is never uploaded

[–] jet@hackertalks.com 1 points 6 months ago* (last edited 6 months ago)

All the bits to reconstruct the master key minus the pin code are uploaded. So it's equivalent to uploading to the cloud The master key itself.

Very few people are using BIP 38 level passwords. So the vast majority of people have their key constructively uploaded fully in the cloud