this post was submitted on 25 Nov 2023
62 points (87.8% liked)

Privacy

31982 readers
287 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Basically I am looking for a messaging platform like signal or? but with anonymous signup, perfect forward secrecy, capable of video chat, sending photos the usual uses in today's life. But with a panic button. So that any party member could use said button to wipe all other members devices of any data instantly inside the messaging app. So if one member gets compromised, or lost their device, stolen device ect, any other member could wipe all chats, call log, and any other data strictly inside the messaging client instantly for everyone involved. Disolving the group like it never existed rendering the data unrecoverable. Amazons Wickr used to have most of these features but it is being discontinued December 2023 and who trusts amazon with their data. Does something like this exist? Sorry if I'm not explaining it well I'll do my best to clarify and update this post. I am not trying to delete the whole device. Just the data inside the messaging app. If that does not exist. What about a separate app that could delete the entire messaging platform from the device when triggered. Assume all necessary requirements are met and this is for daily use. Between a group of trusted parties.

Updated wording to clarify the objective as replies where getting misunderstood.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 13 points 11 months ago (2 children)

The greatest weakness in any Enterprise are the people, not the technology.

You just have to look at all of the people who recorded signal chats in both the ftx, and the Trump trials. As soon as people think they're in danger, they're going to look for anything they can use as leverage. They'll use another phone to take a photo of their first phone.

Even if you communicate with people using ephemeral read once messages, that doesn't stop them from recording it themselves. There's no guarantee the data gets deleted on the other end, they could be using a modified client, the desktop app is a horrendous security nightmare, if they view that ephemeral message on the desktop app there's no guarantee it's actually deleted.

Depending on your threat model, you can incorporate technology with ephemeral messaging into your use case. But you have to be very clear, about what your threats are, and what your tolerances are.

There's a reason certain highly sensitive organizations use skifs... Only organics are allowed to go in, and only organics are allowed to leave.

[–] [email protected] 4 points 11 months ago (2 children)

There's a reason certain highly sensitive organizations use skifs... Only organics are allowed to go in, and only organics are allowed to leave.

...flat bottom open boats? Like, on a lake or something?

[–] [email protected] 2 points 11 months ago

They mean scif

Basically a secure office building room where individuals can talk sensitive info

[–] [email protected] 1 points 11 months ago

Using scifs is widely known and of course a good addition to certain threat models. But doesn't account for distance of individuals. My post was inferring distance between parties. That is why I talked about messaging clients and their features. For times when parties cannot possible be in person, also this is for everyday use not one time, I'm asking about a messaging client and feature set. Otherwise very good info here for others to learn and read on. Good post! FYI its worth reading on Pegasus and their zero click infection capabilities and multiple zero day exploits.