this post was submitted on 15 Apr 2024
168 points (100.0% liked)

traaaaaaannnnnnnnnns

931 readers
233 users here now

Welcome to /c/traaaaaaannnnnnnnnns, an anti-capitalist meme community for transgender and gender diverse people.

  1. Please follow the Hexbear Code of Conduct

  2. Selfies are not permitted for the personal safety of users.

  3. No personal identifying information may be posted or commented.

  4. Stay on topic (trans/gender stuff).

  5. Bring a trans friend!

  6. Any image post that gets 200 upvotes with "banner" or "rule 6" in the title becomes the new banner.

  7. Posts about dysphoria/trauma/transphobia should be NSFW tagged for community health purposes.

  8. When made outside of NSFW tagged posts, comments about dysphoria/traumatic/transphobic material should be spoiler tagged.

  9. While this is mostly a meme community, we allow most trans related posts as we grow the trans community on the fediverse.

If you need your neopronouns added to the list, please contact the site admins.

Remember to report rulebreaking posts, don't assume someone else has already done it!

Matrix Group Chat:

Suggested Matrix Client: Cinny

https://matrix.to/#/#tracha:chapo.chat

WEBRINGS:

Transmasculine Pride Ring flag-trans-pride

founded 1 year ago
MODERATORS
 

Tennessee has recently passed a bill, effective July 1st 2024, declaring it a class-C felony to "recruit, harbor, or transport an unemancipated minor within this state" for transgender healthcare procedures, carrying a sentence of 3-15 years in prison. This applies over state lines and states that do not have anti-extradition laws relating to trans rights can extradite you to Tennessee.

Notably: the bill is vague. This means: telling stories of your own transition, describing your healthcare experiences to an open group chat, describing your trans experiences on a public website, creating trans health guides online, describing how you have gotten DIY HRT, describing anything to do with trans healthcare, even as a cis person, can result in a class-C felony conviction.

Given that being arrested in any capacity for transgender people can be an incredibly dangerous experience (CW: SV), I strongly suggest you begin caring about opsec, stop referring to where you live, use VPNs, stop using apps like Discord, and stop using social media sites that track your IP or user agent fingerprint while unprotected. Remember that for a bill like this to be challenged in court, you have to be arrested first.

Will discuss creating / linking to a transgender matrix chat so that we can help people to move off of things like discord.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 5 months ago* (last edited 5 months ago) (2 children)

For one-to-one comms Signal is easier to get started with. Matrix requires a hosting service (or just reliance on the main matrix.org instance), or trust in a server administrator to run one. But it is good software. But unfortunately for group chat it's not as easy to get started as Discord, due to the encrypted nature of Matrix. But Discord shouldn't be considered secure or private, not really. It's just more proprietary spyware, at the end of the day.

Certainly, no matter what, no SMS.

[–] [email protected] 12 points 5 months ago (1 children)

Signal is incredibly dangerous, it's a US hosted and domiciled company, and they have a legal obligation to forward anything they know about you to the federal government if asked.

[–] [email protected] 3 points 5 months ago (2 children)

I wouldn't knock it until I learn of a situation where Signal handed data over to the government that wasn't encrypted mishmash or derived from side-channel that wasn't specifically related to Signal (the app or the protocol) itself. I do fully agree, however, that a phone number as a registration ID is bad.

But as it stands I don't consider the point that it's located in the USA to be fully incriminating. Just as I don't find it a problem that Matrix and Vector Creations were an offshoot from an Israeli tech company*. The protocol, and how it functions, are what matters.

*And yes, the major caveat here is that you can inspect and run the Matrix server code (Synapse or Dendrite), but not the Signal server code.

[–] [email protected] 7 points 5 months ago (1 children)

Read the section on NSL's (national security letters) in the link above. Any US domiciled company must give up it's data when asked, and it's illegal for them to tell their users they were forced to do so. The Obama regime admitted to issuing 60 of these every single day, there's no way Signal isn't compromised.

Matrix doesn't need to be hosted in the US, so they don't have that problem. Using any US-hosted service is a big no-no.

[–] [email protected] 1 points 5 months ago* (last edited 5 months ago)

This is neither new information, nor something overlooked in the design of the software. Thats the point of end to end encryption and open source code: they can only give the data that they have access to, which is the sender, receiver, and timestamps, but we know they cannot decrypt messages in the middle, because it would show in the security implementation in the source code. This model prevents the carrier from knowing the contents of any messages they carry. Therefore, you have to attack one of the end point devices to get the contents, and all the warrants and secret letters in the world can't compell then to give up the content of your messages, because they do not have the means to do so.

There are legitimate problems with the security model, like its use of phone numbers as account identifiers, that render it a poor choice for doing Certain Things, but that alone does not prove it was designed as a honeypot, or that it has been secretly compromised in some way that can't be seen in the source code.

[–] [email protected] 5 points 5 months ago

This really is worth emphasizing, because there are cases where we can reason about the kinds of exploits and vulnerabilities that do happen based on what we learn after the fact, or based on things that companies say they do or must do by implication even if they don't outright say it.

For example, I do not recommend Apple's iMessage. Why? It's an encrypted chat service, after all.

It's because when you use iCloud Backup they store the private keys. If they hold the private keys, they can decrypt the encrypted data whenever they're subpoenaed or whatever else. So if either party (you or your recipient) has this common feature enabled, your entire chat history is up for grabs. Apple themselves basically say as much here https://support.apple.com/en-gb/guide/security/sec3cac31735/web

Available-after-authentication service keys: For other services, such as Photos and iCloud Drive, the service keys are stored in iCloud Hardware Security Modules in Apple data centres, and can be accessed by some Apple services. When a user signs in to iCloud on a new device and authenticates their Apple ID, these keys can be accessed by Apple servers without further user interaction or input. For example, after signing in to iCloud.com, the user can immediately view their photos online. These service keys are available-after-authentication keys.

Bonus reading. https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT/

[–] [email protected] 11 points 5 months ago (3 children)

Didn’t Signal recently get outed as having a back door?

[–] [email protected] 13 points 5 months ago (1 children)

Honestly, as long as you're using a phone, you're at risk. As LLMs becomes more portable it's just a matter of time before our own phones will narc on us. Most of them already have some sort of ocr /image describer process happening on our photo rolls.

[–] [email protected] 18 points 5 months ago (1 children)

I think that’s where threat modeling comes in. Unfortunately, if you’re threat modeling against the US government, you’re mostly relying on the laziness and ineptitude of some random LEO to not follow through on looking into you further. You can absolutely make things better, but if you get a target on your back you’re fucked. There’s a reason Snowden’s in Russia.

[–] [email protected] 7 points 5 months ago (2 children)

Personally, I think we need some of our more electronically inclined comrades to start thinking about putting the punk in our cyber dystopia. Microcontrollers like the ESP32 are cheap and capable enough that we could be building devices that are less complicated and more singularly focused on getting people connected to tor based sites or something along those lines.

[–] [email protected] 9 points 5 months ago (1 children)

people are trying. Well idk about tor specifically but a decent number of people are working on linux phones, or simpler open source devices along those lines. Problem with a torphone or whatever is at some point you need to connect, whether it's to wifi, 4G, etc. and that's where you're going to see bottlenecks, surveillance, attempts at blocking tor, etc. Plus most people don't want to be that secure, they want to be able to use normal apps, calling, texting, etc.

Honestly a wifi-only tor messenger would be interesting but I'd have to do some research to see what sufficiently paranoid messaging stack exists and whether it can run on low power devices.

[–] [email protected] 8 points 5 months ago (1 children)

Problem with a torphone or whatever is at some point you need to connect, whether it's to wifi, 4G, etc. and that's where you're going to see bottlenecks, surveillance, attempts at blocking tor, etc.

Wifi is plentiful and often easily cracked.

https://youtu.be/1ibg0tgVugY

One of the first topics I cover whenever I'm in a new study group is wifi authentication handshakes and some of the many ways to capture them.

https://youtu.be/dZwbb42pdtg

Specifically, with a $6 esp32

https://github.com/risinek/esp32-wifi-penetration-tool -this is not ideal as it requires the esp32 disconnecting from the user in order to do the sniffing. But it's the perfect starting point. Much better would be a serial based menu or a Bluetooth app to control it, imo.

These authentication packets can then be cracked using hashcat and your basic gaming PC with GPU.

https://youtu.be/Usw0IlGbkC4 - disclaimer, I haven't watched this video. Just a random hashcat vid I'm sure there's something better out there.

My mindset is largely something like this:

I don't expect your average person to be out there flashing an esp32 or anything, but every group should have a tech person that can teach their people these basic concepts and provide them with hardware like an esp32 to do it with. Imo, we need like a basic set of best practices and tutorials that every group's tech person can draw from to support their people. Heck, we probably need a manual that covers something like that for each role. Turnkey leftist group manual, if you will.

[–] [email protected] 2 points 5 months ago (1 children)

I found YouTube links in your comment. Here are links to the same videos on alternative frontends that protect your privacy:

Link 1:

Link 2:

Link 3:

[–] [email protected] 6 points 5 months ago

regular people aren't going to deal with multiple devices like that. smartphones are worse at every end-user function they provide than a dedicated device (except maybe cameras, although you wouldn't hold a regular ass camera the wrong way when taking pictures...) but they're decent enough and you only have to keep track of one thing.

shit i know better and i'd sooner replace a smartphone with nothing than carry around six different things to replace it.

[–] [email protected] 4 points 5 months ago (1 children)

Can you post a source? Because I haven't heard such a thing.

[–] [email protected] 4 points 5 months ago

There have been rumors for years but as far as I know nobody has been able to substantiate the claim. The organization that eventually produced Signal, Open Whisper Networks, received some seed funding from the Broadcasting Board of Governors (today known as the US Agency for Global Media), from which has been spun some CIA fronts like Radio Free Asia. However, this is also true of Tor, and many other non-profit private communications projects during this time, and does not itself prove any technical subversion has taken place. The source code for both the server and client are open source, and have been subject to frequent scrutiny, including full independent audits and penetration testing. No backdoor has ever been shown to exist in the code itself. Beyond that, people mostly gesture towards Moxie Marlinspike's radlib posturing and bad hair and invite people to Draw Their Own Conclusions.