

Here’s a relevant stack exchange question. Regarding what an ISP can learn. Of note, everybody is ceding that the ISP can tell you’re using signal, and they’ve moved on to whether or not they’d be able to fingerprint your usage patterns.
Here’s a relevant stack exchange question. Regarding what an ISP can learn. Of note, everybody is ceding that the ISP can tell you’re using signal, and they’ve moved on to whether or not they’d be able to fingerprint your usage patterns.
Any number of other people. Primarily the government.
Right, so if the header isn’t encrypted, it’d be trivial for them to see who you’re sending to, which is why that’s important.
You never answered my question - do you think the network connection itself is encrypted? Or just the content of the messages?
You’re talking about encryption and signal because you’re worried about folks whose network you’re connected to being able to invade your privacy, right?
I’d say it’s a pretty reasonable suggestion to say we start with those guys. If you don’t worry about those guys, who do have access to traffic info, then why bother with encryption?
If the header isn’t encrypted it’d be easy to inspect, and thus easy to determine where it goes, which is why it matters.
Based on your questions, it sounds like you’re expecting the network traffic itself to be encrypted, as if there were a VPN. Does signal offer such a feature? My understanding is that the messages themselves are encrypted, but the traffic isn’t, but I could be wrong.
Would you? Are the headers encrypted?
How are they analyzing network traffic with Signal? It’s encrypted
Not my specialty, but signals end to end encryption is akin to sealing a letter. Nobody but the sender and the recipient can open that letter.
But you still gotta send it through the mail. That’s the network traffic analysis that can be used.
Here’s an example of why that could be bad.
How exactly do you think encryption prevents the analysis of seeing when an encrypted message is sent? It feels like you’re trying to hand-waive away by saying “encryption means you’re good!”
Cyber security is not my thing, but my understanding is that you’d still see network traffic - you just wouldn’t know what it says.
Reusable rockets, in particular.
Imagine having a reusable car in a world where they were all disposable.
This does sound like it could be a liability issue if not done correctly
Louis Rossman, a strong advocate for the right to self-repair, has an extensive, bottom to top guide on self hosting your own services. It starts from introducing what a modem is and what role it plays, and it ends with an entirely self hosted cloud. It comes in article as well as 13 hour video form. I would highly recommend this to anyone looking to get started self hosting - it doesn’t just introduce software you should learn, but it also shows you how to configure it.
If we revisit the “loud” vs “statistically significant” paradigm, while it is a shame you will not be able to charge the phone with a dac in without buying a specific cable, how often does the average person do so?