• 12 Posts
  • 14 Comments
Joined 11 months ago
cake
Cake day: December 4th, 2023

help-circle







  • Damn

    now that I open few ports 9001

    I see incoming connection that are dropped because they use totally diffrent ports

    drop: IN=eth0 OUT= MAC=aMacadrs SRC=aIP DST=aMyIP LEN=64 TOS=0x00 PREC=0x00 TTL=48 ID=65508 DF PROTO=TCP SPT=443 DPT=50194 WINDOW=501 RES=0x00 ACK URGP=0

    privacy

    I’ve replaced some string with 'aSomething'

    .

    it’s weird in my nftable config file I have

    type filter hook input priority 0; policy drop;
    ct state established,related accept
    

    Any ideas ?












  • I’ve did some more digging.

    and Briar still remain better at security level !

    The big downside of SimpleX is that it’s not P2P and IP correlation by watching your traffic is possible.

    SimpleX recommend to use Tor on top of it with for example Orbot. That’s a good idea, but not the best to convince none-tech folks to adopt it. (it’s already so hard to change peoples habit… ) Tor should be embedded.

    As soon Tor is embedded I will migrate to it. SimpleX have nice thought features and it’s easy to use.


  • Thank you very much @jet@hackertalks.com & @Quexotic@beehaw.org

    The EFF article is really interesting for everyone. ( I was aware of this )

    Indeed no one should assume that his packets are not intercepted along the road. But conceive an software that on top of that, specifically route the traffic trough his server not make it better (on the opposite in my opinion)

    Even if the owner of those server do not process the data… ( This is relying on blind trust) those servers might be breached. (in addition to the systemic data recording, like in the EFF article )

    Let put it simple, is SimpleX offer on the actual Internet (can’t wait the next gen, GNUnet or anything similar) a similar level of Trust & privacy than Briar ?