Comment by causalscience
Comment by causalscience 5 days ago
Is that good? According to the wikipedia page it seems last stable release was 9 years ago. Is anyone using that? Last time I had a look at XMPP everybody was using OMEMO.
Comment by causalscience 5 days ago
Is that good? According to the wikipedia page it seems last stable release was 9 years ago. Is anyone using that? Last time I had a look at XMPP everybody was using OMEMO.
Sorry, I don't pay attention to anyone who disses PGP. I don't care if it's easy to misuse. I focus on using it well instead of bitching about misusing it.
If there's one thing we learned from Snowden is that the NSA can't break PGP, so these people who live in the world of theory have no credibility with me.
Before my arrest (CFAA) I operated on Tor and PGP for years. I had property seized and I had a long look at my discovery material, as I was curious which elements they had obtained.
I never saw a single speck of anything I ever sent to anyone via PGP in there. They had access to my SIGAINT e-mail and my BitMessage unlocked, but I used PGP for everything on top of that.
Stay safe!
Would be curious to know (if you're willing to share) how you were found if you were working to obscure / encrypt your communications. What _was_ it that ultimately gave you away or allowed them to ID you?
I'd be curious as well, though I completely understand if they don't want to talk. Someone should write a book just listing the usual mistakes.
So what? Whether this matters depends on your threat model, but you present this as a universal concern. Yes, we know, and we use it appropriately.
"You have to use it correctly" is true for everything. Stop parroting garbage you read and exercise some critical thinking.
OMEMO has its own flaws too
https://soatok.blog/2024/08/04/against-xmppomemo/