Comment by blurb4969
Comment by blurb4969 5 days ago
OMEMO has its own flaws too
Comment by blurb4969 5 days ago
OMEMO has its own flaws too
Before my arrest (CFAA) I operated on Tor and PGP for years. I had property seized and I had a long look at my discovery material, as I was curious which elements they had obtained.
I never saw a single speck of anything I ever sent to anyone via PGP in there. They had access to my SIGAINT e-mail and my BitMessage unlocked, but I used PGP for everything on top of that.
Stay safe!
Would be curious to know (if you're willing to share) how you were found if you were working to obscure / encrypt your communications. What _was_ it that ultimately gave you away or allowed them to ID you?
I'd be curious as well, though I completely understand if they don't want to talk. Someone should write a book just listing the usual mistakes.
So what? Whether this matters depends on your threat model, but you present this as a universal concern. Yes, we know, and we use it appropriately.
"You have to use it correctly" is true for everything. Stop parroting garbage you read and exercise some critical thinking.
It's not a sock puppet in the usual sense. Every time I log in I create a new account, and it lasts until I get logged out for whatever reason. But I'm not having conversations between multiple accounts that I control, if that's what you mean.
Sorry, I don't pay attention to anyone who disses PGP. I don't care if it's easy to misuse. I focus on using it well instead of bitching about misusing it.
If there's one thing we learned from Snowden is that the NSA can't break PGP, so these people who live in the world of theory have no credibility with me.