WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2026 Poal.co

1.4K

If the underlying layers are completely hosed, how reliable or safe can these apps really be? Even assuming full blown TLS and SSL, I'm still not convinced these apps are that good. For example, Signal doesnt allow you to set a conversation password or cert, which makes me think it's nothing more than giving false hope to idiots

If the underlying layers are completely hosed, how reliable or safe can these apps really be? Even assuming full blown TLS and SSL, I'm still not convinced these apps are that good. For example, Signal doesnt allow you to set a conversation password or cert, which makes me think it's nothing more than giving false hope to idiots

(post is archived)

[–] 0 pt

For $2200 I'll build you a system that not even the NSA could mathematically break, using good old fashioned one time pads based on high entropy random numbers.

Fuck signal.

[–] 1 pt

Then you have the problem of keeping the OTP secure at all ends of the conversation.

[–] 0 pt (edited )

Then you have the problem of keeping the OTP secure at all ends of the conversation.

I solved for that already.

A zero trust model is easy to come up with in one sitting, so I did.

Theres actually two approaches. One where a service (potentially selectable on the users side, much like torrent trackers) acts as a mediator for initial connection. And one where dedicated servers are more involved, but theres still no server-side decryption (tradeoff is latency because it requires multiple back and forth round trips for encrypting, sending, and decrypting on the other users end).

Number I wrote is what it would cost me to drop work right now, and build it. Once built though, it would only cost somewhere between $10 per user on the low end for one implementation, up to $35-40 per user on the high end implementation. Those are the actual numbers for the two specific implementations.

[–] 0 pt

Involving servers ain't gonna work unless there's an easy way for any user to verify that the encryption is happening locally and there's no way for the servers to have access to the keys. Unfortunately, that's impossible. A trojan horse app could easily encrypt stuff locally and slip the key in and encrypt it with the server's key. Everything looks good on the user's end. Things are encrypted locally. Then they send the message and the server decrypts it to get the key, which can be used to decrypt the message. The encrypted message can be forwarded on to the recipient.

Any system that "does the encryption for you" is suspect.