Granted, the part

The globally recommended app by privacy and security experts, Signal, is now being downloaded massively and tops the Danish Google Play Store

is a little ironic, but you gotta push this winning tide and then work from that.

  • poVoq@slrpnk.netM
    link
    fedilink
    English
    arrow-up
    3
    ·
    18 hours ago

    Again, what is a “e2e connection”? There is no such thing and it is nearly impossible to distingish a e2e encrypted data stream inside a TLS connection from regular TLS encrypted connection.

    • plyth@feddit.org
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      17 hours ago

      Again, what is a “e2e connection”?

      It is a connection between network Endpoints. The connection that is e2e Encrypted.

      impossible to distingish a e2e encrypted data stream inside a TLS connection from regular TLS encrypted connection.

      IP ranges show which IP belongs to a server in a data center and which is an endpoint.

      • poVoq@slrpnk.netM
        link
        fedilink
        English
        arrow-up
        3
        ·
        16 hours ago

        Yes, but how do you distinguish between two identical TLS connections? You can’t and hence you can’t figure out if the content inside is additionally e2e encrypted. So what you are suggesting just doesn’t work technically.

        • plyth@feddit.org
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          16 hours ago

          The registry tells me if a connection is from an app that uses encryption that I can break. Everything else is suspect, needs investigation and after an introduction time, will be forbidden. Routers can easily discard everything that is not approved by the registry.

          • poVoq@slrpnk.netM
            link
            fedilink
            English
            arrow-up
            2
            ·
            16 hours ago

            How? You have two arbitrary computers exchanging TCP packets. There is no way to tell any difference.

            • plyth@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              ·
              16 hours ago

              As I wrote before, trustworthy apps register their connection at the registry.

              • poVoq@slrpnk.netM
                link
                fedilink
                English
                arrow-up
                2
                ·
                16 hours ago

                You are not making sense. You can register as many apps as you want, if there is no way to distinguish non-registered app traffic from regular internet traffic.

                • plyth@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  edit-2
                  15 hours ago

                  There is no need to distinguish the traffic. IP adresses and ports identify the streams.

                  The app creates a connection and registers both IPs and ports at the registry.

                  Then the app starts sending data.

                  The first router at an internet exchange point asks the registry if the IPs and ports are registered. If they are, the packets are delivered, if not they are dropped.

                  That way no unregistered app can exchange data.