"Encrypted". Emphasis on *transport cryptography! Signal etc mesages can be found in phone memory even after reboot. Someone should really hold a crash course on how to crypto on your devices from FS to messdate data over IP works:
*It's not your crypto, but a bunch of others, (strangers, dangers) people's crypto who's __word__ you accept for Gospel (trust us, we know best!:) Not to mention if your packets have reached correct end point and not one the CA just says it the expected one__!*
* You blindly trust a daisy chain of stranger's word that their code and their CA and they themselves are uncrackable & secure. Would you trust strangers insisting on being all in your secure bits?
* Most industry CA based. hardware does not disclose vulnerablities or noice that patches are incoming t the end user, they secretley fix after their lients, your servivce provder typically, has beengiven advisories. Those rarely are givenn to the en dus,t he customer, because of NDA or even lazyness, security by obscurity incomeptence etc.
Smart device encryption is an illusion where your trust strangers with legal/financial or Intel motives to betray it, but call strangers fancy names like CA, ROot of Trust, etc.
The entire ecosystem of trust based device security crypto is to ensure their access to your daa, securely. Not to secure your data from them or the OEM, and TLS padlocks simply means the CA told your app whtever certificate pres4ented is the right one, green lighting you and that endpoint to negotiatie encryption, so for all you know you aor your app could be negotating encryption with the US FBI or $APT.
* CAs do get compromised by attacker, nation states & researchers,, encryption standards do get backdoored, with weak implementations or even kleptographic ones.
q: Why is the US FBI causing panic about suppposed chinese hacking isntead of contacting us service provides who can enable 4g / LTE IPSEC transport, supported by all certified handsets and USIM, yiuelding telecom network infratrcture acccess a moot point since ipsec tunnel is from you to your service provider and their end point.
A: You are victims of on-going psyop conditioninig you to trust blindly!
Do not fall for the temptation: Every part of the daisy chain of trust providers have insentives to screw you over at their whim...and then there is all the code they + you rely on to bootstrap that daisy chain of naive trust..
It is funny how they hate encryption because they want to spy on people and try to justify it by saying people share child porn and terrorists use it etc. But they start recommending it when it conflicts with their interests. Or it is not funny and it is just the way governments and companies work
Respond to my comment with your recommendation(s) for apps that allow or assist you in contacting others with encryption strong enough to keep out state-level attackers.
The problem is the law requiring the backdoor. If you build a door, people are going to figure out how to use it.
Anyone could have told you this is an inevitable outcome. Countless, in fact, did, and it was ignored. Reap the God blessed whirlwind at this point I guess.
They would have definitely known this beforehand. This implies it was more important to spy on US citizens than to worry about attacks from foreign governments and cyber criminals.
But surely there was never any well-known whistleblower who had to seek political asylum after revealing a decades-spanning underground surveillance program deliberately hidden from American citizens to prevent distrust and outcry against the compliant businesses that cooperated with warrantless surveillance.
* You blindly trust a daisy chain of stranger's word that their code and their CA and they themselves are uncrackable & secure. Would you trust strangers insisting on being all in your secure bits?
* Most industry CA based. hardware does not disclose vulnerablities or noice that patches are incoming t the end user, they secretley fix after their lients, your servivce provder typically, has beengiven advisories. Those rarely are givenn to the en dus,t he customer, because of NDA or even lazyness, security by obscurity incomeptence etc.
Smart device encryption is an illusion where your trust strangers with legal/financial or Intel motives to betray it, but call strangers fancy names like CA, ROot of Trust, etc.
The entire ecosystem of trust based device security crypto is to ensure their access to your daa, securely. Not to secure your data from them or the OEM, and TLS padlocks simply means the CA told your app whtever certificate pres4ented is the right one, green lighting you and that endpoint to negotiatie encryption, so for all you know you aor your app could be negotating encryption with the US FBI or $APT.
* CAs do get compromised by attacker, nation states & researchers,, encryption standards do get backdoored, with weak implementations or even kleptographic ones.
q: Why is the US FBI causing panic about suppposed chinese hacking isntead of contacting us service provides who can enable 4g / LTE IPSEC transport, supported by all certified handsets and USIM, yiuelding telecom network infratrcture acccess a moot point since ipsec tunnel is from you to your service provider and their end point.
A: You are victims of on-going psyop conditioninig you to trust blindly!
Do not fall for the temptation: Every part of the daisy chain of trust providers have insentives to screw you over at their whim...and then there is all the code they + you rely on to bootstrap that daisy chain of naive trust..