Giter Club home page Giter Club logo

banning-e2ee-is-stupid's People

Contributors

davidchisnall avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

banning-e2ee-is-stupid's Issues

Exchanging "Extra-Encrypted Message" itself being a "Message"

Is it possible that, if a censorship third party gets a way to distinguish cleartext messages and encrypted messages underneath the message exchange platform, they may be able to infer that someone is doing something interesting. (And, they simply block it). For example, the following observation comes from a firewall technology:

We find that, instead of directly defining what fully encrypted traffic is, the censor applies crude but efficient heuristics to exempt traffic that is unlikely to be fully encrypted traffic; it then blocks the remaining non-exempted traffic. These heuristics are based on the fingerprints of common protocols, the fraction of set bits, and the number, fraction, and position of printable ASCII characters.

https://www.usenix.org/conference/usenixsecurity23/presentation/wu-mingshi

Rubber hose method

Nice write-up and sample implementation. One issue I foresee is that in the event e2ee is banned, anyone found to be using it in any form (including this one) is:
A) Automatically suspect of being up to no good, possibly providing probable cause (excuse) for point B.
B) Subject to being arrested/detained/beaten with a rubber hose/etc. - actual details depending on regime in power and whoever you find yourself in the hands of.

So much like the DMCA - sure you can bypass the rule by technical means, but doing so will itself be illegal and subject to punishment.

Having given the FBI//MI5/moral equivalent in your country probable cause, they may react with a warrant, confiscate all of your electronic devices and let you sit in limbo for years wondering if you will be charged with anything. Not fun, even if they don't beat you or lock you up.

QED: We're all screwed.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.