2
submitted 1 year ago* (last edited 1 year ago) by dingdongitsabear@lemmy.ml to c/simplex@lemmy.ml

like, if I send the QR code to someone I want to talk to via email, anyone intercepting this message will at the very least know my SimpleX address; same thing if I send it via messenger.

edit: let's assume we don't have an established and trusted channel. furthermore, they're not expecting this info.

top 4 comments
sorted by: hot top controversial new old
[-] Eggroley@lemmy.world 3 points 1 year ago

Send the address and delete it after you've verified that the recipient is in your simplex contacts. You can verify via security code. You'll know when they use the link. Delete the address afterwards.

[-] hetzlemmingsworld 2 points 6 months ago

Maybe ask them to establish private (end to end encrypted - E2EE) communication channel by using PGP or ask them to use the service like proton.me which has E2EE mail. If they know some answer to your question, you can send them link to an password protected paste at https://bin.disroot.org

[-] jet@hackertalks.com 1 points 6 months ago

Without face-to-face communication, you cannot guarantee you haven't been man in the middle MITM.

One of the benefits of public key cryptography, is everybody can publish their public key, and then you can have a reasonable assurance that you're talking to the appropriate person, cuz you can see the key, they can see the key, so in theory you have verified the key.

With simple x, if one of you publishes a known non-incognito, static receive address. IE on your public website, or in your letterhead, or something, then the other side knows they're talking directly to you. You don't know you're talking directly to them. Or at least to the published address

If you want to talk to somebody, in a deniable way, then you probably should not be sending them direct mail. Meet them in person, exchange addresses that way, use briar, something.

[-] HandwovenConsensus@lemm.ee 1 points 1 year ago

Well, there's not much they can do with the QR code. You can deactivate it as soon as you've made contact and established proof of identity with the recipient.

But, if it was really important, there are cryptographic key-exchange protocols you can do even over an insecure connection. The Diffie-Hellman key exchange is one of them. Using something like that, you can derive a shared secret key even if someone's listening.

But personally, I would just break it into two parts, and send one by email and one with pastebin's "burn-after-read" option.

this post was submitted on 22 Jul 2023
2 points (100.0% liked)

SimpleX Chat

300 readers
1 users here now

Community of SimpleX Chat users โ€“ managed by the team.

SimpleX Chat is the first chat platform that is 100% private by design โ€“ it has no user identifiers of any kind and no access to your connections graph โ€“ it's a more private design than any alternative we know of.

Please ask any questions and make feature suggestions. Your ideas and criticism are very welcome!

https://github.com/simplex-chat/simplex-chat

founded 2 years ago
MODERATORS