Forwarded from 安逸🕊️
Signal and Telegram are both messaging apps that emphasize privacy and security, but they have several key differences in terms of features, encryption, and overall approach to user data:
### 1. Encryption
- Signal: It uses end-to-end encryption (E2EE) by default for all conversations, including one-on-one chats, group chats, and voice/video calls. This means only the people involved in the conversation can read or hear the messages.
- Telegram: Telegram offers E2EE only in its "Secret Chats" feature, while regular chats are encrypted between the device and Telegram's servers (MTProto encryption). However, Telegram stores regular chat data on its cloud servers.
### 2. Cloud Storage
- Signal: Does not store user data on its servers. All conversations are stored locally on the user's device, and backups, if any, are also encrypted and managed by the user.
- Telegram: Stores regular chat data in the cloud, which allows for multi-device synchronization. Users can access their chat history from any device. Secret chats, however, are device-specific and not stored on Telegram's servers.
### 3. Open Source
- Signal: Both Signal's protocol (the encryption technology) and the app are fully open source. This transparency allows security experts to review the code for vulnerabilities.
- Telegram: Telegram's protocol (MTProto) is open source, but the server-side code is closed source, meaning the backend cannot be independently audited by external security experts.
### 4. User Base and Popularity
- Signal: Popular among users who prioritize privacy and security, such as journalists, activists, and privacy advocates.
- Telegram: More widely used with a broader range of features appealing to general users. It's popular for its large group chats, channels, and bots.
### 5. Features
- Signal: Focuses more on secure communication. It offers encrypted messages, voice and video calls, and some basic messaging features like disappearing messages and emoji reactions.
- Telegram: Has a much broader range of features like public channels, large group chats, customizable themes, file sharing up to 2GB, bots, animated stickers, and more, making it more feature-rich but less security-focused compared to Signal.
### 6. Privacy and Data Collection
- Signal: Collects minimal metadata. The only information Signal stores is the user’s phone number.
- Telegram: Collects more metadata than Signal, such as IP addresses, device details, and basic usage statistics. However, it claims not to share data with third parties or governments unless legally compelled.
### 7. Backup Options
- Signal: Does not offer automatic cloud backups to protect user privacy. Backups must be done manually by the user, and they are encrypted.
- Telegram: Stores messages and files in the cloud for regular chats, meaning users don't need to worry about losing data when switching devices.
### Summary:
- Signal is ideal for those who prioritize privacy and security above all else, offering robust end-to-end encryption for all forms of communication.
- Telegram provides a wider range of features and is more versatile for general users, though its security is not as rigorous as Signal's for regular chats.
### 1. Encryption
- Signal: It uses end-to-end encryption (E2EE) by default for all conversations, including one-on-one chats, group chats, and voice/video calls. This means only the people involved in the conversation can read or hear the messages.
- Telegram: Telegram offers E2EE only in its "Secret Chats" feature, while regular chats are encrypted between the device and Telegram's servers (MTProto encryption). However, Telegram stores regular chat data on its cloud servers.
### 2. Cloud Storage
- Signal: Does not store user data on its servers. All conversations are stored locally on the user's device, and backups, if any, are also encrypted and managed by the user.
- Telegram: Stores regular chat data in the cloud, which allows for multi-device synchronization. Users can access their chat history from any device. Secret chats, however, are device-specific and not stored on Telegram's servers.
### 3. Open Source
- Signal: Both Signal's protocol (the encryption technology) and the app are fully open source. This transparency allows security experts to review the code for vulnerabilities.
- Telegram: Telegram's protocol (MTProto) is open source, but the server-side code is closed source, meaning the backend cannot be independently audited by external security experts.
### 4. User Base and Popularity
- Signal: Popular among users who prioritize privacy and security, such as journalists, activists, and privacy advocates.
- Telegram: More widely used with a broader range of features appealing to general users. It's popular for its large group chats, channels, and bots.
### 5. Features
- Signal: Focuses more on secure communication. It offers encrypted messages, voice and video calls, and some basic messaging features like disappearing messages and emoji reactions.
- Telegram: Has a much broader range of features like public channels, large group chats, customizable themes, file sharing up to 2GB, bots, animated stickers, and more, making it more feature-rich but less security-focused compared to Signal.
### 6. Privacy and Data Collection
- Signal: Collects minimal metadata. The only information Signal stores is the user’s phone number.
- Telegram: Collects more metadata than Signal, such as IP addresses, device details, and basic usage statistics. However, it claims not to share data with third parties or governments unless legally compelled.
### 7. Backup Options
- Signal: Does not offer automatic cloud backups to protect user privacy. Backups must be done manually by the user, and they are encrypted.
- Telegram: Stores messages and files in the cloud for regular chats, meaning users don't need to worry about losing data when switching devices.
### Summary:
- Signal is ideal for those who prioritize privacy and security above all else, offering robust end-to-end encryption for all forms of communication.
- Telegram provides a wider range of features and is more versatile for general users, though its security is not as rigorous as Signal's for regular chats.
Forwarded from #TBOT: Take Back Our Tech
⚡️Is Your VPN Leaking Your Info?
@takebackourtech
Most internet savvy people today use a VPN (Virtual Private Network). Why? Because they protect your internet traffic from being spied on by outsiders.
https://t.me/takebackourtech
With the rise in privacy awareness, it seems like everyone and their mom has a VPN service to offer you.
There are free VPNs with millions upon millions of users, but do they do what they promise?
Simon Migliano, from Top10VPN recently carried out an analysis for the top 100 Free VPN Apps on Android. He tested things like VPN encryption failure, VPN leaks, encryption weakness, and risky permissions - as well as proprietary code and software libraries.
You might be surprised to find that 90% of free VPN apps had a VPN leak, and 70% required privacy-risking permissions.
More than 70% of the VPNs were sharing unique identifiers with third parties such as Facebook, Bytedance, and Yandex.
Solutions
1. Avoid free apps on popular apps stores like the plague, especially VPN apps. They need to make their money somehow, at the cost of your privacy.
2. You can check if you are using a VPN properly by checking for leaks. There are many online tools for detecting leaks, and we recommend the following site which you can use to test VPN leaks on your computer or your phone:
https://browserleaks.com/ip
3. Pay attention to the following:
IP Address Location: This is related to your IPv4 address. If this matches your actual location, you have a leak or you’re not using a VPN. If its pointing to the location of your VPN server - then its protected.
IPV6 Leak Test: This should either be ‘n/a’ to indicate your VPN server is blocking IPv6 traffic. If you’re seeing an IPv6 address here then your VPN is either leaking, or it supports IPv6 traffic. Although IPv6 geolocation is not widely available, it can be used to detect your location within a few kilometers.
DNS Leak Test: Press the button to activate a DNS leak test, which will display the DNS servers involved in lookup for the current site. If you are seeing DNS servers near your current location and not your VPN servers location, your device or VPN is misconfigured and leaking DNS requests. That means your computer is connecting directly to those DNS servers and your ISP will be able to track those, and the websites you visit can use it as a data point for your actual location.
Fully sourced & unedited article here.
Video coming later today!
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
@takebackourtech
Most internet savvy people today use a VPN (Virtual Private Network). Why? Because they protect your internet traffic from being spied on by outsiders.
Please share this post with your friends, help us reach our goal of 5,000 members!
https://t.me/takebackourtech
With the rise in privacy awareness, it seems like everyone and their mom has a VPN service to offer you.
There are free VPNs with millions upon millions of users, but do they do what they promise?
Simon Migliano, from Top10VPN recently carried out an analysis for the top 100 Free VPN Apps on Android. He tested things like VPN encryption failure, VPN leaks, encryption weakness, and risky permissions - as well as proprietary code and software libraries.
You might be surprised to find that 90% of free VPN apps had a VPN leak, and 70% required privacy-risking permissions.
More than 70% of the VPNs were sharing unique identifiers with third parties such as Facebook, Bytedance, and Yandex.
Solutions
1. Avoid free apps on popular apps stores like the plague, especially VPN apps. They need to make their money somehow, at the cost of your privacy.
2. You can check if you are using a VPN properly by checking for leaks. There are many online tools for detecting leaks, and we recommend the following site which you can use to test VPN leaks on your computer or your phone:
https://browserleaks.com/ip
3. Pay attention to the following:
IP Address Location: This is related to your IPv4 address. If this matches your actual location, you have a leak or you’re not using a VPN. If its pointing to the location of your VPN server - then its protected.
IPV6 Leak Test: This should either be ‘n/a’ to indicate your VPN server is blocking IPv6 traffic. If you’re seeing an IPv6 address here then your VPN is either leaking, or it supports IPv6 traffic. Although IPv6 geolocation is not widely available, it can be used to detect your location within a few kilometers.
DNS Leak Test: Press the button to activate a DNS leak test, which will display the DNS servers involved in lookup for the current site. If you are seeing DNS servers near your current location and not your VPN servers location, your device or VPN is misconfigured and leaking DNS requests. That means your computer is connecting directly to those DNS servers and your ISP will be able to track those, and the websites you visit can use it as a data point for your actual location.
Fully sourced & unedited article here.
Video coming later today!
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER
Follow 🫶 @takebackourtech
BrowserLeaks
My IP Address
The main tools for checking IP address privacy. Showing Your IP Address, Reverse IP Lookup, Hostname, and HTTP Request Headers, Your Country, State, City, ISP/ASN, and Local Lime, Whois Lookup, TCP/IP OS fingerprinting, WebRTC Leak Test, DNS Leak Test, and…
Forwarded from Mika L
Firefox tracks you with “privacy preserving” feature
https://noyb.eu/en/firefox-tracks-you-privacy-preserving-feature
https://noyb.eu/en/firefox-tracks-you-privacy-preserving-feature
noyb.eu
Firefox tracks you with “privacy preserving” feature
noyb filed a complaint against Mozilla for quietly enabling a supposed “privacy feature” (called Privacy Preserving Attribution) in its Firefox browser which tracks user behaviour on websites.
Forwarded from AndroidSage.com
Several Samsung phones affected by bootloop issue, here is how to fix it
https://www.androidsage.com/2024/10/03/samsung-phones-widespread-bootloop-issue-here-is-how-to-fix-it/
https://www.androidsage.com/2024/10/03/samsung-phones-widespread-bootloop-issue-here-is-how-to-fix-it/
Android Sage
Samsung phones are experiencing a widespread bootloop issue, here is how to fix it
Samsung's SmartThings Update Crisis: Boot Loop Issues Plague Older Galaxy Devices. Here's the fix for the latest boot loop issue affecting Galaxy S10, Note 10, or older devices.
Forwarded from Mishaal's Android News Feed
RIP Ferrochrome launcher:
Google is killing its one-click app that would've let you easily run Chrome OS in a VM on your Android device.
Imagine having an app that automatically downloads, configures, and runs Chrome OS in a VM for you, on like a Pixel Tablet.
More details on what we're missing out on can be found in this article on Android Authority.
Google is killing its one-click app that would've let you easily run Chrome OS in a VM on your Android device.
Imagine having an app that automatically downloads, configures, and runs Chrome OS in a VM for you, on like a Pixel Tablet.
More details on what we're missing out on can be found in this article on Android Authority.
Android Authority
Google is killing its one-click app to run Chrome OS in a VM on Android devices
Google is no longer working on Ferrochrome launcher, an Android app that would’ve made it easy to run Chrome OS in a virtual machine.
Forwarded from Mishaal's Android News Feed
Android 16 may be adding an 'Advanced Protection Mode'
I spotted evidence that next year's update will let users enroll in 'advanced protection' via Settings. Here's how this new feature could help protect your data.
I spotted evidence that next year's update will let users enroll in 'advanced protection' via Settings. Here's how this new feature could help protect your data.
Android Authority
Android 16 might better protect your data with its Advanced Protection Mode
Android 16 is preparing to add a new Advanced Protection Mode. Here's how this mode might help better protect your data from hackers.
Forwarded from ATT • Tech News (Agam)
OnePlus is banned from selling smartphones in Germany yet again
OnePlus and Oppo are facing yet another patent dispute, this time with InterDigital over 5G and mobile technology patents. As a result, only OnePlus smartphones are currently unavailable for sale in Germany, while other products remain unaffected.
This situation is similar to a previous dispute with Nokia, which also led to a sales ban in Germany, though that issue was only recently resolved.
It's unclear when OnePlus will resume smartphone sales in the country.
🔗 GSMArena
🧑💻 @agamtechtricks
OnePlus and Oppo are facing yet another patent dispute, this time with InterDigital over 5G and mobile technology patents. As a result, only OnePlus smartphones are currently unavailable for sale in Germany, while other products remain unaffected.
This situation is similar to a previous dispute with Nokia, which also led to a sales ban in Germany, though that issue was only recently resolved.
It's unclear when OnePlus will resume smartphone sales in the country.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Tech & Leaks Zone
BREAKING: Xiaomi Plans To Stop Offering Bootloader Unlocking
Following a fake news Last year related to shutting down offering bootloader unlocking to smartphones launched after May, 2024, now, even famous leakers are claiming that internally, Xiaomi has indeed made plans to shutdown the bootloader unlocking service for global users by the end of 2025.
For China, since the Bootloader unlocking period was over last month, it will once again resume after Xiaomi 15 series global launch in 2025. Xiaomi already collects a lot of data to identify which user in China unlocked the bootloader but since that can't be done globally, Xiaomi might ultimately shut down the service for them.
If this happens, the following changes will take place on Earth:
• RIP Xiaomi federations
• People will think 1000 times before buying due to HypeOS
• Some users will finally understand that hardware-quality matters more that on-paper specs and cheap price
• NO Xiaomi buildbots
Follow @TechLeaksZone
Following a fake news Last year related to shutting down offering bootloader unlocking to smartphones launched after May, 2024, now, even famous leakers are claiming that internally, Xiaomi has indeed made plans to shutdown the bootloader unlocking service for global users by the end of 2025.
For China, since the Bootloader unlocking period was over last month, it will once again resume after Xiaomi 15 series global launch in 2025. Xiaomi already collects a lot of data to identify which user in China unlocked the bootloader but since that can't be done globally, Xiaomi might ultimately shut down the service for them.
If this happens, the following changes will take place on Earth:
• RIP Xiaomi federations
• People will think 1000 times before buying due to HypeOS
• Some users will finally understand that hardware-quality matters more that on-paper specs and cheap price
• NO Xiaomi buildbots
Follow @TechLeaksZone
Forwarded from Bones' Tech Garage
Media is too big
VIEW IN TELEGRAM
This reporting on the Pegasus spyware is very interesting because the reality doesn't live up to the hype surrounding Pegasus. It's been hyped up to be some super mysterious spyware that no one knows how it gets installed, and has been claimed to install with no user interaction. But this video with the discoverer of Pegasus clearly says that the spyware was downloaded and installed after clicking on a link in an SMS text message just like all the rest of the run of the mill malware.
Forwarded from Mishaal's Android News Feed
Google is working on a new "ADB trade-in mode" feature for Android.
This will hopefully make it faster for your phone to be evaluated so you can get your refund more quickly.
✅ ADB trade-in mode details.
This will hopefully make it faster for your phone to be evaluated so you can get your refund more quickly.
✅ ADB trade-in mode details.
Android Authority
Google is making your next phone trade-in experience faster by changing Android
Google is working on a new trade-in mode for Android that will hopefully speed up phone inspections so you can get your refund faster.
Forwarded from ⋆༺𓆩☠︎︎𓆪༻⋆The_GreatUnknown⋆༺𓆩☠︎︎𓆪༻⋆
BleepingComputer
Cloudflare blocks largest recorded DDoS attack peaking at 3.8Tbps
During a distributed denial-of-service campaign targeting organizations in the financial services, internet, and telecommunications sectors, volumetric attacks peaked at 3.8 terabits per second, the largest publicly recorded to date. The assault consisted…
Forwarded from NoGoolag
#PayPal’s Secret Data Grab Banks on Users Staying Blissfully Unaware
https://ift.tt/ZDHuVYi - FOLLOW: @reclaimthenet
https://ift.tt/ZDHuVYi - FOLLOW: @reclaimthenet
Reclaim The Net
PayPal's Secret Data Grab Banks on Users Staying Blissfully Unaware
Join Reclaim The Net.
Forwarded from ⋆༺𓆩☠︎︎𓆪༻⋆The_GreatUnknown⋆༺𓆩☠︎︎𓆪༻⋆
Telegram Info
Telegram Global Search Has Been Changed
Many Telegram users, especially administrators of public channels and groups, noticed at the end of August 2024 that the platform administration had changed the global search algorithms. @tginfo tells what is known about these changes.
Forwarded from ⋆༺𓆩☠︎︎𓆪༻⋆The_GreatUnknown⋆༺𓆩☠︎︎𓆪༻⋆
WIRED
Neo-Nazis Are Fleeing Telegram for Encrypted App SimpleX Chat
Neo-Nazis are joining SimpleX Chat, a relatively unknown app that received funding from Jack Dorsey and promises users there is no way for it or law enforcement to track their identity.
Forwarded from ⋆༺𓆩☠︎︎𓆪༻⋆The_GreatUnknown⋆༺𓆩☠︎︎𓆪༻⋆
hudoc.echr.coe.int
HUDOC - European Court of Human Rights
The HUDOC database provides access to the case-law of the Court (Grand Chamber, Chamber and Committee judgments and decisions, communicated cases, advisory opinions and legal summaries from the Case-Law Information Note), the European Commission of Human…
Forwarded from ATT • Tech News (Agam)
Chrome Canary just killed uBlock Origin and other Manifest V2 extensions
Google Chrome Canary has removed the flag that allows users to re-enable Manifest V2 extensions, including ad blockers like uBlock Origin. This is a significant move towards the full depreciation of V2 extensions.
The new V3 framework limits ad blockers by forcing them to use the
Ad blockers and other MV2 extensions still work in the public version of Chrome.
🔗 Android Police
🧑💻 @agamtechtricks
Google Chrome Canary has removed the flag that allows users to re-enable Manifest V2 extensions, including ad blockers like uBlock Origin. This is a significant move towards the full depreciation of V2 extensions.
The new V3 framework limits ad blockers by forcing them to use the
declarativeNetRequest API, which reduces their ability to block ads dynamically.Ad blockers and other MV2 extensions still work in the public version of Chrome.
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM