this post was submitted on 09 Jul 2023
2155 points (97.8% liked)

Technology

34125 readers
103 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
 

cross-posted from: https://lemmy.ml/post/1874605

A 17-year-old from Nebraska and her mother are facing criminal charges including performing an illegal abortion and concealing a dead body after police obtained the pair’s private chat history from Facebook, court documents published by Motherboard show.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 44 points 1 year ago (6 children)

I thought messenger was end-to-end encrypted, at least according to Facebook. How were they able to hand over the chat logs? The messages should be encrypted with a key that is itself encrypted with user's password, which Facebook doesn't store.

What am I missing?

[–] [email protected] 17 points 1 year ago (1 children)

You’re not telling me Facebook LIED are you? No way I wouldn’t believe it /s

[–] [email protected] 8 points 1 year ago* (last edited 1 year ago) (1 children)

Actually that page suggests that they can't access it. They'd never passed the security on it if that page was lying and they don't encrypt it. Clearly there must be some kind of mechanism they can use to decrypt it for law enforcement. The technicals of that are what I was actually interested in from my original comment.

EDIT: Oh my God I just figured it out. It's not enabled by default. You have to explicitly turn it on per conversation. That's terrible

[–] [email protected] 3 points 1 year ago

Even if you turn it on, they control the end points, so it's not really any more secured.

[–] [email protected] 16 points 1 year ago

You're missing the fact that they lied to get users

[–] [email protected] 14 points 1 year ago (1 children)
[–] [email protected] 7 points 1 year ago (1 children)

And on the official app it isn't called end to end encryption or even a setting toggle. It's called secret chat and clicking on it opens a chat from the original chat. The only difference I see is a little lock icon where an emoji usually is.

[–] [email protected] 3 points 1 year ago (1 children)
[–] [email protected] 2 points 1 year ago (1 children)

wait, what ? can you elaborate, since I use telegram on daily bases

[–] [email protected] 6 points 1 year ago

@linux_user_6967 @Goun Telegram's end-to-end encryption isn't enabled by default. You have to specifically choose to start an encrypted chat. Assuming you trust MTProto though, there's no indication they're otherwise implemented poorly.

[–] [email protected] 14 points 1 year ago* (last edited 1 year ago)

Presumably they maintain full access because they control both ends. The encrypted part would stop others intercepting messages. At least that's how I've always read it

Edit: I'm wrong, end to end does exclude even the app provider from seeing messages. So yeah, either not enabled or they lied

[–] [email protected] 6 points 1 year ago

To add to other replies, proprietary apps like messenger can also have backdoor access to your messenger app, where the messages are stored decrypted. I.e. maliciously taking the chat history from either ends of the end-to-end encryption.

[–] [email protected] 4 points 1 year ago

End2End encryption is mostly a PR stunt. In practice it's not hard to go around it. For example:

  • going after unencrypted backups (such as in google drive)
  • compromising or seizing your device
  • forcing the app developer to leak the private keys
  • forcing you to turn over the information by threatenening you with not cooperating.

It reminds me of this XKCD: https://xkcd.com/538/