Hey y’all. Reminder not to trust a platform owned and operated by a Nazi manchild.
Shouldn’t trust it yet.
Or ever.
XChat, has some red flags.
With a white circle and a swastika inside?
“xchat” sounds like one of those porn chat rooms
probably??? try definitely and ever
If you trust ANYTHING Musk has for you well then have I got a bridge to sell you.
Yet? More like never.
“The guy who helped install Donald Trump, did a Nazi Salute at Trump’s victory parade on live TV, supports authoritarians, and who has declared war on transgender people to the point you’re not allowed to say “Cis” or “Cisgender” on his platform, has created an end to end encrypted chat.”
All of this has the same vibes as the time Brigham Young University amended their code of conduct to allow people to come out as queer, let some students come out, and then changed the CoC back and expelled the students.
shouldn’t trust it yetshouldn’t trust it everI hope Elon musk gets cancelled(cancer) for this useless nonsensical black box
Ah, new ways for Kegsbreath to expose his idiocy.
I trust it but there is a major misunderstanding of end to end encryption. Some implementations the platform holder does not have a key to decrypt data but it is far from a requirement. All end to end means is there’s a blocker preventing the network from seeing what you send not twitter who im assuming has a copy of the key.
That is NOT end to end encryption. That is transport layer encryption. So basically SSL
End to end is from sender to recipient. No one in the middle should be able to read anything
It’s like ssl but done at the application layer. Nobody in the middle can read it except it’s nobody in the middle of you and twitter and twitter and the recipient. If you put something on a platform and they have the key they will always be able to read it if they want to.
are you being dense on purpose? sender and recipient are both users. never twitter.
i’m not saying that twitter’s messaging is secure. the opposite. what i’m saying is that you statement of “All end to end means is there’s a blocker preventing the network from seeing what you send not twitter” is 100% objectively wrong.
TL;dr of the article :
- They keep your private key on their servers.
- Their implementation allows for AITM attacks.
- It’s closed source.
- There’s no perfect forward secrecy.
This secret stays between you, me, and Elon.
I hope politicians use the hell out of it, so we can see what they really think when it gets (inevitably) hacked in a few weeks.
is it different with signal, telegram, whatsapp?
What is the “A” in “AITM”?
Asshole
Agencies
This is the first time I heard of AITM, thought it was a new name for MITM:
Are you sure that site is trustworthy? It kinda reads like an LLM being told to explain the difference between two names for the same thing and basically rephrasing the same thing. I’d imagine it might just be a different name to get rid of a male-coded word.
Adversary
It’s just MITM but with extra steps
Ah yes, Malcolm in the Middle is behind this all along.
Anal
Aliens
Anyone
Elon.
Apple
Administrator
They keep your private key on their servers.
Then it’s literally not even E2EE, lol
If you chat on Xitter you‘re chatting with mecha Hitler.
They are stupid, but not that stupid.
Never attribute to malice what can be attributed to incompetence.
I used to give the benefit of the doubt but when there are bad incentives in play and shit keeps happening… then perhaps that is naïve sometimes, unfortunately.
Do you mean bad incentives?
And sure, I don’t disagree, but these people are also not actually that smart. I would worry more about this getting hacked in a week way before Elon gets a chance to use it against anyone.
Thanks, I do.
offering me end-to-end encrypted chat
No one - not even X - can access or read your messages
This key is then stored on X’s servers
So…they’re just blatantly lying?
It’s encrypted with a 4 digit pin so they’ll have to spend at least 316.8809e-10 years on brute-forcing it.
That’s why my PIN is 5 digits: 12345
One. Two. Three. Four. Five?
That’s amazing. I’ve got the same combination on my luggage.
Suck. Suck. Suck. Suck!
No - did you even read the article? An x employee confirmed that they’re using the “special” servers to store the keys that mean that they cannot see them. The author then says that the employee confirming it doesn’t mean they do, because the author doesn’t want it to be true.
There are hardware for that called hardware security modules, but yeah I definitely wouldn’t trust Twitter’s implementation - especially because they probably just need the auth team to tell the HSM that the user logged in when they didn’t to get that key
A proper implementation would use multiple security measures and require a reset (delete) of certain private account data before the account access can be reset, otherwise the user’s password would be needed (for key derivation) or some other secret held by the user’s devices (in the TPM chip or equivalent)
So again, you think you know better than the employee simply because you want it to be done incorrectly.
I’ve run a cryptography forum for 10 years. I can tell snake oil from the real deal.
Musk’s Twitter doesn’t know how to do key distribution. The only major company using HSMs the way Musk intends to is Apple, and they have far more and much more experienced cryptographers than X does.
So again - you just don’t want it to be true, and you think the people that know more than you about it are lying.
You sound like an antivaxxer defending a crank
You sound like a conspiracy theorist defending wearing an aluminium foil hat.
The Muskrat lying? No, never!
…yet? How bout just not trusting it at all?
Hah, beat me by 17 seconds!



















