pull down to refresh

but it is powerless when someone logs directly into a user’s phone

Thats true for every form of encryption, if you have the private key (ie. the users phone), you can access the data....

However that hides the real attack vector. Many of these "encrypted chat" stores the data unencrypted on local device....the problem comes if you have some type of "backup my phone to the cloud" service turned on (which both iphone and android have). Then those chats go to the cloud where who knows who has access....

10 sats \ 0 replies \ @fm 13 Jan
go to the cloud

Fancy name for: Another person computer :)

reply

Thanks

reply

Bingo. That's exactly why is recommended (for curious minds) to use new breed of OS like Graphene and new chats like keet that go directly p2p (remember napster? :-) It is up to an individual to decide what to use, cool iPhone or more restricted OS and limit what you share. In my opinion ( I know, no one asked..lol) the moment you send any data from your phone, you should consider it gone.... YMMV of course

reply

As soon as they have access to your phone the encryption doesn't help. At that point they can do whatever, inject the app with custom logger, run extraction when user opens the app, etc.

reply