This collection of networks offers no end to end encryption. Anyone with administrator access to an Instance can read anything that travels through that Instance’s infrastructure – including direct messages. The level of risk correlates with the number of cross-Instance interactions between users. If users from different Instances communicate, an attacker need only compel one Instance to reveal the direct messages between all of the interacting accounts. The centralised equivalents – Twitter, Tumblr, etc – can cloak their users through governance and resources. In a peer-to-peer network without encryption, there’s no structure, no agreed-upon governance, and absolutely no protection. Compromising or compelling an Instance or its staff means that all of network traffic is laid bare to its assailant.

I’d love to have a discussion on this (now fairly old) article which IMO has yet to provoke the kind of much-needed action on this topic that we, as a community of cypherpunks, are capable of.

  • udunadan@infosec.pub
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 year ago

    Well, the malicious actors can setup their own instances as well and exploit the inherent trust between the participants by design. P2P sold as security property in the scenario where participants are unknown and multiple in numbers is misconception. It does not square well with basic security mindfulness, and shouldn’t be taken as improvement in that regard.

    I think that federation and all this stuff is not about improving security, it is a form of grassroots communication based on certain principles. If you need security, you use other tools, and treat these things as public, hostile spaces.

  • fraksken@infosec.pub
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    While I agree that to the layman this may sound freaky, I would imagine it not being ao much different than google/twitter/… where admins/moderators being much more plentiful with full access to your accounts and data (no references, this is an educated guess). it’s the same with hosting e-mail for yourself and onboarding users. full disclosure to the users: disks are encrypted, but messages are stored in plain text. like the peer comment mentioned, for true e2ee, you’d use different tools than mail or pm messages on any message board.

    I do celebrate security and encryption, but best use them where it counts.

    • cyph3rPunk@infosec.pubOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      I agree, actually. However, I do think PM’s are problematic in their current state because some users will send confidential information through those channels without realizing how easy it is for an admin to view that data in plain text.

      • fraksken@infosec.pub
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        i understand that for these channels there is little oversight in how admins would (ab)use the platform amd it would indeed be easy for a bad actor to set up its own instance and invite users. My point is that a Lemmy instance perhaps has 10 or 20 admins who can access privileged data, while larger platforms have thousands of admins, with or without an NDA in place. I agree that users on the internet are more often than not oblivious to the fact that - if they don’t own the service (self host) - they don’t own the data. This is nothing new. Microsoft administrators (within an organisation, not affiliated with microsoft itself) are able to read user e-mails. there is no secrecy on any network unless you have e2ee in place. There are a few specialised services who’se selling points are security and privacy (signal, proton, …). Outside of those services, I would not trust my data to be private. In my opinion, what you’re describing is a problem of educating people. with the current popular mindset of “I have nothig to hide”, education becomes increasingly difficult. Everybody has things to hide. Their social security number, their passwords, their medical data, their darkest fantasies or deepest fears, all can be exploited by bad actors, and all is just beig published on the internet without afterthought.

        In a perfect world, I agree, pm should have e2ee. I also recognise that the current version of Lemmy is 0.18. no major release yet. I’m confident they will work on it at some point. I might do it myself if I were a programmer (am not, no idea how to get started). Lemmy is young and open source, it will need time to mature.