Happy to see a privacy-focused carrier, and it has better policies than any other carrier out there. But founder is formerly from Palantir and there’s a lot of VC money behind it (not inherently a problem, just flagging).

Thoughts?

  • ivn@jlai.lu
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    1 day ago

    What makes you think encrochat was a honeypot? Am I missing something?

    • Gravitywell.xYz@sh.itjust.works
      link
      fedilink
      arrow-up
      14
      arrow-down
      2
      ·
      1 day ago

      Because they literally operated it as a honeypot and gave police full access to chats while advertising to criminals that it was safe.

      EncroChat first came to the attention of the media when it was revealed that high-profile criminals Mark Fellows and Steven Boyle had been using the encrypted devices to communicate during the May 2018 gangland murder of John Kinsella in Rainhill, England.[16][9][17] The service resurfaced in the media during the summer of 2020 after law enforcement agencies announced that they had infiltrated the encrypted network and investigative journalist Joseph Cox, who had been reviewing EncroChat for months, published an exposé in Vice Motherboard

      • ivn@jlai.lu
        link
        fedilink
        arrow-up
        2
        ·
        1 day ago

        Where did you read that they gave police full access? I thought they were hacked.

        • Gravitywell.xYz@sh.itjust.works
          link
          fedilink
          arrow-up
          11
          arrow-down
          1
          ·
          edit-2
          23 hours ago

          That’s even worse then because they didn’t even have a secure network from start. Be it willful ignorance or intentional assistance, its still a honeypot. This was a huge “I told you so” by a lot of the dark net community when it happened, a lot of people called it WAY ahead of time.

          Encrochat isn’t the only example, so i may have conflated it with one of these other Honeypot operations: ANOM, Phantom Secure , Ghost , SkyECC

          You might be able to see a pattern here. People who actually want security and anonymity know that you can’t trust those things over to a corporation or a bunch of tech broligarchs, they will either betray you intentionally or due to their incompetence.

          • ivn@jlai.lu
            link
            fedilink
            arrow-up
            5
            ·
            23 hours ago

            I don’t see how being hacked make it “still a honeypot”.

            • Gravitywell.xYz@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              edit-2
              19 hours ago

              because it was being used to attract criminals into thinking it was a safe and legitimate service, while under theee surface it was relaying all the messages to law enforcement.

              • ivn@jlai.lu
                link
                fedilink
                arrow-up
                3
                ·
                13 hours ago

                Yes but

                1. as far as we know they had no idea that it was hacked, so I don’t see how you can get a “vibe” if they are blind to it
                2. the criminals were already using it when LE discovered it and then hacked into it
                • Gravitywell.xYz@sh.itjust.works
                  link
                  fedilink
                  arrow-up
                  2
                  ·
                  edit-2
                  13 hours ago

                  I guess we have different definitions of what a honeypot is then. I dont it has to start as a honeypot to qualify as one once law enforcement is involved.

                  There are countless examples of this kind of infiltration on other services. you can call it something else but either way i think youd have to be a fool to trust an operation like that to be in any way secure from monitoring by law enforcement.