top | item 46377653

(no title)

epoberezkin | 2 months ago

> "SimpleX has no identifiers" only means "SimpleX does not add additional identifiers"

These two statements are identical. IP addresses are Internet user identifiers, not SimpleX identifiers. All other application-level networks have identifiers of their own, in addition to IP addresses.

The goal of the design is: - to prevent correlation of which IP address communicates with which, - to prevent IP address from servers not chosen by the users.

It is not supposed to protect IP addresses from all servers, and Tor does not achieve that either, as Tor relays are servers too.

The reasons not to embed Tor are listed here: https://simplex.chat/faq/#why-dont-you-embed-tor-in-simplex-...

Disclaimer: I designed SimpleX network, and the founder of SimpleX Chat.

discuss

order

maqp|2 months ago

>These two statements are identical. IP addresses are Internet user identifiers, not SimpleX identifiers.

You are promoting SimpleX as an metadata-privacy improvement over Tor Onion Service based messengers like Cwtch, that hides the IP address by default. IP-addresses can be linked to users, and users will have to blindly trust the server is not collecting them. TelCos and ISPs keep logs of those as per data retention laws, so it's not hard to determine who a SimpleX user is if SimpleX wants to disclose that information.

>to prevent correlation of which IP address communicates with which

Which Akamai can do, and Runonflux can do. With 50% probability on per-target basis I might add.

>It is not supposed to protect IP addresses from all servers, and Tor does not achieve that either

Tor relays actively mask the IP of previous node from the next node.

Tor relays do not have access to internal protocol of SimpleX queues etc. SimpleX servers do, so they can collaborate with better efficiency.

Tor relays are chosen at random by the user, and random collaborating entry/exit nodes expose 10 minute windows for ciphertext-only metadata collection without access to IPs. SimpleX has 50% chance same company runs the server of both users.

>Tor does not achieve that either, as Tor relays are servers too.

This is ridiculous. You're effectively arguing, that because Tor isn't literally magical in being able to send TCP packets without IP addresses in headers, it's not significant improvement. As I showed you last time, the NSA itself has admitted they will NEVER be able to deanonymize all Tor users all the time, and that nor are they able to do that on-demand. Which is quite different from your "we run servers on two VPS companies ourselves, but pinky promise, they don't aggregate and correlate information."

>I designed SimpleX network, and the founder of SimpleX Chat.

I know. We two have had a looong conversation about this, first in Reddit, then here, then in privacyguides forum, and now again, here. Every single time you run to the hills.

Link your open, honest, non-misleading threat model to your front page. Make sure it makes it extremely clear that "Unless you install and configure Tor, SimpleX client does not take actions to hide your IP-address from the server".

I mean, look how professional https://tryquiet.org/ looks when the treat model is up there in the title bar, and not as a fine print behind menus.

Do that and we're done. I won't call you out anymore.