Scottie's Tech.Info
  • Home
  • About
    • About Me
    • Cookie Policy
      • Cookie Policy (AU)
      • Cookie Policy (BR)
      • Cookie Policy (CA)
      • Cookie Policy (UK)
      • Cookie Policy (ZA)
    • Disclaimer
    • Imprint
    • Opt-out preferences
    • Privacy Statement
      • Privacy Statement (AU)
      • Privacy Statement (BR)
      • Privacy Statement (CA)
      • Privacy Statement (UK)
      • Privacy Statement (US)
      • Privacy Statement (ZA)
  • Videos
    • YouTube
    • Twitter
    • TikTok
    • Bitchute
    • Odysee
    • Rumble
  • Stuff
    • Support my Work
    • GitHub
    • LinkedIn
    • Store
    • Downloads
    • Material Icon Viewer
  • Contact
  • Hire me!
Select Page

SHORT: End-to-end encryption’s fatal flaw

2 October 2024 | Computers, Gizmos, How Does it Work?, Networking, Video | 0 comments

E2EE's weaknessEnd-to-end encryption is supposed to be ultra-safe.

Unfortunately, it’s not.

Even though it sounds good on paper, the way E2EE is coded and used can make all the difference between security and epic data leaks.

In less than 60s:

YouTube:

Twitter:

E2EE is supposed to be secure, but HOW it’s done makes all the difference: pic.twitter.com/w4o9ncPSD8

— Scottie (@ScottiesTech) October 2, 2024

TikTok:

@scottiestech.infoE2EE’s fatal flaw #e2ee #encryption #messaging End-to-end encryption is supposed to be ultra-safe. Unfortunately, it’s not. Even though it sounds good on paper, the way E2EE is coded and used can make all the difference between security and epic data leaks. More techie tips: https://scottiestech.info♬ original sound – ScottiesTech.Info

More on Metadata

In short, metadata is not actual information about a person/thing, but related information relevant to the target.

For example, if each user is represented by a unique, random code, you might think that’s secure. But what happens if I track all those different secret codes, and then make a map of who’s talking to each other?

And then, what if for that Who’s Chatting map, I get ONE piece of extra data that I know is linked to a particular person? It could be data, metadata, a login cookie – something…

In that case, I might be able label an entire group of people as Republicans, males, terrorists, Buddhists, or whatever.

Rinse and repeat, and you can easily see how metadata can be used to track just about everyone. It’s not the individual piece of metadata that’s important, but the fact that I have a HUGE group of users, each of whom has metadata. And every bit of metadata can be related to other bits in some way.

So yeah, it’s a pickle!

  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • More
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to print (Opens in new window) Print

Related

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.

ScottiesTech.Info

Follow @ScottiesTech

Subscribe via Email

Enter your email address to be notified of new posts:

Must Read

It makes sense!

Most Popular

  • Fix shared folders not working in Windows 11 24H2
    Fix shared folders not working in Windows 11 24H2
  • Fix Windows Activation failed due to Software Protection Service error code 0xc0000022
    Fix Windows Activation failed due to Software Protection Service error code 0xc0000022
  • Why can't I enable CSM on my new motherboard?
    Why can't I enable CSM on my new motherboard?
  • NVMe drive missing or not booting? There's a simple fix!
    NVMe drive missing or not booting? There's a simple fix!
  • How to remove Intel VMD without reinstalling Windows
    How to remove Intel VMD without reinstalling Windows
  • Green Grid Part 2: Why 100% green is still just a dream
    Green Grid Part 2: Why 100% green is still just a dream
  • Fix the grey X on shortcut icons in Windows
    Fix the grey X on shortcut icons in Windows

Recent Posts

  • Green Grid Part 2: Why 100% green is still just a dream
  • Green Grid Part 1: Spain’s Epic Blackout
  • End Task missing in Windows 11? Get it back!
  • Is AI dangerous?
  • JavaScript: Get CSS properties of an element before inserting it into the page

Recent Comments

  • Guille on How to fix low mic volume on MSI and other PCs
  • Martin on Fix shared folders not working in Windows 11 24H2
  • Bob on Convert your Windows 10 boot drive from MBR to GPT
  • Scottie on Convert your Windows 10 boot drive from MBR to GPT
  • Bob on Convert your Windows 10 boot drive from MBR to GPT

Archives

Tags

3G 4G 5G AC AI android backup browser chrome e-mail electricity EMF ethernet firefox google green energy hard drive health internet javascript laptop linux lithium-ion microsoft network printer privacy rails repair ruby security smartphone spying ssd thunderbird ubuntu upgrade USB wifi windows windows 7 windows 10 Windows 11 windows update x64
  • Facebook
  • X
  • RSS
Copyright © 2009-2024 Scottie's Tech.Info — Cookies & Privacy Policy
Manage your privacy

To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}
 

Loading Comments...