From 9c7549ca0fd498e2d18cd21c4d9bd0de8f2211a5 Mon Sep 17 00:00:00 2001 From: oxeo0 Date: Mon, 26 May 2025 20:22:42 +0200 Subject: [PATCH] fix some links --- internetsegmentation/index.md | 2 +- signalnoanonymity/index.md | 14 +++++++------- 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/internetsegmentation/index.md b/internetsegmentation/index.md index 201c9a9..58cee4e 100644 --- a/internetsegmentation/index.md +++ b/internetsegmentation/index.md @@ -94,7 +94,7 @@ _Virtual Machines:_ -_Sidenote:_ [QubesOS](../qubesos/index.md) is based off the same segmentation principle, that every use must remain isolated (or compartmentalized) into VMs, for specific uses. It also uses Linux and Whonix VMs, while using the Xen hypervisor instead of libvirtd QEMU/KVM, but the concept remains the same. +_Sidenote:_ [QubesOS](../../selfhosting/qubesos/index.md) is based off the same segmentation principle, that every use must remain isolated (or compartmentalized) into VMs, for specific uses. It also uses Linux and Whonix VMs, while using the Xen hypervisor instead of libvirtd QEMU/KVM, but the concept remains the same. ## **Internet Usage Segmentation Recap** diff --git a/signalnoanonymity/index.md b/signalnoanonymity/index.md index 92ff20e..a7d67a1 100644 --- a/signalnoanonymity/index.md +++ b/signalnoanonymity/index.md @@ -39,10 +39,10 @@ To this day, Signal Foundation remains a registered non-profit 501(c)(3) organiz One of the most popular criticisms of Signal is that it requires users to provide their phone numbers. In fact, early version of Signal (called [TextSecure](https://en.wikipedia.org/wiki/TextSecure)) was just a wrapper encrypting SMS messages. This meant the app was heavily dependent on user's phone number and cell carrier. -The SMS messages were encrypted, but the [metadata](../anonymitymetadata/index.html) was still easily accessible to mobile carriers. +The SMS messages were encrypted, but the [metadata](../anonymitymetadata/index.md) was still easily accessible to mobile carriers. In 2015, Signal [started to phase-out](https://signal.org/blog/goodbye-encrypted-sms/) SMS encryption feature in favor of providing their internet connected infrastructure. -One thing that haven't changed until this day is the requirement for the phone number (which is inherently [not anonymous](../opsec/phonenumbers/index.md)). +One thing that haven't changed until this day is the requirement for the phone number (which is inherently [not anonymous](../phonenumbers/index.md)). ### Costs @@ -119,7 +119,7 @@ US national security leaders have been found to use Signal to [discuss military ### Anonymous Chats -SimpleX supports [anonymous chats](../opsec/chats/index.md#anonymous-chat-example) which allow users to plausibly deny their participation in a conversation by using one-time nickname for each conversation. +SimpleX supports [anonymous chats](../chats/index.md#anonymous-chat-example) which allow users to plausibly deny their participation in a conversation by using one-time nickname for each conversation. This reduces the risk of being linked to specific messages or conversations. ![diagram showing how simplex anonymous chats prevent chat correlation](3.png) @@ -130,7 +130,7 @@ There's no such feature in Signal. Usernames can be changed at any time, but the ### Self-Hostable and Decentralized -SimpleX Chat comes with their SMP and XFTP servers preconfigured in client apps, however it's easy to [host your own](../opsec/anonsimplex/index.md) and switch to it. All servers are federated meaning they can talk to each other. +SimpleX Chat comes with their SMP and XFTP servers preconfigured in client apps, however it's easy to [host your own](../anonsimplex/index.md) and switch to it. All servers are federated meaning they can talk to each other. The unofficial list of SMP and XFTP servers is available [here](https://simplex-directory.asriyan.me/#selected-servers=). @@ -146,18 +146,18 @@ Ease of self-hosting comes handy when someone tries to block the default messagi By default, SimpleX Chat implements [message padding](https://simplex.chat/docs/glossary.html#message-padding) which mitigates sidechannel attacks to some level and [one-way SMP queues](https://github.com/simplex-chat/simplexmq/blob/stable/protocol/simplex-messaging.md#simplex-queue) which prevent the client IP being leaked to destination SMP server. -SimpleX tries to keep metadata to the minimum. To learn why that's detrimental to your anonymity, check out [this](../opsec/anonymitymetadata/index.md) blog post. +SimpleX tries to keep metadata to the minimum. To learn why that's detrimental to your anonymity, check out [this](../anonymitymetadata/index.md) blog post. ### Onion Only Servers -SimpleX Chat has support for onion only servers. That way both your and SMP server's IP is never leaked. Such servers [can communicate](../opsec/anonsimplex/index.md#only-using-your-own-onion-only-simplex-server-doesnt-isolate-you) with clearnet SMP servers without any issue. +SimpleX Chat has support for onion only servers. That way both your and SMP server's IP is never leaked. Such servers [can communicate](../anonsimplex/index.md#only-using-your-own-onion-only-simplex-server-doesnt-isolate-you) with clearnet SMP servers without any issue. There is no client CAPTCHA mechanism that would hurt usability without exposing your IP address (like we saw in Signal). ## Conclusion -While both Signal and SimpleX Chat are good secure open-source messaging apps, for our use-case SimpleX Chat offers the best balance between security, [privacy, anonymity and deniability](../opsec/aps/index.md) and usability. +While both Signal and SimpleX Chat are good secure open-source messaging apps, for our use-case SimpleX Chat offers the best balance between security, [privacy, anonymity and deniability](../aps/index.md) and usability. Signal on the other hand only provides security and partial privacy (you're private from your contacts if you use Usernames feature). It is clearly focused more on usability and user-friendliness. That's what made the app so popular amongst less tech-savvy users.