fix some links

This commit is contained in:
oxeo0 2025-05-26 20:22:42 +02:00
parent 6f736abdad
commit 9c7549ca0f
2 changed files with 8 additions and 8 deletions

View file

@ -94,7 +94,7 @@ _Virtual Machines:_
_Sidenote:_ [QubesOS](../qubesos/index.md) is based off the same segmentation principle, that every use must remain isolated (or compartmentalized) into VMs, for specific uses. It also uses Linux and Whonix VMs, while using the Xen hypervisor instead of libvirtd QEMU/KVM, but the concept remains the same.
_Sidenote:_ [QubesOS](../../selfhosting/qubesos/index.md) is based off the same segmentation principle, that every use must remain isolated (or compartmentalized) into VMs, for specific uses. It also uses Linux and Whonix VMs, while using the Xen hypervisor instead of libvirtd QEMU/KVM, but the concept remains the same.
## **Internet Usage Segmentation Recap**

View file

@ -39,10 +39,10 @@ To this day, Signal Foundation remains a registered non-profit 501(c)(3) organiz
One of the most popular criticisms of Signal is that it requires users to provide their phone numbers.
In fact, early version of Signal (called [TextSecure](https://en.wikipedia.org/wiki/TextSecure)) was just a wrapper encrypting SMS messages.
This meant the app was heavily dependent on user's phone number and cell carrier.
The SMS messages were encrypted, but the [metadata](../anonymitymetadata/index.html) was still easily accessible to mobile carriers.
The SMS messages were encrypted, but the [metadata](../anonymitymetadata/index.md) was still easily accessible to mobile carriers.
In 2015, Signal [started to phase-out](https://signal.org/blog/goodbye-encrypted-sms/) SMS encryption feature in favor of providing their internet connected infrastructure.
One thing that haven't changed until this day is the requirement for the phone number (which is inherently [not anonymous](../opsec/phonenumbers/index.md)).
One thing that haven't changed until this day is the requirement for the phone number (which is inherently [not anonymous](../phonenumbers/index.md)).
### Costs
@ -119,7 +119,7 @@ US national security leaders have been found to use Signal to [discuss military
### Anonymous Chats
SimpleX supports [anonymous chats](../opsec/chats/index.md#anonymous-chat-example) which allow users to plausibly deny their participation in a conversation by using one-time nickname for each conversation.
SimpleX supports [anonymous chats](../chats/index.md#anonymous-chat-example) which allow users to plausibly deny their participation in a conversation by using one-time nickname for each conversation.
This reduces the risk of being linked to specific messages or conversations.
![diagram showing how simplex anonymous chats prevent chat correlation](3.png)
@ -130,7 +130,7 @@ There's no such feature in Signal. Usernames can be changed at any time, but the
### Self-Hostable and Decentralized
SimpleX Chat comes with their SMP and XFTP servers preconfigured in client apps, however it's easy to [host your own](../opsec/anonsimplex/index.md) and switch to it. All servers are federated meaning they can talk to each other.
SimpleX Chat comes with their SMP and XFTP servers preconfigured in client apps, however it's easy to [host your own](../anonsimplex/index.md) and switch to it. All servers are federated meaning they can talk to each other.
The unofficial list of SMP and XFTP servers is available [here](https://simplex-directory.asriyan.me/#selected-servers=).
@ -146,18 +146,18 @@ Ease of self-hosting comes handy when someone tries to block the default messagi
By default, SimpleX Chat implements [message padding](https://simplex.chat/docs/glossary.html#message-padding) which mitigates sidechannel attacks to some level and [one-way SMP queues](https://github.com/simplex-chat/simplexmq/blob/stable/protocol/simplex-messaging.md#simplex-queue) which prevent the client IP being leaked to destination SMP server.
SimpleX tries to keep metadata to the minimum. To learn why that's detrimental to your anonymity, check out [this](../opsec/anonymitymetadata/index.md) blog post.
SimpleX tries to keep metadata to the minimum. To learn why that's detrimental to your anonymity, check out [this](../anonymitymetadata/index.md) blog post.
### Onion Only Servers
SimpleX Chat has support for onion only servers. That way both your and SMP server's IP is never leaked. Such servers [can communicate](../opsec/anonsimplex/index.md#only-using-your-own-onion-only-simplex-server-doesnt-isolate-you) with clearnet SMP servers without any issue.
SimpleX Chat has support for onion only servers. That way both your and SMP server's IP is never leaked. Such servers [can communicate](../anonsimplex/index.md#only-using-your-own-onion-only-simplex-server-doesnt-isolate-you) with clearnet SMP servers without any issue.
There is no client CAPTCHA mechanism that would hurt usability without exposing your IP address (like we saw in Signal).
## Conclusion
While both Signal and SimpleX Chat are good secure open-source messaging apps, for our use-case SimpleX Chat offers the best balance between security, [privacy, anonymity and deniability](../opsec/aps/index.md) and usability.
While both Signal and SimpleX Chat are good secure open-source messaging apps, for our use-case SimpleX Chat offers the best balance between security, [privacy, anonymity and deniability](../aps/index.md) and usability.
Signal on the other hand only provides security and partial privacy (you're private from your contacts if you use Usernames feature).
It is clearly focused more on usability and user-friendliness. That's what made the app so popular amongst less tech-savvy users.