this post was submitted on 03 Feb 2025
-4 points (35.7% liked)

Cybersecurity

6124 readers
62 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
 

It stores all message data exclusively in volatile RAM, ensuring that no logs are retained and messages are automatically erased when the server is powered down or restarted. This ephemeral storage, combined with client-side quantum-resistant end-to-end encryption and default traffic routing over the Tor network, enhances user anonymity. Additionally, Amnesichat includes defenses against traffic analysis, operates efficiently on cheaper hardware, and supports group chats with pre-shared keys.

Source code: https://github.com/umutcamliyurt/Amnesichat

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 6 hours ago (2 children)

Although it might be legit, the cia did make their own messenger at some point to catch „bad guys“ iirc. There is a lengthy report on german television (zdf). should be availble in other languages as well.

[–] [email protected] 4 points 6 hours ago

Not to mention they blackmail people who run secure messaging services to give them back doors.

Happened twice as far as I can remember.

[–] [email protected] 1 points 5 hours ago* (last edited 5 hours ago)

Yeah, Anom or something. There was also a phone to go with it. SomeOrdinaryGamers did a video on it.

https://www.youtube.com/embed/P5yPBV2NKhc

I mean, Amnezichat appears to be open-source, so it could be audited; but it does seem suspicious.