parent
325a97d433
commit
426f3859fa
Binary file not shown.
@ -0,0 +1,95 @@
|
|||||||
|
<!DOCTYPE html>
|
||||||
|
<html lang="en">
|
||||||
|
<head>
|
||||||
|
<title>(POST) Use Secure Messaging</title>
|
||||||
|
<link rel="icon" type="image/x-icon" href="../images/favicon.webp">
|
||||||
|
<link rel='stylesheet' type='text/css' href="../style.css">
|
||||||
|
<meta charset="utf-8"/>
|
||||||
|
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<a style="text-decoration: none;" href="../">
|
||||||
|
<pre class="main-header">
|
||||||
|
_______ _ _ _______ __ __ _______ _______ __ _
|
||||||
|
|______ | | |______ \_/ |_____| |_____| | \ |
|
||||||
|
______| |_____| | | | | | | | \_|
|
||||||
|
</pre>
|
||||||
|
</a>
|
||||||
|
|
||||||
|
<hr/><p><a href="../">sf.me</a> > <a style="color:#bd93f9" href="../blog/">Blog</a> > <a style="color:#bd93f9" href=".">Use Secure Messaging</a></p>
|
||||||
|
<h1>Use Secure Messaging</h1>
|
||||||
|
<p style="font-size:110%">Posted on: <strong>23 January 2024</strong></p>
|
||||||
|
<p style="font-size:110%">Reading time: <strong><strong>5 min</strong>
|
||||||
|
<p style="font-size:110%"></strong>Category: <a style="color:#ff79c6" href="../blog/software/"><strong>Software</strong></a> && <a style="color:#ff79c6" href="../blog/technology/"><strong>Technology</strong></a></p>
|
||||||
|
<p>In an era of uncomfortably intrusive tracking, the requirement for secure messaging has become crucial.
|
||||||
|
With companies like <a href="https://www.eff.org/deeplinks/2018/03/one-answer-facebook-problem-block-its-tracking-technologies">Meta</a> and <a href="https://www.eff.org/deeplinks/2020/03/google-says-it-doesnt-sell-your-data-heres-how-company-shares-monetizes-and">Google</a> intruding our privacy on a daily basis, we must take a stand, especially with the messaging applications, perhaps the most sensitive piece of software that people use.
|
||||||
|
In this article, I will explain why it is urgent for you to take the stand by using secure messaging and explain how to get started.</p>
|
||||||
|
<h2 id="privacy-an-ignored-factor">Privacy: An Ignored Factor</h2>
|
||||||
|
<p>Privacy is incredibly important in this modern day and age.
|
||||||
|
This is why I will only speak about messaging software that is <strong>both private and secure.</strong>
|
||||||
|
When choosing software, privacy and security should have equal importance.</p>
|
||||||
|
<h2 id="why-">Why?</h2>
|
||||||
|
<p>Why would one use secure messaging if they have nothing to hide?</p>
|
||||||
|
<h3 id="protecting-your-privacy">Protecting Your Privacy</h3>
|
||||||
|
<p>Your privacy is incredibly important.
|
||||||
|
However, it is ignored by most people, citing that they have nothing to hide.
|
||||||
|
Everyone has something to hide, whether that be related to their money, reputation or even personal issues.
|
||||||
|
Imagine your reaction if your current messages in their entirety got leaked, allowing anyone to read and go through them.
|
||||||
|
You would be uncomfortable and also fear people taking advantage of your private messages.
|
||||||
|
It is for this reason that it is important to safeguard your most personal conversations.</p>
|
||||||
|
<h3 id="avoiding-cyber-threats">Avoiding Cyber Threats</h3>
|
||||||
|
<p>Secure messaging uses end-to-end encryption.
|
||||||
|
However, it is not wise to completely trust when companies advertise end-to-end encryption.
|
||||||
|
It depends mostly on the algorithm that they use.
|
||||||
|
For example, the Signal protocol is open-source and fully available to the public.
|
||||||
|
This allows people to view and even contribute to improving its overall effectiveness.
|
||||||
|
However, WhatsApp's encryption is proprietary.
|
||||||
|
No one knows what encryption algorithm WhatsApp is running on their servers which makes it impossible to determine if it is secure.
|
||||||
|
All in all, you should do your own research before proceeding.</p>
|
||||||
|
<h3 id="protecting-metadata">Protecting Metadata</h3>
|
||||||
|
<p>Your <a href="https://ssd.eff.org/module/why-metadata-matters">metadata is crucial</a> to protecting your conversations.
|
||||||
|
It can give context to your messages.
|
||||||
|
Protecting your metadata helps mask your messages and protects it from being tampered.</p>
|
||||||
|
<h2 id="getting-started">Getting Started</h2>
|
||||||
|
<p>I will be showcasing how to download and use secure messaging apps.
|
||||||
|
As aforementioned, I will only show apps that are <strong>both secure and private.</strong></p>
|
||||||
|
<h3 id="1-choose-a-secure-app">1. Choose a secure app</h3>
|
||||||
|
<p>Firstly, download one of the following:</p>
|
||||||
|
<ol>
|
||||||
|
<li><a href="https://www.signal.org/">Signal</a> - It is free, open-source and is a great alternative for WhatsApp</li>
|
||||||
|
<li><a href="https://getsession.org/">Session</a> - It is incredibly private. You do not get a phone number and have to backup a seed phrase, making it complicated for most users.</li>
|
||||||
|
<li><a href="https://threema.ch/en">Threema</a> - Threema is a <strong>paid</strong> option but also easy to use.</li>
|
||||||
|
</ol>
|
||||||
|
<p>Next, open your app and set it up.
|
||||||
|
Keep only the bare minimum data about you.
|
||||||
|
For my name, I keep a dash (-) and no profile picture.</p>
|
||||||
|
<h3 id="2-enable-two-factor-authentication">2. Enable two-factor authentication</h3>
|
||||||
|
<p>Now, enable <a href="https://sufyaan.me/tfa">two-factor authentication</a> if available.
|
||||||
|
This allows you to prevent others from registering using your credentials without your consent.</p>
|
||||||
|
<h3 id="3-keep-updating">3. Keep updating</h3>
|
||||||
|
<p>Regularly check for updates.
|
||||||
|
If an app has an update, update it.
|
||||||
|
This prevents security and privacy breaches from occurring.</p>
|
||||||
|
<h3 id="4-use-disappearing-messages">4. Use disappearing messages</h3>
|
||||||
|
<p>Keep disappearing messages on by default.
|
||||||
|
This ensures that sensitive messages are deleted within a period of time.
|
||||||
|
For extremely sensitive chats, consider visiting the person you want to talk to physically.
|
||||||
|
If that is not an option, turn on disappearing messages and set a time limit for 5 minutes and chat with them, so that the messages disappear after 5 minutes.</p>
|
||||||
|
<h3 id="5-educate-your-contacts">5. Educate your contacts</h3>
|
||||||
|
<p>If your contacts are still on other messaging apps, convince them to join secure messaging apps as well.
|
||||||
|
This allows you to have a secure option even if your main chats are on the other app.</p>
|
||||||
|
<h2 id="conclusion">Conclusion</h2>
|
||||||
|
<p>In conclusion, it is important to employ secure messaging.
|
||||||
|
Signal, Session and Threema are all viable applications that one can use.
|
||||||
|
If only a few of your contacts are on Signal, do not worry.
|
||||||
|
Talk to them on Signal and the others on the app you talk with them on.
|
||||||
|
Remember, privacy is a journey, not a destination.</p>
|
||||||
|
<p><a href="mailto:sf@sufyaan.me?subject=Use%20Secure%20Messaging">>>> Reply To Me</a></p>
|
||||||
|
<p><a href="secure.pdf">>>> Download PDF</a></p>
|
||||||
|
<p style="text-align:center;"><a href="../books/" style="color:#bd93f9"><svg class="footer-posts" xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><mask id="ipSLeftOne0"><path fill="#fff" stroke="#fff" stroke-linejoin="round" stroke-width="4" d="M30 36L18 24l12-12v24Z"/></mask><path fill="#bd93f9" d="M0 0h48v48H0z" mask="url(#ipSLeftOne0)"/></svg>Previous Post</a> - <a style="color:#bd93f9" href="../terminal/">First Post</a> <svg class="footer-posts" xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 20 20"><path fill="#bd93f9" fill-rule="evenodd" d="M2.232 12.207a.75.75 0 0 1 1.06.025l3.958 4.146V6.375a5.375 5.375 0 0 1 10.75 0V9.25a.75.75 0 0 1-1.5 0V6.375a3.875 3.875 0 0 0-7.75 0v10.003l3.957-4.146a.75.75 0 0 1 1.085 1.036l-5.25 5.5a.75.75 0 0 1-1.085 0l-5.25-5.5a.75.75 0 0 1 .025-1.06Z" clip-rule="evenodd"/></svg></p>
|
||||||
|
<hr/>
|
||||||
|
<footer>
|
||||||
|
<p class="footer-text"><a style="color:#bd93f9" href="../blog">blog</a> - <a style="color:#ffb86c" href="../about">about</a> - <a style="color:#f1fa8c" href="../portfolio">portfolio</a> - <a style="color:#ff5555" href="../links">links</a></p>
|
||||||
|
<p class="footer-text" style="font-size:80%"><a href="../">sufyaan.me</a></p><p class="footer-text" style="font-size:65%"><a style="color:#aaaaaa" href="../sitemap">Site Map</a></p>
|
||||||
|
</footer>
|
||||||
|
|
Binary file not shown.
@ -0,0 +1,281 @@
|
|||||||
|
% Options for packages loaded elsewhere
|
||||||
|
\PassOptionsToPackage{unicode}{hyperref}
|
||||||
|
\PassOptionsToPackage{hyphens}{url}
|
||||||
|
|
||||||
|
\documentclass[
|
||||||
|
]{article}
|
||||||
|
\usepackage{amsmath,amssymb}
|
||||||
|
\usepackage{titlesec}
|
||||||
|
\usepackage{titling}
|
||||||
|
\usepackage{lmodern}
|
||||||
|
\usepackage{xcolor}
|
||||||
|
\usepackage{iftex}
|
||||||
|
\usepackage[margin=1in]{geometry}
|
||||||
|
\ifPDFTeX
|
||||||
|
\usepackage[T1]{fontenc}
|
||||||
|
\usepackage[utf8]{inputenc}
|
||||||
|
\usepackage{textcomp} % provide euro and other symbols
|
||||||
|
\else % if luatex or xetex
|
||||||
|
\usepackage{unicode-math}
|
||||||
|
\defaultfontfeatures{Scale=MatchLowercase}
|
||||||
|
\defaultfontfeatures[\rmfamily]{Ligatures=TeX,Scale=1}
|
||||||
|
\fi
|
||||||
|
% Use upquote if available, for straight quotes in verbatim environments
|
||||||
|
\IfFileExists{upquote.sty}{\usepackage{upquote}}{}
|
||||||
|
\IfFileExists{microtype.sty}{% use microtype if available
|
||||||
|
\usepackage[]{microtype}
|
||||||
|
\UseMicrotypeSet[protrusion]{basicmath} % disable protrusion for tt fonts
|
||||||
|
}{}
|
||||||
|
\makeatletter
|
||||||
|
\@ifundefined{KOMAClassName}{% if non-KOMA class
|
||||||
|
\IfFileExists{parskip.sty}{%
|
||||||
|
\usepackage{parskip}
|
||||||
|
}{% else
|
||||||
|
\setlength{\parindent}{0pt}
|
||||||
|
\setlength{\parskip}{1pt plus 2pt minus 1pt}}
|
||||||
|
}{% if KOMA class
|
||||||
|
\KOMAoptions{parskip=half}}
|
||||||
|
\makeatother
|
||||||
|
\definecolor{myblue}{RGB}{24, 102, 201}
|
||||||
|
\titleformat{\section}
|
||||||
|
{\huge\bfseries\color{myblue}}
|
||||||
|
{}
|
||||||
|
{0em}
|
||||||
|
{}[\titlerule]
|
||||||
|
|
||||||
|
\titleformat{\subsection}
|
||||||
|
{\Large\bfseries}
|
||||||
|
{}
|
||||||
|
{0em}
|
||||||
|
{}
|
||||||
|
|
||||||
|
\titleformat{\subsubsection}[runin]
|
||||||
|
{\bfseries}
|
||||||
|
{}
|
||||||
|
{0em}
|
||||||
|
{}[:]
|
||||||
|
|
||||||
|
\titlespacing{\subsubsection}
|
||||||
|
{0em}{0.75em}{0.5em}
|
||||||
|
|
||||||
|
\titlespacing{\subsection}
|
||||||
|
{0em}{1em}{0.65em}
|
||||||
|
|
||||||
|
\titlespacing{\maketitle}
|
||||||
|
{0em}{0em}{0em}
|
||||||
|
\renewcommand{\maketitle}{
|
||||||
|
\begin{center}
|
||||||
|
{\huge\bfseries \theauthor}\\
|
||||||
|
\vspace{.35em}
|
||||||
|
\href{https://sufyaan.me/secure}{sufyaan.me/secure}
|
||||||
|
\end{center}
|
||||||
|
}
|
||||||
|
\usepackage{color}
|
||||||
|
\usepackage{fancyvrb}
|
||||||
|
\newcommand{\VerbBar}{|}
|
||||||
|
\newcommand{\VERB}{\Verb[commandchars=\\\{\}]}
|
||||||
|
\DefineVerbatimEnvironment{Highlighting}{Verbatim}{commandchars=\\\{\}}
|
||||||
|
% Add ',fontsize=\small' for more characters per line
|
||||||
|
\newenvironment{Shaded}{}{}
|
||||||
|
\newcommand{\AlertTok}[1]{\textcolor[rgb]{1.00,0.00,0.00}{\textbf{#1}}}
|
||||||
|
\newcommand{\AnnotationTok}[1]{\textcolor[rgb]{0.38,0.63,0.69}{\textbf{\textit{#1}}}}
|
||||||
|
\newcommand{\AttributeTok}[1]{\textcolor[rgb]{0.49,0.56,0.16}{#1}}
|
||||||
|
\newcommand{\BaseNTok}[1]{\textcolor[rgb]{0.25,0.63,0.44}{#1}}
|
||||||
|
\newcommand{\BuiltInTok}[1]{\textcolor[rgb]{0.00,0.50,0.00}{#1}}
|
||||||
|
\newcommand{\CharTok}[1]{\textcolor[rgb]{0.25,0.44,0.63}{#1}}
|
||||||
|
\newcommand{\CommentTok}[1]{\textcolor[rgb]{0.38,0.63,0.69}{\textit{#1}}}
|
||||||
|
\newcommand{\CommentVarTok}[1]{\textcolor[rgb]{0.38,0.63,0.69}{\textbf{\textit{#1}}}}
|
||||||
|
\newcommand{\ConstantTok}[1]{\textcolor[rgb]{0.53,0.00,0.00}{#1}}
|
||||||
|
\newcommand{\ControlFlowTok}[1]{\textcolor[rgb]{0.00,0.44,0.13}{\textbf{#1}}}
|
||||||
|
\newcommand{\DataTypeTok}[1]{\textcolor[rgb]{0.56,0.13,0.00}{#1}}
|
||||||
|
\newcommand{\DecValTok}[1]{\textcolor[rgb]{0.25,0.63,0.44}{#1}}
|
||||||
|
\newcommand{\DocumentationTok}[1]{\textcolor[rgb]{0.73,0.13,0.13}{\textit{#1}}}
|
||||||
|
\newcommand{\ErrorTok}[1]{\textcolor[rgb]{1.00,0.00,0.00}{\textbf{#1}}}
|
||||||
|
\newcommand{\ExtensionTok}[1]{#1}
|
||||||
|
\newcommand{\FloatTok}[1]{\textcolor[rgb]{0.25,0.63,0.44}{#1}}
|
||||||
|
\newcommand{\FunctionTok}[1]{\textcolor[rgb]{0.02,0.16,0.49}{#1}}
|
||||||
|
\newcommand{\ImportTok}[1]{\textcolor[rgb]{0.00,0.50,0.00}{\textbf{#1}}}
|
||||||
|
\newcommand{\InformationTok}[1]{\textcolor[rgb]{0.38,0.63,0.69}{\textbf{\textit{#1}}}}
|
||||||
|
\newcommand{\KeywordTok}[1]{\textcolor[rgb]{0.00,0.44,0.13}{\textbf{#1}}}
|
||||||
|
\newcommand{\NormalTok}[1]{#1}
|
||||||
|
\newcommand{\OperatorTok}[1]{\textcolor[rgb]{0.40,0.40,0.40}{#1}}
|
||||||
|
\newcommand{\OtherTok}[1]{\textcolor[rgb]{0.00,0.44,0.13}{#1}}
|
||||||
|
\newcommand{\PreprocessorTok}[1]{\textcolor[rgb]{0.74,0.48,0.00}{#1}}
|
||||||
|
\newcommand{\RegionMarkerTok}[1]{#1}
|
||||||
|
\newcommand{\SpecialCharTok}[1]{\textcolor[rgb]{0.25,0.44,0.63}{#1}}
|
||||||
|
\newcommand{\SpecialStringTok}[1]{\textcolor[rgb]{0.73,0.40,0.53}{#1}}
|
||||||
|
\newcommand{\StringTok}[1]{\textcolor[rgb]{0.25,0.44,0.63}{#1}}
|
||||||
|
\newcommand{\VariableTok}[1]{\textcolor[rgb]{0.10,0.09,0.49}{#1}}
|
||||||
|
\newcommand{\VerbatimStringTok}[1]{\textcolor[rgb]{0.25,0.44,0.63}{#1}}
|
||||||
|
\newcommand{\WarningTok}[1]{\textcolor[rgb]{0.38,0.63,0.69}{\textbf{\textit{#1}}}}
|
||||||
|
\setlength{\emergencystretch}{3em} % prevent overfull lines
|
||||||
|
\providecommand{\tightlist}{%
|
||||||
|
\setlength{\itemsep}{0pt}\setlength{\parskip}{0pt}}
|
||||||
|
\setcounter{secnumdepth}{-\maxdimen} % remove section numbering
|
||||||
|
\ifLuaTeX
|
||||||
|
\usepackage[bidi=basic]{babel}
|
||||||
|
\else
|
||||||
|
\usepackage[bidi=default]{babel}
|
||||||
|
\fi
|
||||||
|
\babelprovide[main,import]{english}
|
||||||
|
% get rid of language-specific shorthands (see #6817):
|
||||||
|
\let\LanguageShortHands\languageshorthands
|
||||||
|
\def\languageshorthands#1{}
|
||||||
|
\ifLuaTeX
|
||||||
|
\usepackage{selnolig} % disable illegal ligatures
|
||||||
|
\fi
|
||||||
|
\IfFileExists{bookmark.sty}{\usepackage{bookmark}}{\usepackage{hyperref}}
|
||||||
|
\IfFileExists{xurl.sty}{\usepackage{xurl}}{} % add URL line breaks if available
|
||||||
|
\urlstyle{same} % disable monospaced font for URLs
|
||||||
|
\hypersetup{
|
||||||
|
pdftitle={(POST) Use Secure Messaging},
|
||||||
|
pdflang={en},
|
||||||
|
colorlinks=true,
|
||||||
|
linkcolor=blue,
|
||||||
|
filecolor=blue,
|
||||||
|
urlcolor=blue,
|
||||||
|
pdfcreator={LaTeX via pandoc}}
|
||||||
|
|
||||||
|
\title{Sufyaan's Website}
|
||||||
|
\author{Sufyaan's Website}
|
||||||
|
\date{}
|
||||||
|
|
||||||
|
\begin{document}
|
||||||
|
\maketitle
|
||||||
|
|
||||||
|
\section{Use Secure Messaging}\label{use-secure-messaging}
|
||||||
|
|
||||||
|
Posted on: \textbf{23 January 2024}
|
||||||
|
|
||||||
|
Category: \textbf{Software} \& \textbf{Technology}
|
||||||
|
|
||||||
|
In an era of uncomfortably intrusive tracking, the requirement for
|
||||||
|
secure messaging has become crucial. With companies like
|
||||||
|
\href{https://www.eff.org/deeplinks/2018/03/one-answer-facebook-problem-block-its-tracking-technologies}{Meta}
|
||||||
|
and
|
||||||
|
\href{https://www.eff.org/deeplinks/2020/03/google-says-it-doesnt-sell-your-data-heres-how-company-shares-monetizes-and}{Google}
|
||||||
|
intruding our privacy on a daily basis, we must take a stand, especially
|
||||||
|
with the messaging applications, perhaps the most sensitive piece of
|
||||||
|
software that people use. In this article, I will explain why it is
|
||||||
|
urgent for you to take the stand by using secure messaging and explain
|
||||||
|
how to get started.
|
||||||
|
|
||||||
|
\hypertarget{privacy-an-ignored-factor}{%
|
||||||
|
\subsection{Privacy: An Ignored
|
||||||
|
Factor}\label{privacy-an-ignored-factor}}
|
||||||
|
|
||||||
|
Privacy is incredibly important in this modern day and age. This is why
|
||||||
|
I will only speak about messaging software that is \textbf{both private
|
||||||
|
and secure.} When choosing software, privacy and security should have
|
||||||
|
equal importance.
|
||||||
|
|
||||||
|
\hypertarget{why-}{%
|
||||||
|
\subsection{Why?}\label{why-}}
|
||||||
|
|
||||||
|
Why would one use secure messaging if they have nothing to hide?
|
||||||
|
|
||||||
|
\hypertarget{protecting-your-privacy}{%
|
||||||
|
\subsubsection{Protecting Your Privacy}\label{protecting-your-privacy}}
|
||||||
|
|
||||||
|
Your privacy is incredibly important. However, it is ignored by most
|
||||||
|
people, citing that they have nothing to hide. Everyone has something to
|
||||||
|
hide, whether that be related to their money, reputation or even
|
||||||
|
personal issues. Imagine your reaction if your current messages in their
|
||||||
|
entirety got leaked, allowing anyone to read and go through them. You
|
||||||
|
would be uncomfortable and also fear people taking advantage of your
|
||||||
|
private messages. It is for this reason that it is important to
|
||||||
|
safeguard your most personal conversations.
|
||||||
|
|
||||||
|
\hypertarget{avoiding-cyber-threats}{%
|
||||||
|
\subsubsection{Avoiding Cyber Threats}\label{avoiding-cyber-threats}}
|
||||||
|
|
||||||
|
Secure messaging uses end-to-end encryption. However, it is not wise to
|
||||||
|
completely trust when companies advertise end-to-end encryption. It
|
||||||
|
depends mostly on the algorithm that they use. For example, the Signal
|
||||||
|
protocol is open-source and fully available to the public. This allows
|
||||||
|
people to view and even contribute to improving its overall
|
||||||
|
effectiveness. However, WhatsApp\textquotesingle s encryption is
|
||||||
|
proprietary. No one knows what encryption algorithm WhatsApp is running
|
||||||
|
on their servers which makes it impossible to determine if it is secure.
|
||||||
|
All in all, you should do your own research before proceeding.
|
||||||
|
|
||||||
|
\hypertarget{protecting-metadata}{%
|
||||||
|
\subsubsection{Protecting Metadata}\label{protecting-metadata}}
|
||||||
|
|
||||||
|
Your \href{https://ssd.eff.org/module/why-metadata-matters}{metadata is
|
||||||
|
crucial} to protecting your conversations. It can give context to your
|
||||||
|
messages. Protecting your metadata helps mask your messages and protects
|
||||||
|
it from being tampered.
|
||||||
|
|
||||||
|
\hypertarget{getting-started}{%
|
||||||
|
\subsection{Getting Started}\label{getting-started}}
|
||||||
|
|
||||||
|
I will be showcasing how to download and use secure messaging apps. As
|
||||||
|
aforementioned, I will only show apps that are \textbf{both secure and
|
||||||
|
private.}
|
||||||
|
|
||||||
|
\hypertarget{1-choose-a-secure-app}{%
|
||||||
|
\subsubsection{1. Choose a secure app}\label{1-choose-a-secure-app}}
|
||||||
|
|
||||||
|
Firstly, download one of the following:
|
||||||
|
|
||||||
|
\begin{enumerate}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\href{https://www.signal.org/}{Signal} - It is free, open-source and
|
||||||
|
is a great alternative for WhatsApp
|
||||||
|
\item
|
||||||
|
\href{https://getsession.org/}{Session} - It is incredibly private.
|
||||||
|
You do not get a phone number and have to backup a seed phrase, making
|
||||||
|
it complicated for most users.
|
||||||
|
\item
|
||||||
|
\href{https://threema.ch/en}{Threema} - Threema is a \textbf{paid}
|
||||||
|
option but also easy to use.
|
||||||
|
\end{enumerate}
|
||||||
|
|
||||||
|
Next, open your app and set it up. Keep only the bare minimum data about
|
||||||
|
you. For my name, I keep a dash (-) and no profile picture.
|
||||||
|
|
||||||
|
\hypertarget{2-enable-two-factor-authentication}{%
|
||||||
|
\subsubsection{2. Enable two-factor
|
||||||
|
authentication}\label{2-enable-two-factor-authentication}}
|
||||||
|
|
||||||
|
Now, enable \href{https://sufyaan.me/tfa}{two-factor authentication} if
|
||||||
|
available. This allows you to prevent others from registering using your
|
||||||
|
credentials without your consent.
|
||||||
|
|
||||||
|
\hypertarget{3-keep-updating}{%
|
||||||
|
\subsubsection{3. Keep updating}\label{3-keep-updating}}
|
||||||
|
|
||||||
|
Regularly check for updates. If an app has an update, update it. This
|
||||||
|
prevents security and privacy breaches from occurring.
|
||||||
|
|
||||||
|
\hypertarget{4-use-disappearing-messages}{%
|
||||||
|
\subsubsection{4. Use disappearing
|
||||||
|
messages}\label{4-use-disappearing-messages}}
|
||||||
|
|
||||||
|
Keep disappearing messages on by default. This ensures that sensitive
|
||||||
|
messages are deleted within a period of time. For extremely sensitive
|
||||||
|
chats, consider visiting the person you want to talk to physically. If
|
||||||
|
that is not an option, turn on disappearing messages and set a time
|
||||||
|
limit for 5 minutes and chat with them, so that the messages disappear
|
||||||
|
after 5 minutes.
|
||||||
|
|
||||||
|
\hypertarget{5-educate-your-contacts}{%
|
||||||
|
\subsubsection{5. Educate your contacts}\label{5-educate-your-contacts}}
|
||||||
|
|
||||||
|
If your contacts are still on other messaging apps, convince them to
|
||||||
|
join secure messaging apps as well. This allows you to have a secure
|
||||||
|
option even if your main chats are on the other app.
|
||||||
|
|
||||||
|
\hypertarget{conclusion}{%
|
||||||
|
\subsection{Conclusion}\label{conclusion}}
|
||||||
|
|
||||||
|
In conclusion, it is important to employ secure messaging. Signal,
|
||||||
|
Session and Threema are all viable applications that one can use. If
|
||||||
|
only a few of your contacts are on Signal, do not worry. Talk to them on
|
||||||
|
Signal and the others on the app you talk with them on. Remember,
|
||||||
|
privacy is a journey, not a destination.
|
||||||
|
|
||||||
|
|
||||||
|
\end{document}
|
Loading…
Reference in New Issue