<?xml version='1.0'?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:georss="http://www.georss.org/georss" xmlns:atom="http://www.w3.org/2005/Atom" >
<channel>
	<title><![CDATA[Signet Loupe: Articles de blog de Technologies]]></title>
	<link>https://ememiom.fr/iom/blog/group/266/all?offset=60</link>
	<atom:link href="https://ememiom.fr/iom/blog/group/266/all?offset=60" rel="self" type="application/rss+xml" />
	<description><![CDATA[]]></description>
	
	<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/548/starlink-est-disponible-en-france-contre-un-abonnement-stratospherique</guid>
	<pubDate>Tue, 11 May 2021 14:43:26 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/548/starlink-est-disponible-en-france-contre-un-abonnement-stratospherique</link>
	<title><![CDATA[Starlink est disponible en France contre un abonnement stratosphérique]]></title>
	<description><![CDATA[<p>Starlink, le réseau internet par satellite d'Elon Musk, est disponible en France depuis ce lundi 10 mai 2021, à partir de 99€ par mois. Pour l'instant en phase bêta, le service sera accessible à “un nombre limité d'utilisateurs” et l'entreprise prévient que certaines coupures pourraient avoir lieu.</p><p></p>
<p>Crédits : Starlink</p>
<p>Comme vous le savez peut-être, <a href="https://www.phonandroid.com/starlink-larcep-dit-oui-les-francais-pourront-bientot-sabonner-au-fai-delon-musk.html">l'Arcep a dit oui quant à l'arrivée de Starlink sur le sol français en février 2021</a>. Il n'était donc plus qu'une question de temps avant de voir le réseau internet par satellite d'Elon Musk débarquer dans l'Hexagone, <a href="https://www.phonandroid.com/starlink-des-deputes-veulent-interdire-le-reseau-internet-delon-musk-en-france.html">au grand dam d'ailleurs des députés Insoumis</a>. C'est désormais chose faite depuis ce lundi 10 mai 2021.</p><p>En effet et comme on peut le lire sur le site officiel du service, les inscriptions à <a href="https://www.phonandroid.com/starlink-date-prix-vitesse-tout-savoir-sur-lacces-internet-tres-haut-debit-par-satellite.html">Starlink</a> sont ouvertes en France “à un nombre limité d'utilisateurs par zone de couverture”. SpaceX, maison-mère de Starlink, affirme que “les commandes seront traitées par ordre d'arrivée, selon le principe du premier arrivé, premier servi”. </p><p>À lire également : <a href="https://www.phonandroid.com/starlink-linternet-par-satellites-est-loin-detre-au-point-ce-test-de-performance-le-prouve.html">Starlink – l'Internet par satellite est loin d'être au point, ce test de performance le prouve</a></p>
<p>Il faudra payer le prix fort pour s'essayer à Starlink</p>
<p>Si vous êtes intéressé par l'offre de SpaceX, il faudra d'abord se procurer le kit Starlink comprenant le routeur Wi-Fi, l'alimentation, les câbles, la parabole et le trépied de montage. Un kit proposé à 499 € il faut le rappeler. À cette coquette somme, vous devrez rajouter 59 € de frais d'expédition et de dossier, puis souscrire à l'abonnement mensuel de 99 € par mois. Soit une enveloppe généreuse de 657 € pour votre premier mois chez Starlink.</p><p>À titre comparatif, l'offre de Neosat (une filiale d'Orange Nordnet) propose un abonnement de 60 € par mois, et un kit similaire affiché à 349 € qui comprend d'ailleurs l'intervention d'un technicien pour l'installation. Pour ce prix-là et durant <a href="https://www.phonandroid.com/starlink-lacces-internet-par-satellite-bientot-disponible-en-beta-pour-99-par-mois.html">la phase de bêta</a>, Starlink promet aux utilisateurs <a href="https://www.phonandroid.com/starlink-les-premiers-tests-affichent-un-debit-de-50-et-150-mbps.html">des vitesses de transfert entre 50 et 150 Mbit/s</a> et une latence de 20 à 40 ms “dans la plupart des lieux au cours des prochains mois à mesure que nous améliorons le système Starlink”. </p><p>Mais, et comme il y a toujours un mais, l'entreprise prévient ses clients que de “brèves périodes sans aucune connectivité” pourront arriver. Au gré de l'activation de nouveaux satellites, de stations terrestres et d'améliorations du logiciel de mise en réseau, Starlink espère offrir une vitesse de connexion proche de la fibre optique, soit 1 Gbit/s.</p><p>Source : <a href="https://www.starlink.com/" target="_blank" rel="nofollow">Starlink</a></p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/540/the-enclosure-of-the-public-interest-internet</guid>
	<pubDate>Sun, 09 May 2021 06:31:15 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/540/the-enclosure-of-the-public-interest-internet</link>
	<title><![CDATA[The Enclosure of the Public Interest Internet]]></title>
	<description><![CDATA[<p>This is the second in <a href="https://www.eff.org/deeplinks/2021/05/introducing-public-interest-internet" title="Introducing the Public Interest Internet">our blog series on the public interest internet</a>: past, present and future.</p><p>It’s hard to believe now, but in the early days of the public internet, the greatest worry of some of its most high-powered advocates was that it would be empty. As the Clinton administration prepared to transition the internet from its academic and military origins to the heart of the promised “national information infrastructure” (NII), the government’s advisors fretted that the United States entertainment and information industries would have no commercial reason to switch from TV, radio, and recorded music. And without Hollywood and the record labels on board, the new digital environment would end up as a ghost mall, devoid of businesses or users.</p><p> “All the computers, telephones, fax machines, scanners, cameras, keyboards, televisions, monitors, printers, switches, routers, wires, cables, networks and satellites in the world will not create a successful NII, if there is not content”, former Patent Office head Bruce Lehman’s notorious 1994 <a href="http://web.archive.org/web/20001209112100/http://palimpsest.stanford.edu/bytopic/intprop/ipwg/bg.html">government green paper on intellectual property on the Net</a> warned. The fear was that without the presence of the pre-packaged material of America’s entertainment industry, the nation would simply refuse to go online. As law professor Jessica Litman <a href="https://quod.lib.umich.edu/m/maize/mpub9798641/1:10/--digital-copyright?rgn=div1;view=fulltext">describes it</a>, these experts’ vision of the Internet was “a collection of empty pipes, waiting to be filled with content.” </p><p>Even as the politicians were drafting new, more punitive copyright laws intended to reassure Hollywood and the record labels (and tempt them into new, uncharted waters), the Internet’s first users were moving in and building anyway. Even with its tiny audience of technologists, first-adopters, and university students, the early net quickly filled with compelling “content,” a  free-wheeling, participatory online media that drew ever larger crowds as it evolved.</p><p>Even in the absence of music and movies, the first net users built towers of information about them anyway. In <a href="https://groups.google.com/g/rec.arts.movies">rec.arts.movies</a>, the Usenet discussion forum devoted to all things Hollywood, posters had been compiling and sharing lists of their favourite motion picture actors, directors, and trivia since the 1980s. By the time of the Lehman report, the collective knowledge of the newsgroup had outgrown its textual FAQs, and expanded first to a <a href="http://www.faqs.org/faqs/movies/movie-database-faq/">collectively-managed database</a> on Colorado University’s file site, and then onward to one of the very first database-driven websites, hosted on a spare server at Wales’ Cardiff University.</p><p class="pull-quote">Built in the same barn-raising spirit of the early net, the public interest internet exploits the low cost of organizing online to provide stable, free repositories of user-contributed information. They have escaped an exploited fate as proprietary services owned by a handful of tech giants.</p><p>These days, you’ll know that Cardiff Movie Database by another name – the <a href="https://www.imdb.com/">IMDb</a>. The database that had grown out of the rec.arts.movies contributions was turned into a commercial company in 1996 and sold to Amazon in 1998 for around $55 million dollars (equivalent to $88 million today). The Cardiff volunteers, led by one of its original moderators, Col Needham, continued to run the service as salaried employees of an Amazon subsidiary.</p><p>The IMDB shows how the original assumptions of Internet growth were turned on their head. Instead of movie production companies leading the way, their own audience had successfully built and monetised the elusive “content” of the information superhighway by themselves—for themselves.  The data of the rec.arts.movie databases was used by Amazon as the seed to build an exclusive subscriptions service, IMDbpro, for movie business professionals, and to augment their Amazon Prime video streaming service with quick-access film facts. Rather than needing the movie moguls’ permission to fill the Internet, the Internet ended up supplying information that those moguls themselves happily paid a new, digital mogul for.</p><p>But what about those volunteers who gave their time and labor to the collective effort of building this database for everyone? Apart from the few who became employees and shareholders of the commercial IMDb, they didn’t get a cut of the service’s profits. They also lost access to the full fruits of that comprehensive movie database. While you can still download the updated core of the <a href="https://www.imdb.com/interfaces/">Cardiff Database for free</a>, it only covers the most basic fields of the IMDb. It is licensed under a strictly non-commercial license, fenced off with <a href="https://help.imdb.com/article/imdb/general-information/can-i-use-imdb-data-in-my-software/G5JTRESSHJBBHTGX?pf_rd_m=A2FGELUUNOQJNL&amp;pf_rd_p=3aefe545-f8d3-4562-976a-e5eb47d1bb18&amp;pf_rd_r=84KBMNGZ585J9V0A96WS&amp;pf_rd_s=center-1&amp;pf_rd_t=60601&amp;pf_rd_i=interfaces&amp;ref_=fea_mn_lk1#">limitations and restrictions</a>. No matter how much you might contribute to the IMDb, you can’t profit from your labor. The deeper info that was originally built by the user-contributions  and supplemented by Amazon has been enclosed: shut away, in a proprietary paywalled property, gated off from the super-highway it rode in on.</p><p>It’s a story as old as the net is, and echoes historic stories of the <a href="http://www.onthecommons.org/magazine/brief-history-how-we-lost-commons">enclosure of the commons</a>. A pessimist would say that this has been the fate of much of the early net and its aspirations. Digital natives built, as volunteers, free resources for everyone. Then, struggling to keep them online in the face of the burdens of unexpected growth, they ended up selling up to commercial interests. Big Tech grew to its monopoly position by harvesting this public commons, and then locking it away.</p><p>But it’s not the only story from the early net. Everyone knows, too, the large public projects that somehow managed to steer away from this path. <a href="https://en.wikipedia.org/wiki/History_of_Wikipedia">Wikipedia</a> is the archetype, still updated by casual contributors and defiantly unpaid editors across the world, with the maintenance costs of its website comfortably funded by regular appeals from its attached non-profit. Less known, but just as unique, is <a href="https://www.openstreetmap.org/">Open Street Map</a> (OSM), a user-built, freely-licensed alternative to Google Maps, which has compiled from public domain sources and the hard work of its volunteer cartographers one of the most comprehensive maps of the entire earth. </p><p>These are flagships of what we at EFF call the public interest internet. They produce and constantly replenish priceless public goods, available for everyone, while remaining separate from government, those traditional maintainers of public goods. Neither are they commercial enterprises, creating private wealth and (one hopes) public benefit through the incentive of profit. Built in the same barn-raising spirit of the early net, the public interest internet exploits the low cost of organizing online to provide stable, free repositories of user-contributed information. Through careful stewardship, or unique advantages, they have somehow escaped an enclosed and exploited fate as a proprietary service owned by a handful of tech giants.</p><p>That said, while Wikipedia and OSM are easy, go-to examples of the public interest internet, they are not necessarily representative of it. Wikipedia and OSM, in their own way, are tech giants too. They run at the same global scale. They struggle with some of the same issues of accountability and market dominance. It’s hard to imagine a true competitor to Wikipedia or OSM emerging now, for instance—even though many have tried and failed. Their very uniqueness means that their influence is outsized. The remote, in-house politics at these institutions has real effects on the rest of society. Both Wikipedia and OSM have complex, often carefully negotiated, large-scale interactions with the tech giants. Google integrates Wikipedia into its searches, cementing the encyclopedia’s position. OSM is used by, and <a href="https://theodi.org/article/how-are-facebook-apple-and-microsoft-contributing-to-openstreetmap/">receives contributions</a> from, Facebook and Apple. It can be hard to know how individual contributors or users can affect the governance of these mega-projects or change the course of them. And there’s a recurring fear that the tech giants have more influence than the builders of these projects.</p><p>Besides, if there’s really only a handful of popular examples of public good production by the public interest internet, is that really a healthy alternative to the rest of the net? Are these just crocodiles and alligators, a few visible survivors from a previous age of out-evolved dinosaurs, doomed to be ultimately outpaced by sprightlier commercial rivals?</p><p>At EFF, we don’t think so. We think there’s a thriving economy of smaller public interest internet projects, which have worked out their own ways to survive on the modern internet. We think they deserve a role and representation in the discussions governments are having about the future of the net. Going further, we’d say that the real dinosaurs are our current tech giants. The small, sprightly, and public-minded public interest internet has always been where the benefits of the internet have been concentrated. They’re the internet’s mammalian survivors, hiding out in the nooks of the net, waiting to take back control when the tech giants are history.</p><p>In our next installment, we take a look at one of the <a href="https://www.eff.org/deeplinks/2021/05/outliving-outrage-public-interest-internet-cddb-story">most notorious examples of early digital enclosure</a>, its (somewhat) happier ending, and what it says about the survival skills of the public interest internet when a free database of compact discs outlasts the compact disc boom itself.</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/539/the-florida-deplatforming-law-is-unconstitutional-always-has-been</guid>
	<pubDate>Sun, 09 May 2021 06:30:37 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/539/the-florida-deplatforming-law-is-unconstitutional-always-has-been</link>
	<title><![CDATA[The Florida Deplatforming Law is Unconstitutional. Always has Been.]]></title>
	<description><![CDATA[<p>Last week, the Florida Legislature passed a bill prohibiting social media platforms from “knowingly deplatforming” a candidate (the Transparency in Technology Act, <a href="https://www.flsenate.gov/Session/Bill/2021/7072/?Tab=BillHistory">SB 7072</a>), on pain of a fine of up to $250k per day, unless, I kid you not, the platform owns a sufficiently large theme park. </p><p>Governor DeSantis is expected to sign it into law, as he <a href="https://floridapolitics.com/archives/400316-ron-desantis-declares-war-on-big-tech-cartel/">called for</a> laws like this. He cited social media de-platforming Donald Trump as  examples of the political bias of what he called “oligarchs in Silicon Valley.” The law is not just about candidates, it also bans “shadow-banning” and cancels cancel culture by prohibiting censoring “journalistic enterprises,” with “censorship” including things like posting “an addendum” to the content, i.e. fact checks.</p><p>This law, <a href="https://www.eff.org/deeplinks/2020/05/trump-executive-order-misreads-key-law-promoting-free-expression-online-and">like similar previous efforts</a>, is mostly performative, as it almost certainly will be found unconstitutional. Indeed, the parallels with a nearly 50 years old compelled speech precedent are uncanny. In 1974, in <a href="https://scholar.google.com/scholar_case?case=3261378222094247847">Miami Herald Publishing Co. v. Tornillo</a>, the Supreme Court struck down another Florida statute that attempted to compel the publication of candidate speech. </p>
<p>50 Years Ago, Florida's Similar "Right of Reply" Law Was Found Unconstitutional</p>
<p>At the time, Florida had a dusty "right of reply" law on the books, which had not really been used, giving candidates the right to demand that any newspaper who criticized them print a reply to the newspaper's charges, at no cost. The Miami Herald had criticized Florida House candidate <a href="https://www.edweek.org/teaching-learning/disgraced-union-leader-pat-tornillo-dies/2007/06">Pat Tornillo</a>, and refused to carry Tornillo’s reply. Tornillo sued.</p><p>Tornillo lost at the trial court, but found some solace on appeal to the Florida Supreme Court.  The Florida high court <a href="https://scholar.google.com/scholar_case?case=3244127799706723836">held</a> that the law was constitutional, writing that the “statute enhances rather than abridges freedom of speech and press protected by the First Amendment,” much like the proponents of today’s new law argue. </p><p>So off the case went to the US Supreme Court. Proponents of the right of reply raised the same arguments used today—that government action was needed to ensure fairness and accuracy, because “the 'marketplace of ideas' is today a monopoly controlled by the owners of the market.”  </p><p>Like today, the proponents argued new technology changed everything. As the Court acknowledged in 1974, “[i]n the past half century a communications revolution has seen the introduction of radio and television into our lives, the promise of a global community through the use of communications satellites, and the specter of a ‘wired’ nation by means of an expanding cable television network with two-way capabilities.”  Today, you might say that a wired nation with two-way communications had arrived in the global community, but you can’t say the Court didn’t consider this concern.</p><p class="pull-quote">You might wonder why the Florida Legislature would pass a law doomed to failure. Politics, of course.</p><p>The Court also accepted that the consolidation of major media meant “the dominant features of a press that has become noncompetitive and enormously powerful and influential in its capacity to manipulate popular opinion and change the course of events,” and acknowledged the development of what the court called “advocacy journalism,” eerily similar to the arguments raised today. </p><p>Paraphrasing the arguments made in favor of the law, the Court wrote “The abuses of bias and manipulative reportage are, likewise, said to be the result of the vast accumulations of unreviewable power in the modern media empires. In effect, it is claimed, the public has lost any ability to respond or to contribute in a meaningful way to the debate on issues,” just like today’s proponents of the Transparency in Technology Act.</p><p>The Court was not swayed, not because this was dismissed as an issue, but because government coercion could not be the answer. “However much validity may be found in these arguments, at each point the implementation of a remedy such as an enforceable right of access necessarily calls for some mechanism, either governmental or consensual. If it is governmental coercion, this at once brings about a confrontation with the express provisions of the First Amendment.” There is much to dislike about content moderation practices, but <a href="https://www.eff.org/deeplinks/2018/11/eff-court-remedy-bad-content-moderation-isnt-give-government-more-power-control">giving the government more control is not the answer</a>.</p><p>Even if one should decry the lack of responsibility of the media, the Court recognized “press responsibility is not mandated by the Constitution and like many other virtues it cannot be legislated.”  Accordingly, Miami Herald v. Tornillo reversed the Florida Supreme Court, and held the Florida statute compelling publication of candidates' replies unconstitutional.</p><p>Since Tornillo, courts have consistently applied it as binding precedent, including applying Tornillo to <a href="https://scholar.google.com/scholar_case?case=16203454798300551523">social media</a> and <a href="https://scholar.google.com/scholar_case?case=14043487021439226200">internet search engines</a>, the very targets of the Transparency in Technology Act (unless they own a theme park). Indeed, the compelled speech doctrine has even been used to <a href="https://www.eff.org/deeplinks/2020/03/ninth-circuit-private-social-media-platforms-are-not-bound-first-amendment">strike down</a> other attempts to counter perceived censorship of conservative speakers. </p><p>With the strong parallels with Tornillo, you might wonder why the Florida Legislature would pass a law doomed to failure, costing the state the time and expense of defending it in court. Politics, of course. The legislators who passed this bill probably knew it was unconstitutional, but may have seen political value in passing the base-pleasing statute, and blaming the courts when it gets struck down. </p><p>Politics is also the reason for the much-ridiculed exception for theme park owners. It’s actually a problem for the law itself. As the Supreme Court explained in <a href="https://scholar.google.com/scholar_case?case=11083261902857685106">Florida Star v BJF</a>, carve-outs like this make the bill even more susceptible to a First Amendment challenge as under-inclusive.  Theme parks are big business in Florida, and the law’s definition of social media platform would otherwise fit Comcast (which owns Universal Studios' theme parks), Disney, and even <a href="https://www.wired.com/2017/01/lego-life-social-network-kids/">Legoland</a>.  Performative legislation is less politically useful if it attacks a <a href="https://www.bizjournals.com/orlando/news/2019/11/20/heres-a-closer-look-at-orlandos-tourism-impact-on.html">key employer and economic driver</a> of your state. The theme park exception has also raised all sorts of amusing possibilities for the big internet companies to address this law by simply purchasing a theme park, which could easily be less expensive than compliance, even with the minimum 25 acres and 1 million visitors/year. Much as Section 230 Land would be high on my own must-visit list, striking the law down is the better solution.</p>
<p>The Control that Large Internet Companies Have on our Public Conversations Is An Important Policy Issue</p>
<p>The law is bad, and the legislature should feel bad for passing it, but this does not mean that the control that the large internet companies have on our public conversations isn’t <a href="https://www.eff.org/issues/corporate-speech-controls">an important policy issue</a>. As we have <a href="https://www.eff.org/deeplinks/2018/11/eff-court-remedy-bad-content-moderation-isnt-give-government-more-power-control">explained</a> <a href="https://www.eff.org/document/prager-university-v-google-eff-amicus-brief">to courts</a> considering the broader issue, if a candidate for office is suspended or banned from social media during an election, the public needs to know why, and and the candidate needs a process to appeal the decision. And this is not just for politicians - more often it is marginalized communities that bear the brunt of bad content moderation decisions. It is critical that the social platform companies provide transparency, accountability and meaningful due process to all impacted speakers, in the US and <a href="https://www.eff.org/deeplinks/2020/11/during-elections-and-always-platforms-should-listen-their-global-user-basehttps://www.eff.org/deeplinks/2020/11/during-elections-and-always-platforms-should-listen-their-global-user-base">around the globe</a>, and ensure that the enforcement of their content guidelines is fair, unbiased, proportional, and respectful of all users’ rights. </p><p>This is why EFF and a wide range of non-profit organizations in the internet space worked together to develop the <a href="https://santaclaraprinciples.org/">Santa Clara Principles</a>, which call upon social media to (1) publish the numbers of posts removed and accounts permanently or temporarily suspended due to violations of their content guidelines; (2) provide notice to each user whose content is taken down or account is suspended about the reason for the removal or suspension; and (3) provide a meaningful opportunity for timely appeal of any content removal or account suspension. </p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/538/comment-creer-un-serveur-de-fichiers-avec-brave</guid>
	<pubDate>Sat, 08 May 2021 16:41:26 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/538/comment-creer-un-serveur-de-fichiers-avec-brave</link>
	<title><![CDATA[Comment créer un serveur de fichiers avec Brave ?]]></title>
	<description><![CDATA[
<p>Brave est un navigateur Web extrêmement complet qui propose de nombreuses fonctionnalités avancées comme le partage de fichiers grâce au protocole IPFS.</p>

<p>Introduit il y a quelques mois par Brave au sein de son logiciel, le protocole IPFS permet d'héberger ses propres pages web sur un réseau décentralisé, ou chaque élément est stocké dans plusieurs nœuds.</p>

<p>Avec IPFS nous retrouvons plusieurs avantages. D'une part ce dispositif permet de répartir la charge réseau et donc d'optimiser la bande passante. Par ailleurs, le contenu se charge plus rapidement, surtout si le nombre de nœuds pour ce dernier est conséquent. Il ne s'agit alors plus d'accéder à un serveur central classique mais de récupérer le contenu sur les nodes les plus proches. Enfin, et c'est une bonne nouvelle, puisque l'on passe outre le protocole HTTP cela permet d'accéder à des contenus censurés.</p>

<p>Au-delà des simples page Web, ce protocole permet également de partager des fichiers très simplement en peer-to-peer à plusieurs de ses proches en passant directement par le navigateur. En d'autres termes, c'est une peu comme si nous retrouvions une sorte de WeTransfer directement intégré au navigateur.</p>

<p>De la même manière qu'un client BitTorrent , plus il y a de contacts partageant le même fichier, plus la vitesse de téléchargement sera importante.</p>

<p>Comment créer un serveur de fichiers avec Brave ?<br />1. Ouvrez une fenêtre du navigateur Brave et tapez l'adresse brave://ipfs-internals/ dans la barre d'adresses.</p>

<p>2. Cliquer sur Démarrer.</p>

<p>3. Cliquer sur « Mon nœud »</p>

<p>4. Vous arrivez sur l'interface de gestion. Pour envoyer un fichier, cliquez maintenant sur « Fichiers », dans le menu situé à gauche de l'interface.</p>

<p>5. Pour importer un fichier, cliquez sur le bouton "+Import", puis sur « Fichier ». Vous pouvez également envoyer un dossier entier en cliquant sur « Folder ».</p>

<p>6. Choisissez sur votre ordinateur le fichier à importer.</p>

<p>7. Pour partager votre fichier avec un ou plusieurs contacts, cliquez sur le menu d'options, symbolisé par les trois petits points à droite du fichier importé puis sur « Partager ».</p>

<p>8. Cliquer sur « Copy » pour copier le lien de partage.</p>

<p>Il ne reste plus qu'à l'envoyer à vos contacts pour qu'ils puissent commencer le téléchargement.</p>
]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/525/et-si-loutil-de-la-police-avait-perdu-toute-son-utilite-depuis-son-hack-par-le-createur-de-signal</guid>
	<pubDate>Fri, 30 Apr 2021 22:14:33 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/525/et-si-loutil-de-la-police-avait-perdu-toute-son-utilite-depuis-son-hack-par-le-createur-de-signal</link>
	<title><![CDATA[et si l&#039;outil de la police avait perdu toute son utilité depuis son hack par le créateur de Signal ?]]></title>
	<description><![CDATA[<p>L’impact de la révélation de Moxie Marlinspike ne s’est pas fait attendre. La semaine dernière, le créateur de Signal avait démontré <a href="https://www.vice.com/en/article/qj8pjm/cellebrite-pushes-update-after-signal-owner-hacks-device" target="_blank">l’existence de failles critiques</a> dans les extracteurs de données smartphone de Cellebrite. Ces failles permettraient de casser totalement l’intégrité des données extraites, et donc le fondement de certaines procédures pénales. Cet aspect des choses n’a pas échappé aux avocats qui commencent d’ores et déjà à utiliser ce nouveau fait pour mettre à mal les actes d’accusation.</p><p>Ainsi, selon Gizmodo, l’avocat Ramon Rozas, du Maryland, a décidé de s’appuyer sur la note de blog de Moxie Marlinspike pour demander un nouveau procès pour son client.<br />« Un nouveau procès devrait être ordonné afin que la défense puisse examiner le rapport produit par le dispositif Cellebrite à la lumière de ces nouvelles preuves, et examiner le dispositif Cellebrite lui-même », explique-t-il dans sa demande.<br />On verra si les juges seront réceptifs à ce type d’argument. Si oui, les enquêteurs et les procureurs vont avoir problème, car ils s’appuient de plus en plus sur cet outil technologique.</p><p>A découvrir aussi en vidéo :</p><p>Cette méfiance n’apparaît pas qu’aux États-Unis. En Israël, un militant des droits de l’homme a demandé aux autorités d’arrêter toute utilisation de Cellebrite au sein des forces de l’ordre, tant que la fiabilité de l’appareil n’est pas analysée.<br />Cellebrite, de son côté, tente d’éteindre le feu. Selon Vice, le fournisseur aurait déjà diffusé un patch pour minimiser la surface d’attaque des failles en question, sans pour autant publier de communiqué officiel à ce sujet.</p><p>Sources : <a href="https://gizmodo.com/signals-cellebrite-hack-is-already-causing-grief-for-th-1846773797" target="_blank">Gizmodo</a>, <a href="https://www.vice.com/en/article/qj8pjm/cellebrite-pushes-update-after-signal-owner-hacks-device" target="_blank">Vice</a></p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/524/une-porte-derobee-infecte-des-systemes-linux-depuis-des-annees</guid>
	<pubDate>Fri, 30 Apr 2021 22:14:00 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/524/une-porte-derobee-infecte-des-systemes-linux-depuis-des-annees</link>
	<title><![CDATA[Une porte dérobée infecte des systèmes Linux depuis des années]]></title>
	<description><![CDATA[<p>Les chercheurs en sécurité de Qihoo 360 ont découvert un malware qui espionne des systèmes Linux 64 bits depuis au moins trois ans. Baptisé « RokaJakiro », il est particulièrement furtif. Pour communiquer avec ses serveurs de commande et contrôle, il utilise le port 443, réservé normalement aux flux HTTPS. Le nom du fichier d’installation est particulièrement banal (systemd-daemon, gvfsd-helper). Et il utilise une série d’algorithmes pour rester sous le radar, comme le chiffrement AES, les codages XOR et de rotation et la compression Zlib.</p><p>A découvrir aussi en vidéo :</p><p>Le malware adapte son comportement en fonction du type de compte compromis (root ou non). Il est capable d’analyser le terminal infecté, d’exfiltrer des données sensibles et d’exécuter des plugins. Ces derniers n’ont toutefois pas pu être décortiqués par les chercheurs. Par ailleurs, on ne sait pas encore quel est le mode de diffusion de ce code malveillant. Enfin, les chercheurs ont remarqué que le code avait des similitudes avec <a href="https://blog.avast.com/new-torii-botnet-threat-research" target="_blank">Torii</a>, un botnet d’objets connectés assez sophistiqué détecté en 2018 par Avast. Beaucoup de questions restent donc encore ouvertes sur ce curieux malware.</p><p>Source: <a href="https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/" target="_blank">Qihoo 360</a></p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/523/most-secure-browser-for-your-privacy-in-2021</guid>
	<pubDate>Fri, 30 Apr 2021 22:07:57 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/523/most-secure-browser-for-your-privacy-in-2021</link>
	<title><![CDATA[Most secure browser for your privacy in 2021]]></title>
	<description><![CDATA[<p>Your web browser is the vehicle that carries you around the Internet to your desired websites. As such, it knows precisely what sites you have visited, how long you spent browsing them, and what you clicked on (or almost clicked on). Anyone who has access to your web browser can have a window into your income, your political leanings, and even your sexual preferences.</p><p>This is why it’s so important to only use browsers you know will protect and improve your internet privacy. In this article, we explain how browsers capture so much information and which web browsers in 2019 are best at keeping your browsing history safe from data-hungry tech companies and advertisers</p><p>Further reading: <a href="https://protonmail.com/blog/internet-privacy/">Easy steps to improve your internet privacy</a></p>
<p>How you are tracked online</p>
<p>Before examining the impact your browser can have on your privacy, you need to understand how your online activity is monitored.</p><p>While having a company directly record your browsing history is a risk (see Google Chrome), the more common threats to your privacy come from online advertisers and third-party trackers. Similar to Google, advertisers and trackers want to record as much of your online browsing as possible. The more data they have, the better they can show you ads specifically tailored to you. The two tools they use to follow you around the Internet are device fingerprinting and cookies.</p>
<p>Device fingerprinting is when a site looks at all the characteristics of your device (the make and model of your device, what browser you are using, what plugins you have installed, what timezone you are in, etc.) until it has enough information to identify and follow it. Your device share this information to optimize the websites you visit. For example, websites want to know if you’re using a laptop or a smartphone so that it can select the correct font size and screen resolution. This can be surprisingly accurate. To see if your device has an easily identifiable fingerprint, check out the Electronic Frontier Foundation’s <a href="https://panopticlick.eff.org/" target="_blank" rel="noreferrer noopener" aria-label="Panopticlick">Panopticlick</a>.<br />Cookies, or HTTP cookies, are tiny data packets that websites or services plant on your browser while you’re on a website. These cookies differentiate your browsers from others, like a nametag. <br />The privacy risks of Chrome</p>
<p>Any discussion of privacy and Web browsers must begin with Google Chrome. It is, by far, the most popular Web browser. Chrome handles <a rel="noreferrer noopener" aria-label="over 60 percent of web traffic" href="https://netmarketshare.com/browser-market-share.aspx?options=%7B%22filter%22%3A%7B%7D%2C%22dateLabel%22%3A%22Custom%22%2C%22attributes%22%3A%22share%22%2C%22group%22%3A%22browser%22%2C%22sort%22%3A%7B%22share%22%3A-1%7D%2C%22id%22%3A%22browsersDesktop%22%2C%22dateInterval%22%3A%22Monthly%22%2C%22dateStart%22%3A%222019-06%22%2C%22dateEnd%22%3A%222019-06%22%2C%22segments%22%3A%22-1000%22%7D" target="_blank">over 60 percent of web traffic</a>. This is unfortunate because Google uses Chrome as a window to peer into every action you take online. Unless you <a rel="noreferrer noopener" aria-label="modify your Google privacy settings" href="https://protonvpn.com/blog/how-to-delete-your-google-data/" target="_blank">modify your Google privacy settings</a>, Chrome records every site you visit so Google can serve you targeted ads.</p><p>Even worse, Chrome does very little to block other advertisers and trackers from monitoring you with cookies or device fingerprinting. A <a rel="noreferrer noopener" aria-label="Washington Post" href="https://www.washingtonpost.com/technology/2019/06/21/google-chrome-has-become-surveillance-software-its-time-switch/" target="_blank">Washington Post</a> <a rel="noreferrer noopener" aria-label="Washington Post" href="https://www.washingtonpost.com/technology/2019/06/21/google-chrome-has-become-surveillance-software-its-time-switch/" target="_blank">article</a> reported Chrome gathers roughly 11,000 trackers in an average week. Do you want 11,000 pairs of eyes on you every time you do an Internet search?</p>
<p>[embedded content]</p>
<p>However, you do not need to give away your personal data to access the Internet.</p><p>There are Internet browsers that do not record your every action and protect you from trackers. Switching from Chrome to one of the following browsers can drastically reduce the amount of data you are inadvertently sharing as you browse the Internet.</p><p>Further reading: <a href="https://protonmail.com/blog/google-privacy-problem/">Gmail’s privacy problem and why it matters</a></p>
<p>Best secure and privacy-first web browsers: <br />1. (tie) Brave</p>
<p>The Brave browser was designed to make privacy simple enough for everyone. It is an open source browser built on top of Chromium (an open source version of the Chrome browser), which means it’s easy for Chrome users to make the switch.</p><p>However, unlike Chrome, Brave does not collect any data about your online activity. Your data remains private and on your device.</p><p>Brave also makes blocking trackers easy. Instead of forcing users to decide which plugins and browser extensions they should download, Brave comes fully equipped. It automatically blocks all third-party and advertising cookies, and because <a rel="noreferrer noopener" aria-label="HTTPS Everywhere" href="https://www.eff.org/https-everywhere" target="_blank">HTTPS Everywhere</a> is built-in, it ensures all your connections are securely HTTPS encrypted. Brave also features <a rel="noreferrer noopener" aria-label="Fingerprinting Protection" href="https://github.com/brave/brave-browser/wiki/Fingerprinting-Protection-Mode" target="_blank">Fingerprinting Protection</a> in the browser.</p><p>The company also has a social mission: to encourage websites not to rely on advertising based on tracking you around the Internet. Brave has introduced a system that allows you to reward creators and sites you visit directly.</p><p>Called <a rel="noreferrer noopener" aria-label="Brave Rewards" href="https://brave.com/brave-rewards/" target="_blank">Brave Rewards</a>, it uses a utility token called a Basic Attention Token and enables you to anonymously reward the websites you visit most. Brave also has opt-in, privacy-preserving Brave Ads, and users who choose to view them earn 70% of the ad revenue, which they can then use to reward their favorite online creators.</p><p>Brave is available for <a rel="noreferrer noopener" aria-label="desktop" href="https://brave.com/download/" target="_blank">desktop</a>, <a rel="noreferrer noopener" aria-label="Android" href="https://play.google.com/store/apps/details?id=com.brave.browser&amp;hl=en" target="_blank">Android</a>, and <a rel="noreferrer noopener" aria-label="iOS" href="https://apps.apple.com/gb/app/brave-browser-fast-web-privacy/id1052879175?mt=8&amp;ign-mpt=uo%3D4" target="_blank">iOS</a>. </p>
<p>1. (tie) Firefox </p>
<p>The open source Firefox is the third-most-popular browser on the Internet, behind Google’s Chrome and Apple’s Safari. Developed by Mozilla, the Firefox team has improved the browser’s privacy protections in recent years.</p><p>They have introduced <a rel="noreferrer noopener" aria-label="advanced anti-fingerprinting" href="https://blog.mozilla.org/firefox/how-to-block-fingerprinting-with-firefox/" target="_blank">advanced anti-fingerprinting</a> and <a rel="noreferrer noopener" aria-label="Enhanced Tracking Protection" href="https://blog.mozilla.org/firefox/control-trackers-with-firefox/" target="_blank">Enhanced Tracking Protection</a> features this year, both of which make it much more difficult for third-party trackers to follow you around the Internet.</p><p>Unlike Brave, the standard Firefox does not automatically block advertisements. However, there are numerous browser extensions that you can download that will prevent advertisers from getting your information or showing you ads.</p><p>Or, if you primarily browse the Internet on your mobile device, <a rel="noreferrer noopener" aria-label="Firefox Focus" href="https://www.mozilla.org/en-US/firefox/mobile/#focus" target="_blank">Firefox Focus</a> incorporates automatic ad blocking. (Focus was developed as an ad blocker for Safari, but was then transformed into a minimalistic privacy browser for Android users.) </p><p>Firefox is available for <a rel="noreferrer noopener" aria-label="desktop" href="https://www.mozilla.org/en-US/firefox/new/" target="_blank">desktop</a>, <a rel="noreferrer noopener" aria-label="Android" href="https://play.google.com/store/apps/details?id=org.mozilla.firefox" target="_blank">Android</a>, and <a rel="noreferrer noopener" aria-label="iOS" href="https://apps.apple.com/us/app/firefox-private-safe-browser/id989804926" target="_blank">iOS</a>. </p>
<p>3. Tor browser</p>
<p>As we have discussed elsewhere, <a rel="noreferrer noopener" aria-label="Tor is the best option" href="https://protonvpn.com/blog/is-tor-safe/" target="_blank">Tor is the best option</a> if privacy is your utmost concern. The Tor browser is based on Firefox, but it has been stripped down and specially calibrated to run on the Tor network.</p><p>When you use Tor, your traffic is encrypted three times and bounced between three Tor servers before it reaches your desired website. The encryption is handled in such a way that each server only has access to one set of instructions, so no server has access to both your IP address and the website you are visiting.</p><p>This setup makes it impossible for Tor to keep any records about your online activity, and every time you close your session, the browser deletes your cookie cache and browsing history. The browser itself is formatted to prevent fingerprinting, and it blocks all kinds of trackers.</p><p>Unfortunately, it also blocks a lot of plugins that websites rely on. For example, with its privacy settings fully activated, the Tor browser will block JavaScript. JavaScript can expose user information, but blocking it can make websites unusable. Using Tor can also mean performing endless CAPTCHA verifications when you try to access larger sites. Finally, the Tor browser is slower than other browsers because of the extra encryption.</p><p>Download the Tor browser app for <a rel="noreferrer noopener" aria-label="desktop" href="https://www.torproject.org/download/" target="_blank">desktop</a> and <a rel="noreferrer noopener" aria-label="Android" href="https://play.google.com/store/apps/details?id=org.torproject.torbrowser&amp;hl=en_GB" target="_blank">Android</a>, as well as a Tor-approved open source <a rel="noreferrer noopener" aria-label="Onion browser for iOS" href="https://apps.apple.com/gb/app/onion-browser/id519296448" target="_blank">Onion browser for iOS</a>.  </p>
<p>4. DuckDuckGo (honorable mention)</p>
<p>Unlike the other browsers mentioned above, DuckDuckGo does not have a standalone desktop browser, which means it is only a solution if you are browsing the Internet on your smartphone or tablet. With the DuckDuckGo browser, your browsing history never leaves your device. Deleting your entire browsing history is as easy as tapping a single button.</p><p>It automatically blocks ads, stops third-party trackers, and ensures HTTPS encryption on all sites where that’s possible. One feature that does set it apart is the Privacy Grade it gives each site. This makes it easy for you to evaluate how much data each website collects from you, with and without DuckDuckGo’s protections, at a single glance.</p><p>The DuckDuckGo browser is available for <a rel="noreferrer noopener" aria-label="Android" href="https://play.google.com/store/apps/details?id=com.duckduckgo.mobile.android" target="_blank">Android</a> and <a rel="noreferrer noopener" aria-label="iOS" href="https://itunes.apple.com/us/app/duckduckgo-search-stories/id663592361?mt=8" target="_blank">iOS</a>.<br />You can also use the extension for <a rel="noreferrer noopener" aria-label="Chrome" href="https://chrome.google.com/webstore/detail/duckduckgo-privacy-essent/bkdgflcldnnnapblkhphbgpggdiikppg?hl=en" target="_blank">Chrome</a> and <a rel="noreferrer noopener" aria-label="Firefox" href="https://addons.mozilla.org/en-US/firefox/addon/duckduckgo-for-firefox/" target="_blank">Firefox</a>.</p><p>The Web browser you choose can have a dramatic impact on your overall online privacy. By switching to one of the privacy-focused browsers in this article, you can protect your browsing history from the companies and trackers that want to monitor your every digital move.</p><p>What’s your favorite web browser? Let us know in the comments below on <a href="https://twitter.com/ProtonMail">Twitter</a> or <a href="https://www.reddit.com/r/ProtonMail/">Reddit</a>.</p><p>Best Regards,<br />The ProtonMail Team</p><p>You can get a <a href="https://protonmail.com/signup" target="_blank" rel="noreferrer noopener" aria-label="free secure email account from ProtonMail here">free secure email account from ProtonMail here</a>.</p><p>We also provide a <a href="https://protonvpn.com/" target="_blank" rel="noreferrer noopener" aria-label="free VPN service">free VPN service</a> to protect your privacy.</p><p>ProtonMail and ProtonVPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a <a rel="noreferrer noopener" aria-label="paid plan" href="https://protonmail.com/support/knowledge-base/paid-plans/" target="_blank">paid plan</a> or <a rel="noreferrer noopener" aria-label="donate" href="https://protonmail.com/donate" target="_blank">donate</a>. Thank you for your support.</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/518/kaspersky-a-identifie-les-nouveaux-outils-de-piratage-de-la-cia</guid>
	<pubDate>Thu, 29 Apr 2021 21:34:53 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/518/kaspersky-a-identifie-les-nouveaux-outils-de-piratage-de-la-cia</link>
	<title><![CDATA[Kaspersky a identifié les nouveaux outils de piratage de la CIA]]></title>
	<description><![CDATA[<p class="delta py0p5">Chaque mois, les éditeurs d'antivirus reçoivent des échantillons des menaces en cours. Depuis deux ans, Kasperksy a isolé des malwares très sophistiqués, et il vient de les identifier comme des logiciels de cyber-espionnage utilisés par le renseignement américain.</p><p>Cela vous intéressera aussi</p><p class="mt1"> [EN VIDÉO] Qu'est-ce qu'une cyberattaque ?  Avec le développement d'Internet et du cloud, les cyberattaques sont de plus en plus fréquentes et perfectionnées. Qui est derrière ces attaques et dans quel but ? Quelles sont les méthodes des hackers et quelles sont les cyberattaques les plus massives ? </p><p class="zeta py0p5">Pour espionner et contre-espionner, les agences du renseignement de n'importe quel pays utilisent les mêmes outils que les pirates : des malwares. Tout est secret défense, mais Kaspersky pense avoir mis la main sur les <a data-tooltip="" href="https://www.futura-sciences.com/tech/definitions/informatique-logiciel-561/" class="tooltip-link" data-color="bright-blue" data-title="Logiciel" data-number="" data-copy="Formé à partir des mots logique et matériel, le mot logiciel a été inventé en 1969 pour remplacer le terme anglais software. Il désigne l'ensemble des programmes et des procédures nécessaires au fonctionnement d'un système informatique : c’est lui qui indique à l’ordinateur comment effectuer les..." data-image="https://cdn.futura-sciences.com/buildsv6/images/midioriginal/5/7/6/576df1d0de_128295_logiciel-c-carlos-muza-unsplash.jpg" data-url="/tech/definitions/informatique-logiciel-561/" data-more="Lire la suite">logiciels</a> utilisés par la CIA. Bien évidemment, en prenant le soin de ne pas la nommer.</p><p class="zeta py0p5">Dans son <a href="https://securelist.com/apt-trends-report-q1-2021/101967/" target="_blank">rapport trimestriel</a>, le seul célèbre éditeur d'antivirus explique ainsi qu'il a étudié des échantillons de malwares envoyés en février 2019 aux experts de sécurité. C'est ce qui se fait habituellement, et les plus grands antivirus sont chargés de les analyser pour renforcer la protection de leurs solutions, mais aussi de faire le point sur les menaces actuelles.</p>
<p>Une variante d'un cheval de Troie utilisé depuis 2014</p>
<p class="zeta py0p5">Certains des échantillons ne peuvent être associés à aucune activité connue. Kaspersky explique qu'il a alors isolé les malwares les plus sophistiqués, et les experts ont découvert des similitudes dans le codage, le <a data-tooltip="" href="https://www.futura-sciences.com/sciences/definitions/physique-gnomon-14968/" class="tooltip-link" data-color="purple" data-title="Gnomon" data-number="" data-copy="On appelle «&amp;nbsp;gnomon&amp;nbsp;», ou «&amp;nbsp;style »,&amp;nbsp;la tige, verticale ou non, qui projette son&amp;nbsp;ombre sur un cadran solaire. Le terme vient du grec&amp;nbsp;signifiant&amp;nbsp;: «&amp;nbsp;celui qui sait&amp;nbsp;».&lt;br /&gt;Gnomon : du simple bâton au cadran solaire&lt;br /&gt;Dans l’Antiquité, le gnomon était en..." data-image="https://cdn.futura-sciences.com/buildsv6/images/midioriginal/9/6/e/96ede18295_76402_gnomon.jpg" data-url="/sciences/definitions/physique-gnomon-14968/" data-more="Lire la suite">style</a> et les techniques utilisés dans la famille des logiciels malveillants dits Lambert. Il y a quatre ans, sous le nom de <a href="https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7ca2e331-2209-46a8-9e60-4cb83f9602de&amp;CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&amp;tab=librarydocuments" target="_blank">Vault7</a>, <a href="https://wikileaks.org/ciav7p1/" target="_blank">WikiLeaks</a> avait révélé au grand public les outils de la CIA et, chez Kaspersky, on avait décidé de les classer sous le nom de Lambert, avec un code <a data-tooltip="" href="https://www.futura-sciences.com/sciences/definitions/physique-couleur-4126/" class="tooltip-link" data-color="purple" data-title="Couleur" data-number="" data-copy="La couleur, c'est ce qui permet de différencier deux objets de formes et de structures identiques, par exemple le drapeau italien du drapeau français. C'est aussi ce qui n'est ni blanc, ni gris, ni noir. Le blanc et le noir étant les bornes de la gamme des gris neutres.&lt;br /&gt;Quelquefois, la couleur..." data-image="https://cdn.futura-sciences.com/buildsv6/images/midioriginal/7/9/5/7951943cc1_85596_couleur.jpg" data-url="/sciences/definitions/physique-couleur-4126/" data-more="Lire la suite">couleur</a> pour chaque variante.</p><p class="zeta py0p5">Aujourd'hui, il s'agit donc de Purple Lambert, et ce cheval de Troie permet de surveiller l'activité du réseau sur l'<a data-tooltip="" href="https://www.futura-sciences.com/tech/definitions/informatique-ordinateur-586/" class="tooltip-link" data-color="bright-blue" data-title="Ordinateur" data-number="" data-copy="Un ordinateur est un terminal électronique fonctionnant à l’aide d’un programme ou d’un jeu d’instructions qui lui font lire, manipuler et modifier des données numériques. L’origine de l’ordinateur remonte au milieu du 19e siècle lorsque le mathématicien britannique Charles Babbage conçut une..." data-image="https://cdn.futura-sciences.com/buildsv6/images/midioriginal/b/7/8/b7881acca1_68781_ibmmark1jpg.jpg" data-url="/tech/definitions/informatique-ordinateur-586/" data-more="Lire la suite">ordinateur</a> infecté. C'est un malware passif, qui agit en arrière-plan, et selon Kaspersky, son code date de 2014. C'est une découverte extrêmement rare et, bien sûr, l'éditeur ne nomme pas la CIA... Mais comme il range sa découverte dans la « <a href="https://securelist.com/unraveling-the-lamberts-toolkit/77990/" target="_blank">famille Lambert</a> », forcément, il s'agit des toolkits de piratage utilisés par le renseignement américain dans le passé contre l'« État islamique », ou encore le secteur de l'aviation civile chinoise.</p><p>Intéressé par ce que vous venez de lire ?</p><p>Lien externe</p><p>Définitions associées</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/514/comparison-of-communication-tools-for-companies</guid>
	<pubDate>Wed, 28 Apr 2021 19:49:15 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/514/comparison-of-communication-tools-for-companies</link>
	<title><![CDATA[Comparison of Communication Tools for Companies]]></title>
	<description><![CDATA[<p>In contrast to chat apps for private users, business solutions offer a console where company administrators can manage the employees. Thanks to Threema Work’s high flexibility, the service easily adapts to every organization’s needs. In BYOD scenarios, Threema Work scores extra points with Threema MDM, while most other solutions only support external MDM systems. Threema Work combines comprehensive pre-configuration options with a straightforward app distribution.</p><p>All solutions support integration into directory services. External users can join Threema Work without having to complete a tedious registration process and even without providing a phone number or email address. On top of that, Threema Work can also be restricted to a closed user group.</p><p>Not to offer an option to archive user chats on a central server (e.g., for compliance purposes) is a deliberate decision of Threema Work because this would, in theory, allow the service provider to access message contents, which, in turn, would render the security benefits of end-to-end encryption completely useless.</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/511/best-whatsapp-alternatives-that-respect-your-privacy</guid>
	<pubDate>Tue, 27 Apr 2021 21:34:01 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/511/best-whatsapp-alternatives-that-respect-your-privacy</link>
	<title><![CDATA[Best WhatsApp alternatives that respect your privacy]]></title>
	<description><![CDATA[<p>News that WhatsApp has been <a href="https://protonmail.com/blog/whatsapp-new-privacy-policy/" target="_blank" rel="noreferrer noopener">sharing</a> large amounts of highly personal data with Facebook since 2016 has led a large number of unhappy users to look for an alternative messaging app that genuinely respects their privacy.</p><p>At Proton, we view end-to-end encryption as a core requirement for any messenger app that claims to be secure and private. This means messages are encrypted on your device and can only be decrypted on the device of the intended recipient. </p><p>WhatsApp uses end-to-end encryption, so the actual messages are therefore secure on the platform. But this does nothing to stop Facebook from abusing metadata: information about whom you communicate with, from where, at what time, how often, and from which device.</p><p>Open source code is another important indicator that a service is secure. By publishing an app’s code publicly, anyone can examine it to ensure the app is doing what it is supposed to be doing. We believe open source is one of the best indicators that an app can be trusted.</p><p id="table">We have therefore limited the following list of best WhatsApp alternatives to open source messaging apps that use end-to-end encryption (E2EE). Please note that apps are not reviewed in any particular order.</p>
<p>Signal</p>
<p>Pro</p>
<p>Free<br />Very good encryption<br />Almost no metadata kept<br />Protocol independently audited<br />Seamless to use on Android<br />Disappearing messages<br />E2EE text, voice, and video group chat</p>
<p>Cons</p>
<p>Requires a valid phone number to register<br />Hosted on Amazon Web Services (AWS)</p>
<p>The Signal messaging protocol is an end-to-end messaging protocol developed by the Signal Foundation, a non-profit organization founded by cryptographer and privacy activist Moxie Marlinspike. The Signal Protocol is open source, has been professionally <a rel="noreferrer noopener" href="https://eprint.iacr.org/2016/1013.pdf" target="_blank">audited</a> for security vulnerabilities, and is widely <a rel="noreferrer noopener" href="https://twitter.com/Snowden/status/661313394906161152?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E661313394906161152%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.indiatoday.in%2Ftechnology%2Fnews%2Fstory%2Fhow-secure-is-signal-it-s-good-enough-for-edward-snowden-so-good-enough-for-you-1757596-2021-01-10" target="_blank">admired</a> for its cryptographic strength. </p><p>Because of the quality of the Signal protocol, it is used by a variety of third-party messaging apps to provide secure end-to-end encryption for messages. These include WhatsApp, Facebook Messenger, and Skype, Unlike WhatsApp and other third-party apps that implement the Signal protocol, however, the Signal app from the Signal Foundation is 100% open source. </p><p>Crucially, in light of recent heightened awareness about WhatsApp’s privacy policies, the Signal app and Signal Foundation keep almost no metadata related to the app’s usage. Only “the date and time a user registered with Signal and the last date of a user’s connectivity to the Signal service.” This is a claim that has been <a rel="noreferrer noopener" href="https://www.aclu.org/blog/national-security/secrecy/new-documents-reveal-government-effort-impose-secrecy-encryption?redirect=blog/free-future/new-documents-reveal-government-effort-impose-secrecy-encryption-company" target="_blank">proven in court</a>.</p><p>The app app itself has not been audited, however, and some <a rel="noreferrer noopener" href="https://medium.com/@maniacbolts/signal-increases-their-reliance-on-sgx-f46378f336d3" target="_blank">security concerns</a> exist around Signal’s reliance on Intel Software Guard Extensions (SGX). In theory, this could result in users’ metadata and data(but not messages) being compromised at the server level. This is a particular concern because Signal uses AWS to host its infrastructure, which is subject to legal demand from the US government.</p><p>Unlike WhatsApp, Signal is designed to replace your phone’s regular SMS messenger app on Android (not iOS). Texts exchanged to other Signal users are end-to-end encrypted, but texts to non-Signal users are not. Signal will warn you when messages are sent unencrypted. </p><p>This makes Signal very transparent in use, but the fact that users must register with a valid phone number in order to match contacts is also the main source of criticism the app receives. It should be noted, though, that contacts are stored locally only and cannot be accessed by Signal Foundation.</p><p>In addition to messages, Signal supports disappearing messages, E2EE group voice chats, and now group video chats between up to eight users. Signal is a non-profit organization that relies on donations to operate.</p>
<p>Telegram</p>
<p>Pros</p>
<p>Free<br />Channels for broadcasting messages<br />Bots for managing groups<br />Sync across multiple devices (not E2EE)<br />Polls, stickers, sharing live location, identity management<br />E2EE 1-1 text, voice, and video chat</p>
<p>Cons</p>
<p>Encryption concerns<br />Only Secret Chats are E2EE <br />Group chats (text or voice) are not E2EE<br />Collects lots of metadata<br />No group video chats<br />Requires a valid phone number to register<br />Headquartered in the UAE, which is not known for human rights or privacy from the government (despite having some <a href="https://blogs.dlapiper.com/privacymatters/dubai-difc-data-protection-law-2020/">strong privacy laws</a>)</p>
<p>With over 500 million users, Telegram is a very popular WhatsApp alternative. A big part of this popularity is the widespread perception that Telegram is highly secure, a perception only heightened by a number of governments, notably Indonesia, Russia, and Iran, trying to block or ban the app.</p><p>There are, however, some big caveats regarding the security that Telegram offers its users. Regular default “Cloud-based messages,” that can be accessed on any of a user’s devices, are encrypted in transit and when stored on Telegram’s servers, but they are not end-to-end encrypted. Only client-to-client “secret chats” are end-to-end encrypted. Secret Chats are not available for groups or channels.</p><p>The open source in-house MTProto encryption used to secure communications in Telegram (whether E2EE or otherwise) has come under <a rel="noreferrer noopener" href="https://eprint.iacr.org/2015/1177.pdf" target="_blank">criticism</a> from security experts, although the new version (<a rel="noreferrer noopener" href="https://core.telegram.org/mtproto/description" target="_blank">MTProto 2.0</a>) has been <a rel="noreferrer noopener" href="https://arxiv.org/pdf/2012.03141v1.pdf" target="_blank">formally verified</a> to be cryptographically sound. The Telegram API and all Telegram apps are open source, but its server-side backend is not. </p><p>Another issue is that Telegram may <a rel="noreferrer noopener" href="https://telegram.org/privacy" target="_blank">collect</a> a great deal of metadata from users: “We may collect metadata such as your IP address, devices and Telegram apps you’ve used, history of username changes, etc.”</p><p>On the other hand, Telegram has built its own secure cloud infrastructure, distributed across the globe. The encryption keys used to secure the Telegram Cloud are split in pieces and never stored in the same place as the information they protect.</p><p>Security considerations aside, a key feature that contributes to Telegram’s popularity (especially in repressive countries such as Iran, where it enjoys over 40 million users despite government attempts to regulate use of the service) is support for “channels.” Users can create and post to channels that any number of other users can subscribe to. </p><p>Public channels can be created using an alias and a URL that anyone can subscribe to, making Telegram a powerful tool for organizing resistance and disseminating information in repressive countries. </p><p>Other features that help make Telegram popular include polls, stickers, sharing live locations in chats, and an online authorization and identity management system for those who need to prove their identity. A bots feature assists managing groups and channels. </p><p>It also features One-to-one voice and video chats are fully end-to-end encrypted, although group voice chats are not. Group video calls are not supported.</p><p>Telegram is funded by public donations (notably from its own founder, <a href="https://en.wikipedia.org/wiki/Pavel_Durov" target="_blank" rel="noreferrer noopener">Pavel Durov</a>), although it is possible in-app monetization features will be introduced in the future.</p>
<p>Threema</p>
<p>Pros</p>
<p>No phone number or email required to sign up<br />Almost no metadata kept<br />Independently audited <br />Swiss-based with own servers<br />GDPR compliant<br />E2EE group text and voice chat<br />Group polling and distribution lists (Android only)</p>
<p>Cons</p>
<p>Not free<br />Relatively small userbase<br />No group video calls</p>
<p>Like Proton, Threema is based in Switzerland, a country with very strong data privacy laws and independent from the United States and European Union. It also owns its own server infrastructure located in Switzerland. </p><p>All Threema’s apps use the open source <a href="https://nacl.cr.yp.to/" target="_blank" rel="noreferrer noopener">NaCl cryptography library</a> for end-to-encryption of all communications, and all have been recently <a href="https://threema.ch/press-files/2_documentation/security_audit_report_threema_2019.pdf" target="_blank" rel="noreferrer noopener">audited</a> (in 2020) by security professionals. </p><p>An email address or phone number is not required to register an account, and it is possible to purchase Threema for Android anonymously using Bitcoin. Threema claims this allows you to text and make calls anonymously, and it goes to lengths to ensure that a <a rel="noreferrer noopener" href="https://threema.ch/en/blog/posts/metadata" target="_blank">minimum</a> amount of metadata is collected. </p><p>The fact that the app is not free is likely to be a pain point for some, but at around US$3 (one-time purchase), it’s unlikely to break the bank for most. This may contribute, however, to one of the biggest downsides with Threema: that its userbase is relatively small. </p><p>The Android app features distribution lists that allow you to send messages to multiple separate recipients. In addition to fully E2EE group text and voice calls, Threema offers a group polling feature. E2EE video calls are supported, but not for groups.</p>
<p>Wickr Me</p>
<p>Pros</p>
<p>Free<br />Built for ephemeral messaging<br />Anti-censorship feature<br />E2EE group text and voice chat<br />No phone number or email needed for signup</p>
<p>Cons</p>
<p>Apps themselves are not open source <br />Security audits are not published<br />No video chat (although available on free Pro version of app)</p>
<p>There are three Wickr apps, with the free Wickr Me being the version designed for personal use. The lowest tier of the more Slack-like Wickr Pro is also free, although it requires you to verify your identity at start-up.</p><p>Wickr Me places ephemeral messaging front and center, with messages disappearing from both the sending and receiving devices after a set period of time (six days by default). Undelivered messages sitting on Wickr servers are also deleted after this time.</p><p>You can also set a Burn-On-Read timer to determine how long a message lasts before self-destructing once it has been read. If it is not read then it will self destruct at the end of the message timer length. All metadata is scrubbed once a message is opened or expires (whichever comes first)</p><p>Wickr advertises itself as open source software, but there are a couple of major caveats to this claim. The code for the core <a href="https://github.com/WickrInc/wickr-crypto-c" target="_blank" rel="noreferrer noopener">wickr-crypto-c</a> end-to-end encryption protocol that underpins all Wickr apps is available on Github for anyone to examine, but licencing restrictions mean that it cannot truly be described as open source.</p><p>More serious from a security stand-point, though, is that while the core crypto protocol is source-available, the code for the Wickr apps themselves is not. Wickr says that its code has undergone multiple independent <a href="https://wickr.com/security/" target="_blank" rel="noreferrer noopener">security audits</a>, but the full results of these audits are not publicly available.</p><p>No phone number or email is needed to register with the service. Up to 10 people can be invited into a room or end-to-end encrypted text or voice group chat. Video conferencing is not available in Wickr Me, although it is supported in the Wickr Pro app (including E2EE group chat with all room members).</p><p>Wickr is hosted on public server networks (such as Google and AWS), but has partnered with Psiphon to offer <a rel="noreferrer noopener" href="https://wickr.com/product-feature-wickr-open-access/#:~:text=Wickr%20Open%20Access%20(WOA)%20will,%2C%20video%20conferencing%2C%20and%20more." target="_blank">Wickr Open Access</a>, a powerful anti-censorship feature.</p><p>Wickr Me is free, but it is funded through Wickr’s premium Pro and Enterprise apps. </p>
<p>Wire</p>
<p>Pros</p>
<p>Free option<br />E2EE text, voice, and video group chats<br />Syncs across up to eight devices<br />Advanced video conferencing features</p>
<p>Cons</p>
<p>Quite a lot of metadata logged (and possibly stored in plaintext)<br />Phone number or email address required to register</p>
<p>Wire is another service based in privacy-friendly based in Switzerland. A phone number or an email email to register. In order to facilitate syncing across multiple devices, however, Wire keeps quite a lot of metadata. </p><p>For years Wire kept a list of all users a customer has contacted in <a href="https://www.vice.com/en/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text" target="_blank" rel="noreferrer noopener">plaintext</a> on their servers until an account is deleted, and it is unclear if this practice continues. Wire’s <a href="https://www.vice.com/en/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text" target="_blank" rel="noreferrer noopener">privacy white paper</a>, however, makes it clear it logs data such as the participants in a group chat and user-defined folders used for organizing chats. </p><p>The functional benefit of this is that it allows Wire to work across multiple devices in a way most E2EE messenger apps (including Signal) do not. It’s also worth noting that Edward Snowden <a href="https://twitter.com/snowden/status/1175437588129308672" target="_blank" rel="noreferrer noopener">recommends</a> using Wire (or Signal).</p><p>Wire uses the Proteus protocol to provide end-to-end encryption for text messages. Proteus is an early fork from the code that went on to become the Signal Protocol. <a rel="noreferrer noopener" href="https://www.x41-dsec.de/reports/Kudelski-X41-Wire-Report-phase1-20170208.pdf" target="_blank">Proteus</a>, and all <a rel="noreferrer noopener" href="https://medium.com/@wireapp/wire-application-level-security-audits-98324d1f211b" target="_blank">Wire apps</a>, have been publicly audited (making Wire the only app we are aware of to have this done).</p><p>Voice (up to 25 participants) and video calls (up to 12 participants) are end-to-end encrypted using <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security" target="_blank">DTLS</a> with an <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol" target="_blank">SRTP</a> handshake.</p><p>The app does support advanced video conferencing features that will appeal to business users, though, including screen sharing, screen recording, and advanced meeting scheduling.</p><p>Wire is keen to push users toward its premium Pro and Enterprise products, but a free version is available which offers similar features to the Pro app.</p>
<p>Element (was Riot.im)</p>
<p>Pros</p>
<p>Free option<br />Server federation<br />“Bridges” for interoperability with other apps<br />E2EE text chat<br />No phone number or email needed for signup</p>
<p>Cons</p>
<p>Questions over Matrix server network reliability<br />Not fully audited</p>
<p>All the other messenger apps discussed in this article rely on a centralized server network to function (although, as in the case of using AWS, this can be a highly distributed network).</p><p>Element is instead built on the idea of federation. Users can set up their own servers using the <a href="https://matrix.org/faq/" target="_blank" rel="noreferrer noopener">Matrix</a> communications protocol or connect to Matrix servers that have been set up by other users. Federation has received the <a href="https://twitter.com/Snowden/status/1175457923255951364" target="_blank" rel="noreferrer noopener">support</a> of Edward Snowden, but remains a controversial idea due to the potentially unreliable ad-hoc peer-to-peer nature of such a network.</p><p>Matrix servers are interoperable, so any user of any <a href="https://matrix.org/clients/" target="_blank" rel="noreferrer noopener">Matrix client</a> (Element is the most popular of these) can communicate with any other Matrix user. Matrix “bridges” even allow for communication with the users of other popular messaging platforms, such as Signal, Slack, or even WhatsApp.</p><p>Matrix (and thus Element) uses the <a href="https://matrix.org/docs/guides/end-to-end-encryption-implementation-guide" target="_blank" rel="noreferrer noopener">Olm implementation of the Double Ratchet algorithm</a>, with Megolm used for group communications. All Element apps, plus the Matrix protocol itself, are open source, but have not been formally audited. Olm and Megolm, however, <a href="https://www.nccgroup.trust/globalassets/our-research/us/public-reports/2016/november/ncc_group_olm_cryptogrpahic_review_2016_11_01.pdf" target="_blank" rel="noreferrer noopener">have</a>.</p><p>An email or phone number is not required to register with Element, although these can be added to make contact matching easier. By default, messages are hosted on a large public server run by Matrix, but you can connect to any Matrix server or set one up yourself in a matter of seconds.</p><p>All text chats and 1:1 voice and video calls are end-to-end encrypted. Group voice and video calls ( which also allow screen sharing) leverage Jitsi ( without E2EE support in Element at the present time). The Element app is free, but premium plans are available for Element-managed Matrix servers.</p>
<p>Keybase</p>
<p>Pros</p>
<p>Free (funding model is unclear)<br />E2EE text chats with support for public and private channels<br />Can connect to people via their social media profiles with PGP verification<br />Syncs across multiple devices<br />Self-destructing messages<br />Stellar wallet<br />250 GB free storage per user<br />Encryption is not TOFU</p>
<p>Cons</p>
<p>Owned by Zoom<br />A lot of metadata logged (much of it shared on a public blockchain)</p>
<p>Keybase is a free and open source (FOSS) messenger app (servers are not open source) that end-to-end encrypts all texts and files between users. Voice and video calls are not supported directly, but are possible using a (not E2EE) Jitsi bot.</p><p>E2EE group chat, with support for private and public “Teams” (i.e., channels) is end-to-end encrypted.</p><p>Keybase is notable for allowing you to connect to others using their social media (Twitter, GitHub, Reddit, Hacker News, and Mastodon) identities, which are verified using PGP encryption keys. No phone number or email address is required, and the app will sync across multiple devices. </p><p>The PGP-based end-to-end encryption used by Keybase is solid and underwent a <a rel="noreferrer noopener" href="https://keybase.io/docs-assets/blog/NCC_Group_Keybase_KB2018_Public_Report_2019-02-27_v1.3.pdf" target="_blank">full independent audit</a> in 2019. Interestingly, Keybase is almost unique in <a href="https://keybase.io/blog/chat-apps-softer-than-tofu" target="_blank" rel="noreferrer noopener">not supporting Trust On First Use (TOFU)</a> when connecting to servers. This helps to make it resistant to man-in-the middle attacks.</p><p>The app also offers self-destructing messages; bots to automate your Keybase tasks; a Stellar wallet; full PGP support for encrypting and decrypting messages and files; and 250 GB free storage per user.</p><p>However, messages are stored on centralized servers (based in the US), which log a worrying amount of <a href="https://keybase.io/docs/privacypolicy" target="_blank" rel="noreferrer noopener">personal data</a>. This includes your Team names and memberships, hashed passwords, account activity, your Keybase user ID and your IP address, network activity, and more. Not only is information stored encrypted, but much of it is added (in hashed form) to a public blockchain.</p><p>Arguably even more concerning is that Keybase is now owned by Zoom, a company <a rel="noreferrer noopener" href="https://www.theguardian.com/technology/2020/apr/02/zoom-technology-security-coronavirus-video-conferencing" target="_blank">widely</a> criticized for its many <a rel="noreferrer noopener" href="https://protonmail.com/blog/zoom-privacy-issues/" target="_blank">privacy</a> and <a rel="noreferrer noopener" href="https://www.vice.com/en/article/k7e95m/zoom-leaking-email-addresses-photos" target="_blank">security</a> lapses, and which may be subject to pressure from the <a rel="noreferrer noopener" href="https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/" target="_blank">Chinese government</a>. The fact that it is not clear how Zoom benefits from offering Keybase for free may also be a reason for concern.</p>
<p>Final thoughts</p>
<p>As a replacement for WhatsApp as a general purpose messenger that genuinely respects your privacy, Signal is an obvious choice, although being hosted on AWS servers remains a concern in light of its reliance on SGX. The security concerns around Telegram make it harder to recommend as a simple messenger, although its “channels” feature remains a powerful tool for organizing resistance in restrictive countries.</p><p>Another alternative for secure communication is end-to-end encrypted email. The biggest benefit of ProtonMail is its interoperability: You don’t need to have your recipient using the same messenger service to benefit from end-to-end encryption because, unlike any of the messenger apps discussed here, you can send end-to-end encrypted messages to anyone who has an email address using our <a href="https://protonmail.com/support/knowledge-base/encrypt-for-outside-users/" target="_blank" rel="noreferrer noopener">Encrypt for non-ProtonMail users</a> feature. The simplest way to benefit from E2EE, though, is to have both ends of the conversation using ProtonMail. Our servers are located in privacy-friendly Switzerland, and as with the messenger services discussed in this article, ProtonMail apps are open source.</p><p>The other apps discussed above all offer useful features that will appeal to those who need them, whether it’s anonymous sign-up, business collaboration tools, or server federation. Element/Matrix is a particularly strong choice for privacy enthusiasts, although its niche user base severely hampers its practicality as as a WhatsApp replacement.</p><p>As you take back your privacy in the digital age, anything you do to move more of your personal data behind strong encryption is an important step toward building an internet that puts people first.</p>
<p>FAQ</p>
<p>What are the dangers of using WhatsApp?</p><p>Since 2016, WhatsApp has <a href="https://www.wired.com/story/whatsapp-facebook-data-share-notification/#:~:text=01%3A52%20PM-,WhatsApp%20Has%20Shared%20Your%20Data%20With%20Facebook%20for%20Years%2C%20Actually,been%20in%20place%20since%202016." target="_blank" rel="noreferrer noopener">shared</a> the vast majority of its users’ transactional data and metadata with Facebook. A new privacy statement, which users must agree to by May 15, 2021, or use access to their accounts, “clarifies” this situation.</p><p>Information shared by WhatApp with Facebook includes your IP address, device ID, operating system, browser details, mobile network information, who you message, how long and how often you interact with them, transaction and payment data, and more.</p><p>Is WhatsApp chat private?</p><p>Messages in WhatsApp are end-to-end encrypted using the Signal protocol. This means only you and the intended recipient(s) can read your actual messages. So WhatsApp is secure. It does, however, collect a lot of metadata that is damaging to your privacy (see above).</p><p>What is the safest messaging app?</p><p>Signal is both highly secure and respects your privacy. We discuss it, plus the pros and cons of other good WhatsApp alternatives, in this article. </p><p>How can WhatsApp be free?</p><p>WhatsApp is owned by Facebook, which makes a <a rel="noreferrer noopener" href="https://protonmail.com/blog/how-big-tech-tracks-users/" target="_blank">huge amount</a> of money from invading users’ privacy in order to better target you with personalized ads. WhatsApp adds to the data Facebook knows about you by sending a great deal of metadata regarding your use of WhatsApp to Facebook. </p><p id="footnotes">Note that, as Signal and some of the other apps discussed in this article, show, it is possible to offer a free messaging app without invading users’ privacy in this way.</p><p><a href="https://protonmail.com/blog/whatsapp-alternatives/?utm_campaign=ww-fr-2c-generic-coms_email-monthly_newsletter&amp;utm_source=proton_users&amp;utm_medium=link&amp;utm_content=2021_-_march#table">Return to table</a></p><p>Footnotes:</p>
<p>All Telegram apps are open source, but the backend isn’t. This would not really be an issue if all communications were E2EE, but they are not by default (and no group chat is E2EE).<br />By default, Telegram chats are not end-to-end encrypted. Only client-to-client “secret chats” are. Secret chats are not available for groups or channels.<br />The 2015 audit of MTProto protocol was not very favorable. MTProto 2.0 has been formally verified to be cryptographically sound.<br />Wickr says its code has undergone multiple independent security audits, but the full results of these audits are not publicly available.<br />The Element apps and the Matrix protocol have not been formally audited. However, the Olm and Megolm protocols that underpin Matrix have.<br />All metadata is scrubbed once a message is opened or expires (whichever comes first).<br />Contacts can be added using social media profiles and verified using PGP keys.<br />Wickr has partnered with Psiphon to offer Wickr Open Access, a powerful anti-censorship feature for its servers.<br />Element and/or Matrix don’t actually own their own servers, but new Matrix servers can be set up within minutes on any server platform (or can be self-hosted). It is therefore almost impossible to shut down or block access to the Matrix platform. <br />Wire is based in Switzerland and all users outside the United States are subject to Swiss law. US users, however, are subject to US law.<br />Matrix is a community-developed open source platform whose federated servers can be hosted anywhere in the world. <br />Keybase is owned by Zoom, which may also be subject to pressure from China.</p>
<p><a href="https://protonmail.com/blog/whatsapp-alternatives/?utm_campaign=ww-fr-2c-generic-coms_email-monthly_newsletter&amp;utm_source=proton_users&amp;utm_medium=link&amp;utm_content=2021_-_march#table">Return to table</a></p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>

</channel>
</rss>