<?xml version='1.0'?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:georss="http://www.georss.org/georss" xmlns:atom="http://www.w3.org/2005/Atom" >
<channel>
	<title><![CDATA[Signet Loupe: Avril 2021]]></title>
	<link>https://ememiom.fr/iom/blog/group/266/archive/1617235200/1619827200</link>
	<atom:link href="https://ememiom.fr/iom/blog/group/266/archive/1617235200/1619827200" rel="self" type="application/rss+xml" />
	<description><![CDATA[]]></description>
	
	<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/525/et-si-loutil-de-la-police-avait-perdu-toute-son-utilite-depuis-son-hack-par-le-createur-de-signal</guid>
	<pubDate>Fri, 30 Apr 2021 22:14:33 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/525/et-si-loutil-de-la-police-avait-perdu-toute-son-utilite-depuis-son-hack-par-le-createur-de-signal</link>
	<title><![CDATA[et si l&#039;outil de la police avait perdu toute son utilité depuis son hack par le créateur de Signal ?]]></title>
	<description><![CDATA[<p>L’impact de la révélation de Moxie Marlinspike ne s’est pas fait attendre. La semaine dernière, le créateur de Signal avait démontré <a href="https://www.vice.com/en/article/qj8pjm/cellebrite-pushes-update-after-signal-owner-hacks-device" target="_blank">l’existence de failles critiques</a> dans les extracteurs de données smartphone de Cellebrite. Ces failles permettraient de casser totalement l’intégrité des données extraites, et donc le fondement de certaines procédures pénales. Cet aspect des choses n’a pas échappé aux avocats qui commencent d’ores et déjà à utiliser ce nouveau fait pour mettre à mal les actes d’accusation.</p><p>Ainsi, selon Gizmodo, l’avocat Ramon Rozas, du Maryland, a décidé de s’appuyer sur la note de blog de Moxie Marlinspike pour demander un nouveau procès pour son client.<br />« Un nouveau procès devrait être ordonné afin que la défense puisse examiner le rapport produit par le dispositif Cellebrite à la lumière de ces nouvelles preuves, et examiner le dispositif Cellebrite lui-même », explique-t-il dans sa demande.<br />On verra si les juges seront réceptifs à ce type d’argument. Si oui, les enquêteurs et les procureurs vont avoir problème, car ils s’appuient de plus en plus sur cet outil technologique.</p><p>A découvrir aussi en vidéo :</p><p>Cette méfiance n’apparaît pas qu’aux États-Unis. En Israël, un militant des droits de l’homme a demandé aux autorités d’arrêter toute utilisation de Cellebrite au sein des forces de l’ordre, tant que la fiabilité de l’appareil n’est pas analysée.<br />Cellebrite, de son côté, tente d’éteindre le feu. Selon Vice, le fournisseur aurait déjà diffusé un patch pour minimiser la surface d’attaque des failles en question, sans pour autant publier de communiqué officiel à ce sujet.</p><p>Sources : <a href="https://gizmodo.com/signals-cellebrite-hack-is-already-causing-grief-for-th-1846773797" target="_blank">Gizmodo</a>, <a href="https://www.vice.com/en/article/qj8pjm/cellebrite-pushes-update-after-signal-owner-hacks-device" target="_blank">Vice</a></p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/524/une-porte-derobee-infecte-des-systemes-linux-depuis-des-annees</guid>
	<pubDate>Fri, 30 Apr 2021 22:14:00 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/524/une-porte-derobee-infecte-des-systemes-linux-depuis-des-annees</link>
	<title><![CDATA[Une porte dérobée infecte des systèmes Linux depuis des années]]></title>
	<description><![CDATA[<p>Les chercheurs en sécurité de Qihoo 360 ont découvert un malware qui espionne des systèmes Linux 64 bits depuis au moins trois ans. Baptisé « RokaJakiro », il est particulièrement furtif. Pour communiquer avec ses serveurs de commande et contrôle, il utilise le port 443, réservé normalement aux flux HTTPS. Le nom du fichier d’installation est particulièrement banal (systemd-daemon, gvfsd-helper). Et il utilise une série d’algorithmes pour rester sous le radar, comme le chiffrement AES, les codages XOR et de rotation et la compression Zlib.</p><p>A découvrir aussi en vidéo :</p><p>Le malware adapte son comportement en fonction du type de compte compromis (root ou non). Il est capable d’analyser le terminal infecté, d’exfiltrer des données sensibles et d’exécuter des plugins. Ces derniers n’ont toutefois pas pu être décortiqués par les chercheurs. Par ailleurs, on ne sait pas encore quel est le mode de diffusion de ce code malveillant. Enfin, les chercheurs ont remarqué que le code avait des similitudes avec <a href="https://blog.avast.com/new-torii-botnet-threat-research" target="_blank">Torii</a>, un botnet d’objets connectés assez sophistiqué détecté en 2018 par Avast. Beaucoup de questions restent donc encore ouvertes sur ce curieux malware.</p><p>Source: <a href="https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/" target="_blank">Qihoo 360</a></p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/523/most-secure-browser-for-your-privacy-in-2021</guid>
	<pubDate>Fri, 30 Apr 2021 22:07:57 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/523/most-secure-browser-for-your-privacy-in-2021</link>
	<title><![CDATA[Most secure browser for your privacy in 2021]]></title>
	<description><![CDATA[<p>Your web browser is the vehicle that carries you around the Internet to your desired websites. As such, it knows precisely what sites you have visited, how long you spent browsing them, and what you clicked on (or almost clicked on). Anyone who has access to your web browser can have a window into your income, your political leanings, and even your sexual preferences.</p><p>This is why it’s so important to only use browsers you know will protect and improve your internet privacy. In this article, we explain how browsers capture so much information and which web browsers in 2019 are best at keeping your browsing history safe from data-hungry tech companies and advertisers</p><p>Further reading: <a href="https://protonmail.com/blog/internet-privacy/">Easy steps to improve your internet privacy</a></p>
<p>How you are tracked online</p>
<p>Before examining the impact your browser can have on your privacy, you need to understand how your online activity is monitored.</p><p>While having a company directly record your browsing history is a risk (see Google Chrome), the more common threats to your privacy come from online advertisers and third-party trackers. Similar to Google, advertisers and trackers want to record as much of your online browsing as possible. The more data they have, the better they can show you ads specifically tailored to you. The two tools they use to follow you around the Internet are device fingerprinting and cookies.</p>
<p>Device fingerprinting is when a site looks at all the characteristics of your device (the make and model of your device, what browser you are using, what plugins you have installed, what timezone you are in, etc.) until it has enough information to identify and follow it. Your device share this information to optimize the websites you visit. For example, websites want to know if you’re using a laptop or a smartphone so that it can select the correct font size and screen resolution. This can be surprisingly accurate. To see if your device has an easily identifiable fingerprint, check out the Electronic Frontier Foundation’s <a href="https://panopticlick.eff.org/" target="_blank" rel="noreferrer noopener" aria-label="Panopticlick">Panopticlick</a>.<br />Cookies, or HTTP cookies, are tiny data packets that websites or services plant on your browser while you’re on a website. These cookies differentiate your browsers from others, like a nametag. <br />The privacy risks of Chrome</p>
<p>Any discussion of privacy and Web browsers must begin with Google Chrome. It is, by far, the most popular Web browser. Chrome handles <a rel="noreferrer noopener" aria-label="over 60 percent of web traffic" href="https://netmarketshare.com/browser-market-share.aspx?options=%7B%22filter%22%3A%7B%7D%2C%22dateLabel%22%3A%22Custom%22%2C%22attributes%22%3A%22share%22%2C%22group%22%3A%22browser%22%2C%22sort%22%3A%7B%22share%22%3A-1%7D%2C%22id%22%3A%22browsersDesktop%22%2C%22dateInterval%22%3A%22Monthly%22%2C%22dateStart%22%3A%222019-06%22%2C%22dateEnd%22%3A%222019-06%22%2C%22segments%22%3A%22-1000%22%7D" target="_blank">over 60 percent of web traffic</a>. This is unfortunate because Google uses Chrome as a window to peer into every action you take online. Unless you <a rel="noreferrer noopener" aria-label="modify your Google privacy settings" href="https://protonvpn.com/blog/how-to-delete-your-google-data/" target="_blank">modify your Google privacy settings</a>, Chrome records every site you visit so Google can serve you targeted ads.</p><p>Even worse, Chrome does very little to block other advertisers and trackers from monitoring you with cookies or device fingerprinting. A <a rel="noreferrer noopener" aria-label="Washington Post" href="https://www.washingtonpost.com/technology/2019/06/21/google-chrome-has-become-surveillance-software-its-time-switch/" target="_blank">Washington Post</a> <a rel="noreferrer noopener" aria-label="Washington Post" href="https://www.washingtonpost.com/technology/2019/06/21/google-chrome-has-become-surveillance-software-its-time-switch/" target="_blank">article</a> reported Chrome gathers roughly 11,000 trackers in an average week. Do you want 11,000 pairs of eyes on you every time you do an Internet search?</p>
<p>[embedded content]</p>
<p>However, you do not need to give away your personal data to access the Internet.</p><p>There are Internet browsers that do not record your every action and protect you from trackers. Switching from Chrome to one of the following browsers can drastically reduce the amount of data you are inadvertently sharing as you browse the Internet.</p><p>Further reading: <a href="https://protonmail.com/blog/google-privacy-problem/">Gmail’s privacy problem and why it matters</a></p>
<p>Best secure and privacy-first web browsers: <br />1. (tie) Brave</p>
<p>The Brave browser was designed to make privacy simple enough for everyone. It is an open source browser built on top of Chromium (an open source version of the Chrome browser), which means it’s easy for Chrome users to make the switch.</p><p>However, unlike Chrome, Brave does not collect any data about your online activity. Your data remains private and on your device.</p><p>Brave also makes blocking trackers easy. Instead of forcing users to decide which plugins and browser extensions they should download, Brave comes fully equipped. It automatically blocks all third-party and advertising cookies, and because <a rel="noreferrer noopener" aria-label="HTTPS Everywhere" href="https://www.eff.org/https-everywhere" target="_blank">HTTPS Everywhere</a> is built-in, it ensures all your connections are securely HTTPS encrypted. Brave also features <a rel="noreferrer noopener" aria-label="Fingerprinting Protection" href="https://github.com/brave/brave-browser/wiki/Fingerprinting-Protection-Mode" target="_blank">Fingerprinting Protection</a> in the browser.</p><p>The company also has a social mission: to encourage websites not to rely on advertising based on tracking you around the Internet. Brave has introduced a system that allows you to reward creators and sites you visit directly.</p><p>Called <a rel="noreferrer noopener" aria-label="Brave Rewards" href="https://brave.com/brave-rewards/" target="_blank">Brave Rewards</a>, it uses a utility token called a Basic Attention Token and enables you to anonymously reward the websites you visit most. Brave also has opt-in, privacy-preserving Brave Ads, and users who choose to view them earn 70% of the ad revenue, which they can then use to reward their favorite online creators.</p><p>Brave is available for <a rel="noreferrer noopener" aria-label="desktop" href="https://brave.com/download/" target="_blank">desktop</a>, <a rel="noreferrer noopener" aria-label="Android" href="https://play.google.com/store/apps/details?id=com.brave.browser&amp;hl=en" target="_blank">Android</a>, and <a rel="noreferrer noopener" aria-label="iOS" href="https://apps.apple.com/gb/app/brave-browser-fast-web-privacy/id1052879175?mt=8&amp;ign-mpt=uo%3D4" target="_blank">iOS</a>. </p>
<p>1. (tie) Firefox </p>
<p>The open source Firefox is the third-most-popular browser on the Internet, behind Google’s Chrome and Apple’s Safari. Developed by Mozilla, the Firefox team has improved the browser’s privacy protections in recent years.</p><p>They have introduced <a rel="noreferrer noopener" aria-label="advanced anti-fingerprinting" href="https://blog.mozilla.org/firefox/how-to-block-fingerprinting-with-firefox/" target="_blank">advanced anti-fingerprinting</a> and <a rel="noreferrer noopener" aria-label="Enhanced Tracking Protection" href="https://blog.mozilla.org/firefox/control-trackers-with-firefox/" target="_blank">Enhanced Tracking Protection</a> features this year, both of which make it much more difficult for third-party trackers to follow you around the Internet.</p><p>Unlike Brave, the standard Firefox does not automatically block advertisements. However, there are numerous browser extensions that you can download that will prevent advertisers from getting your information or showing you ads.</p><p>Or, if you primarily browse the Internet on your mobile device, <a rel="noreferrer noopener" aria-label="Firefox Focus" href="https://www.mozilla.org/en-US/firefox/mobile/#focus" target="_blank">Firefox Focus</a> incorporates automatic ad blocking. (Focus was developed as an ad blocker for Safari, but was then transformed into a minimalistic privacy browser for Android users.) </p><p>Firefox is available for <a rel="noreferrer noopener" aria-label="desktop" href="https://www.mozilla.org/en-US/firefox/new/" target="_blank">desktop</a>, <a rel="noreferrer noopener" aria-label="Android" href="https://play.google.com/store/apps/details?id=org.mozilla.firefox" target="_blank">Android</a>, and <a rel="noreferrer noopener" aria-label="iOS" href="https://apps.apple.com/us/app/firefox-private-safe-browser/id989804926" target="_blank">iOS</a>. </p>
<p>3. Tor browser</p>
<p>As we have discussed elsewhere, <a rel="noreferrer noopener" aria-label="Tor is the best option" href="https://protonvpn.com/blog/is-tor-safe/" target="_blank">Tor is the best option</a> if privacy is your utmost concern. The Tor browser is based on Firefox, but it has been stripped down and specially calibrated to run on the Tor network.</p><p>When you use Tor, your traffic is encrypted three times and bounced between three Tor servers before it reaches your desired website. The encryption is handled in such a way that each server only has access to one set of instructions, so no server has access to both your IP address and the website you are visiting.</p><p>This setup makes it impossible for Tor to keep any records about your online activity, and every time you close your session, the browser deletes your cookie cache and browsing history. The browser itself is formatted to prevent fingerprinting, and it blocks all kinds of trackers.</p><p>Unfortunately, it also blocks a lot of plugins that websites rely on. For example, with its privacy settings fully activated, the Tor browser will block JavaScript. JavaScript can expose user information, but blocking it can make websites unusable. Using Tor can also mean performing endless CAPTCHA verifications when you try to access larger sites. Finally, the Tor browser is slower than other browsers because of the extra encryption.</p><p>Download the Tor browser app for <a rel="noreferrer noopener" aria-label="desktop" href="https://www.torproject.org/download/" target="_blank">desktop</a> and <a rel="noreferrer noopener" aria-label="Android" href="https://play.google.com/store/apps/details?id=org.torproject.torbrowser&amp;hl=en_GB" target="_blank">Android</a>, as well as a Tor-approved open source <a rel="noreferrer noopener" aria-label="Onion browser for iOS" href="https://apps.apple.com/gb/app/onion-browser/id519296448" target="_blank">Onion browser for iOS</a>.  </p>
<p>4. DuckDuckGo (honorable mention)</p>
<p>Unlike the other browsers mentioned above, DuckDuckGo does not have a standalone desktop browser, which means it is only a solution if you are browsing the Internet on your smartphone or tablet. With the DuckDuckGo browser, your browsing history never leaves your device. Deleting your entire browsing history is as easy as tapping a single button.</p><p>It automatically blocks ads, stops third-party trackers, and ensures HTTPS encryption on all sites where that’s possible. One feature that does set it apart is the Privacy Grade it gives each site. This makes it easy for you to evaluate how much data each website collects from you, with and without DuckDuckGo’s protections, at a single glance.</p><p>The DuckDuckGo browser is available for <a rel="noreferrer noopener" aria-label="Android" href="https://play.google.com/store/apps/details?id=com.duckduckgo.mobile.android" target="_blank">Android</a> and <a rel="noreferrer noopener" aria-label="iOS" href="https://itunes.apple.com/us/app/duckduckgo-search-stories/id663592361?mt=8" target="_blank">iOS</a>.<br />You can also use the extension for <a rel="noreferrer noopener" aria-label="Chrome" href="https://chrome.google.com/webstore/detail/duckduckgo-privacy-essent/bkdgflcldnnnapblkhphbgpggdiikppg?hl=en" target="_blank">Chrome</a> and <a rel="noreferrer noopener" aria-label="Firefox" href="https://addons.mozilla.org/en-US/firefox/addon/duckduckgo-for-firefox/" target="_blank">Firefox</a>.</p><p>The Web browser you choose can have a dramatic impact on your overall online privacy. By switching to one of the privacy-focused browsers in this article, you can protect your browsing history from the companies and trackers that want to monitor your every digital move.</p><p>What’s your favorite web browser? Let us know in the comments below on <a href="https://twitter.com/ProtonMail">Twitter</a> or <a href="https://www.reddit.com/r/ProtonMail/">Reddit</a>.</p><p>Best Regards,<br />The ProtonMail Team</p><p>You can get a <a href="https://protonmail.com/signup" target="_blank" rel="noreferrer noopener" aria-label="free secure email account from ProtonMail here">free secure email account from ProtonMail here</a>.</p><p>We also provide a <a href="https://protonvpn.com/" target="_blank" rel="noreferrer noopener" aria-label="free VPN service">free VPN service</a> to protect your privacy.</p><p>ProtonMail and ProtonVPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a <a rel="noreferrer noopener" aria-label="paid plan" href="https://protonmail.com/support/knowledge-base/paid-plans/" target="_blank">paid plan</a> or <a rel="noreferrer noopener" aria-label="donate" href="https://protonmail.com/donate" target="_blank">donate</a>. Thank you for your support.</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/518/kaspersky-a-identifie-les-nouveaux-outils-de-piratage-de-la-cia</guid>
	<pubDate>Thu, 29 Apr 2021 21:34:53 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/518/kaspersky-a-identifie-les-nouveaux-outils-de-piratage-de-la-cia</link>
	<title><![CDATA[Kaspersky a identifié les nouveaux outils de piratage de la CIA]]></title>
	<description><![CDATA[<p class="delta py0p5">Chaque mois, les éditeurs d'antivirus reçoivent des échantillons des menaces en cours. Depuis deux ans, Kasperksy a isolé des malwares très sophistiqués, et il vient de les identifier comme des logiciels de cyber-espionnage utilisés par le renseignement américain.</p><p>Cela vous intéressera aussi</p><p class="mt1"> [EN VIDÉO] Qu'est-ce qu'une cyberattaque ?  Avec le développement d'Internet et du cloud, les cyberattaques sont de plus en plus fréquentes et perfectionnées. Qui est derrière ces attaques et dans quel but ? Quelles sont les méthodes des hackers et quelles sont les cyberattaques les plus massives ? </p><p class="zeta py0p5">Pour espionner et contre-espionner, les agences du renseignement de n'importe quel pays utilisent les mêmes outils que les pirates : des malwares. Tout est secret défense, mais Kaspersky pense avoir mis la main sur les <a data-tooltip="" href="https://www.futura-sciences.com/tech/definitions/informatique-logiciel-561/" class="tooltip-link" data-color="bright-blue" data-title="Logiciel" data-number="" data-copy="Formé à partir des mots logique et matériel, le mot logiciel a été inventé en 1969 pour remplacer le terme anglais software. Il désigne l'ensemble des programmes et des procédures nécessaires au fonctionnement d'un système informatique : c’est lui qui indique à l’ordinateur comment effectuer les..." data-image="https://cdn.futura-sciences.com/buildsv6/images/midioriginal/5/7/6/576df1d0de_128295_logiciel-c-carlos-muza-unsplash.jpg" data-url="/tech/definitions/informatique-logiciel-561/" data-more="Lire la suite">logiciels</a> utilisés par la CIA. Bien évidemment, en prenant le soin de ne pas la nommer.</p><p class="zeta py0p5">Dans son <a href="https://securelist.com/apt-trends-report-q1-2021/101967/" target="_blank">rapport trimestriel</a>, le seul célèbre éditeur d'antivirus explique ainsi qu'il a étudié des échantillons de malwares envoyés en février 2019 aux experts de sécurité. C'est ce qui se fait habituellement, et les plus grands antivirus sont chargés de les analyser pour renforcer la protection de leurs solutions, mais aussi de faire le point sur les menaces actuelles.</p>
<p>Une variante d'un cheval de Troie utilisé depuis 2014</p>
<p class="zeta py0p5">Certains des échantillons ne peuvent être associés à aucune activité connue. Kaspersky explique qu'il a alors isolé les malwares les plus sophistiqués, et les experts ont découvert des similitudes dans le codage, le <a data-tooltip="" href="https://www.futura-sciences.com/sciences/definitions/physique-gnomon-14968/" class="tooltip-link" data-color="purple" data-title="Gnomon" data-number="" data-copy="On appelle «&amp;nbsp;gnomon&amp;nbsp;», ou «&amp;nbsp;style »,&amp;nbsp;la tige, verticale ou non, qui projette son&amp;nbsp;ombre sur un cadran solaire. Le terme vient du grec&amp;nbsp;signifiant&amp;nbsp;: «&amp;nbsp;celui qui sait&amp;nbsp;».&lt;br /&gt;Gnomon : du simple bâton au cadran solaire&lt;br /&gt;Dans l’Antiquité, le gnomon était en..." data-image="https://cdn.futura-sciences.com/buildsv6/images/midioriginal/9/6/e/96ede18295_76402_gnomon.jpg" data-url="/sciences/definitions/physique-gnomon-14968/" data-more="Lire la suite">style</a> et les techniques utilisés dans la famille des logiciels malveillants dits Lambert. Il y a quatre ans, sous le nom de <a href="https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7ca2e331-2209-46a8-9e60-4cb83f9602de&amp;CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&amp;tab=librarydocuments" target="_blank">Vault7</a>, <a href="https://wikileaks.org/ciav7p1/" target="_blank">WikiLeaks</a> avait révélé au grand public les outils de la CIA et, chez Kaspersky, on avait décidé de les classer sous le nom de Lambert, avec un code <a data-tooltip="" href="https://www.futura-sciences.com/sciences/definitions/physique-couleur-4126/" class="tooltip-link" data-color="purple" data-title="Couleur" data-number="" data-copy="La couleur, c'est ce qui permet de différencier deux objets de formes et de structures identiques, par exemple le drapeau italien du drapeau français. C'est aussi ce qui n'est ni blanc, ni gris, ni noir. Le blanc et le noir étant les bornes de la gamme des gris neutres.&lt;br /&gt;Quelquefois, la couleur..." data-image="https://cdn.futura-sciences.com/buildsv6/images/midioriginal/7/9/5/7951943cc1_85596_couleur.jpg" data-url="/sciences/definitions/physique-couleur-4126/" data-more="Lire la suite">couleur</a> pour chaque variante.</p><p class="zeta py0p5">Aujourd'hui, il s'agit donc de Purple Lambert, et ce cheval de Troie permet de surveiller l'activité du réseau sur l'<a data-tooltip="" href="https://www.futura-sciences.com/tech/definitions/informatique-ordinateur-586/" class="tooltip-link" data-color="bright-blue" data-title="Ordinateur" data-number="" data-copy="Un ordinateur est un terminal électronique fonctionnant à l’aide d’un programme ou d’un jeu d’instructions qui lui font lire, manipuler et modifier des données numériques. L’origine de l’ordinateur remonte au milieu du 19e siècle lorsque le mathématicien britannique Charles Babbage conçut une..." data-image="https://cdn.futura-sciences.com/buildsv6/images/midioriginal/b/7/8/b7881acca1_68781_ibmmark1jpg.jpg" data-url="/tech/definitions/informatique-ordinateur-586/" data-more="Lire la suite">ordinateur</a> infecté. C'est un malware passif, qui agit en arrière-plan, et selon Kaspersky, son code date de 2014. C'est une découverte extrêmement rare et, bien sûr, l'éditeur ne nomme pas la CIA... Mais comme il range sa découverte dans la « <a href="https://securelist.com/unraveling-the-lamberts-toolkit/77990/" target="_blank">famille Lambert</a> », forcément, il s'agit des toolkits de piratage utilisés par le renseignement américain dans le passé contre l'« État islamique », ou encore le secteur de l'aviation civile chinoise.</p><p>Intéressé par ce que vous venez de lire ?</p><p>Lien externe</p><p>Définitions associées</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/514/comparison-of-communication-tools-for-companies</guid>
	<pubDate>Wed, 28 Apr 2021 19:49:15 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/514/comparison-of-communication-tools-for-companies</link>
	<title><![CDATA[Comparison of Communication Tools for Companies]]></title>
	<description><![CDATA[<p>In contrast to chat apps for private users, business solutions offer a console where company administrators can manage the employees. Thanks to Threema Work’s high flexibility, the service easily adapts to every organization’s needs. In BYOD scenarios, Threema Work scores extra points with Threema MDM, while most other solutions only support external MDM systems. Threema Work combines comprehensive pre-configuration options with a straightforward app distribution.</p><p>All solutions support integration into directory services. External users can join Threema Work without having to complete a tedious registration process and even without providing a phone number or email address. On top of that, Threema Work can also be restricted to a closed user group.</p><p>Not to offer an option to archive user chats on a central server (e.g., for compliance purposes) is a deliberate decision of Threema Work because this would, in theory, allow the service provider to access message contents, which, in turn, would render the security benefits of end-to-end encryption completely useless.</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/511/best-whatsapp-alternatives-that-respect-your-privacy</guid>
	<pubDate>Tue, 27 Apr 2021 21:34:01 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/511/best-whatsapp-alternatives-that-respect-your-privacy</link>
	<title><![CDATA[Best WhatsApp alternatives that respect your privacy]]></title>
	<description><![CDATA[<p>News that WhatsApp has been <a href="https://protonmail.com/blog/whatsapp-new-privacy-policy/" target="_blank" rel="noreferrer noopener">sharing</a> large amounts of highly personal data with Facebook since 2016 has led a large number of unhappy users to look for an alternative messaging app that genuinely respects their privacy.</p><p>At Proton, we view end-to-end encryption as a core requirement for any messenger app that claims to be secure and private. This means messages are encrypted on your device and can only be decrypted on the device of the intended recipient. </p><p>WhatsApp uses end-to-end encryption, so the actual messages are therefore secure on the platform. But this does nothing to stop Facebook from abusing metadata: information about whom you communicate with, from where, at what time, how often, and from which device.</p><p>Open source code is another important indicator that a service is secure. By publishing an app’s code publicly, anyone can examine it to ensure the app is doing what it is supposed to be doing. We believe open source is one of the best indicators that an app can be trusted.</p><p id="table">We have therefore limited the following list of best WhatsApp alternatives to open source messaging apps that use end-to-end encryption (E2EE). Please note that apps are not reviewed in any particular order.</p>
<p>Signal</p>
<p>Pro</p>
<p>Free<br />Very good encryption<br />Almost no metadata kept<br />Protocol independently audited<br />Seamless to use on Android<br />Disappearing messages<br />E2EE text, voice, and video group chat</p>
<p>Cons</p>
<p>Requires a valid phone number to register<br />Hosted on Amazon Web Services (AWS)</p>
<p>The Signal messaging protocol is an end-to-end messaging protocol developed by the Signal Foundation, a non-profit organization founded by cryptographer and privacy activist Moxie Marlinspike. The Signal Protocol is open source, has been professionally <a rel="noreferrer noopener" href="https://eprint.iacr.org/2016/1013.pdf" target="_blank">audited</a> for security vulnerabilities, and is widely <a rel="noreferrer noopener" href="https://twitter.com/Snowden/status/661313394906161152?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E661313394906161152%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.indiatoday.in%2Ftechnology%2Fnews%2Fstory%2Fhow-secure-is-signal-it-s-good-enough-for-edward-snowden-so-good-enough-for-you-1757596-2021-01-10" target="_blank">admired</a> for its cryptographic strength. </p><p>Because of the quality of the Signal protocol, it is used by a variety of third-party messaging apps to provide secure end-to-end encryption for messages. These include WhatsApp, Facebook Messenger, and Skype, Unlike WhatsApp and other third-party apps that implement the Signal protocol, however, the Signal app from the Signal Foundation is 100% open source. </p><p>Crucially, in light of recent heightened awareness about WhatsApp’s privacy policies, the Signal app and Signal Foundation keep almost no metadata related to the app’s usage. Only “the date and time a user registered with Signal and the last date of a user’s connectivity to the Signal service.” This is a claim that has been <a rel="noreferrer noopener" href="https://www.aclu.org/blog/national-security/secrecy/new-documents-reveal-government-effort-impose-secrecy-encryption?redirect=blog/free-future/new-documents-reveal-government-effort-impose-secrecy-encryption-company" target="_blank">proven in court</a>.</p><p>The app app itself has not been audited, however, and some <a rel="noreferrer noopener" href="https://medium.com/@maniacbolts/signal-increases-their-reliance-on-sgx-f46378f336d3" target="_blank">security concerns</a> exist around Signal’s reliance on Intel Software Guard Extensions (SGX). In theory, this could result in users’ metadata and data(but not messages) being compromised at the server level. This is a particular concern because Signal uses AWS to host its infrastructure, which is subject to legal demand from the US government.</p><p>Unlike WhatsApp, Signal is designed to replace your phone’s regular SMS messenger app on Android (not iOS). Texts exchanged to other Signal users are end-to-end encrypted, but texts to non-Signal users are not. Signal will warn you when messages are sent unencrypted. </p><p>This makes Signal very transparent in use, but the fact that users must register with a valid phone number in order to match contacts is also the main source of criticism the app receives. It should be noted, though, that contacts are stored locally only and cannot be accessed by Signal Foundation.</p><p>In addition to messages, Signal supports disappearing messages, E2EE group voice chats, and now group video chats between up to eight users. Signal is a non-profit organization that relies on donations to operate.</p>
<p>Telegram</p>
<p>Pros</p>
<p>Free<br />Channels for broadcasting messages<br />Bots for managing groups<br />Sync across multiple devices (not E2EE)<br />Polls, stickers, sharing live location, identity management<br />E2EE 1-1 text, voice, and video chat</p>
<p>Cons</p>
<p>Encryption concerns<br />Only Secret Chats are E2EE <br />Group chats (text or voice) are not E2EE<br />Collects lots of metadata<br />No group video chats<br />Requires a valid phone number to register<br />Headquartered in the UAE, which is not known for human rights or privacy from the government (despite having some <a href="https://blogs.dlapiper.com/privacymatters/dubai-difc-data-protection-law-2020/">strong privacy laws</a>)</p>
<p>With over 500 million users, Telegram is a very popular WhatsApp alternative. A big part of this popularity is the widespread perception that Telegram is highly secure, a perception only heightened by a number of governments, notably Indonesia, Russia, and Iran, trying to block or ban the app.</p><p>There are, however, some big caveats regarding the security that Telegram offers its users. Regular default “Cloud-based messages,” that can be accessed on any of a user’s devices, are encrypted in transit and when stored on Telegram’s servers, but they are not end-to-end encrypted. Only client-to-client “secret chats” are end-to-end encrypted. Secret Chats are not available for groups or channels.</p><p>The open source in-house MTProto encryption used to secure communications in Telegram (whether E2EE or otherwise) has come under <a rel="noreferrer noopener" href="https://eprint.iacr.org/2015/1177.pdf" target="_blank">criticism</a> from security experts, although the new version (<a rel="noreferrer noopener" href="https://core.telegram.org/mtproto/description" target="_blank">MTProto 2.0</a>) has been <a rel="noreferrer noopener" href="https://arxiv.org/pdf/2012.03141v1.pdf" target="_blank">formally verified</a> to be cryptographically sound. The Telegram API and all Telegram apps are open source, but its server-side backend is not. </p><p>Another issue is that Telegram may <a rel="noreferrer noopener" href="https://telegram.org/privacy" target="_blank">collect</a> a great deal of metadata from users: “We may collect metadata such as your IP address, devices and Telegram apps you’ve used, history of username changes, etc.”</p><p>On the other hand, Telegram has built its own secure cloud infrastructure, distributed across the globe. The encryption keys used to secure the Telegram Cloud are split in pieces and never stored in the same place as the information they protect.</p><p>Security considerations aside, a key feature that contributes to Telegram’s popularity (especially in repressive countries such as Iran, where it enjoys over 40 million users despite government attempts to regulate use of the service) is support for “channels.” Users can create and post to channels that any number of other users can subscribe to. </p><p>Public channels can be created using an alias and a URL that anyone can subscribe to, making Telegram a powerful tool for organizing resistance and disseminating information in repressive countries. </p><p>Other features that help make Telegram popular include polls, stickers, sharing live locations in chats, and an online authorization and identity management system for those who need to prove their identity. A bots feature assists managing groups and channels. </p><p>It also features One-to-one voice and video chats are fully end-to-end encrypted, although group voice chats are not. Group video calls are not supported.</p><p>Telegram is funded by public donations (notably from its own founder, <a href="https://en.wikipedia.org/wiki/Pavel_Durov" target="_blank" rel="noreferrer noopener">Pavel Durov</a>), although it is possible in-app monetization features will be introduced in the future.</p>
<p>Threema</p>
<p>Pros</p>
<p>No phone number or email required to sign up<br />Almost no metadata kept<br />Independently audited <br />Swiss-based with own servers<br />GDPR compliant<br />E2EE group text and voice chat<br />Group polling and distribution lists (Android only)</p>
<p>Cons</p>
<p>Not free<br />Relatively small userbase<br />No group video calls</p>
<p>Like Proton, Threema is based in Switzerland, a country with very strong data privacy laws and independent from the United States and European Union. It also owns its own server infrastructure located in Switzerland. </p><p>All Threema’s apps use the open source <a href="https://nacl.cr.yp.to/" target="_blank" rel="noreferrer noopener">NaCl cryptography library</a> for end-to-encryption of all communications, and all have been recently <a href="https://threema.ch/press-files/2_documentation/security_audit_report_threema_2019.pdf" target="_blank" rel="noreferrer noopener">audited</a> (in 2020) by security professionals. </p><p>An email address or phone number is not required to register an account, and it is possible to purchase Threema for Android anonymously using Bitcoin. Threema claims this allows you to text and make calls anonymously, and it goes to lengths to ensure that a <a rel="noreferrer noopener" href="https://threema.ch/en/blog/posts/metadata" target="_blank">minimum</a> amount of metadata is collected. </p><p>The fact that the app is not free is likely to be a pain point for some, but at around US$3 (one-time purchase), it’s unlikely to break the bank for most. This may contribute, however, to one of the biggest downsides with Threema: that its userbase is relatively small. </p><p>The Android app features distribution lists that allow you to send messages to multiple separate recipients. In addition to fully E2EE group text and voice calls, Threema offers a group polling feature. E2EE video calls are supported, but not for groups.</p>
<p>Wickr Me</p>
<p>Pros</p>
<p>Free<br />Built for ephemeral messaging<br />Anti-censorship feature<br />E2EE group text and voice chat<br />No phone number or email needed for signup</p>
<p>Cons</p>
<p>Apps themselves are not open source <br />Security audits are not published<br />No video chat (although available on free Pro version of app)</p>
<p>There are three Wickr apps, with the free Wickr Me being the version designed for personal use. The lowest tier of the more Slack-like Wickr Pro is also free, although it requires you to verify your identity at start-up.</p><p>Wickr Me places ephemeral messaging front and center, with messages disappearing from both the sending and receiving devices after a set period of time (six days by default). Undelivered messages sitting on Wickr servers are also deleted after this time.</p><p>You can also set a Burn-On-Read timer to determine how long a message lasts before self-destructing once it has been read. If it is not read then it will self destruct at the end of the message timer length. All metadata is scrubbed once a message is opened or expires (whichever comes first)</p><p>Wickr advertises itself as open source software, but there are a couple of major caveats to this claim. The code for the core <a href="https://github.com/WickrInc/wickr-crypto-c" target="_blank" rel="noreferrer noopener">wickr-crypto-c</a> end-to-end encryption protocol that underpins all Wickr apps is available on Github for anyone to examine, but licencing restrictions mean that it cannot truly be described as open source.</p><p>More serious from a security stand-point, though, is that while the core crypto protocol is source-available, the code for the Wickr apps themselves is not. Wickr says that its code has undergone multiple independent <a href="https://wickr.com/security/" target="_blank" rel="noreferrer noopener">security audits</a>, but the full results of these audits are not publicly available.</p><p>No phone number or email is needed to register with the service. Up to 10 people can be invited into a room or end-to-end encrypted text or voice group chat. Video conferencing is not available in Wickr Me, although it is supported in the Wickr Pro app (including E2EE group chat with all room members).</p><p>Wickr is hosted on public server networks (such as Google and AWS), but has partnered with Psiphon to offer <a rel="noreferrer noopener" href="https://wickr.com/product-feature-wickr-open-access/#:~:text=Wickr%20Open%20Access%20(WOA)%20will,%2C%20video%20conferencing%2C%20and%20more." target="_blank">Wickr Open Access</a>, a powerful anti-censorship feature.</p><p>Wickr Me is free, but it is funded through Wickr’s premium Pro and Enterprise apps. </p>
<p>Wire</p>
<p>Pros</p>
<p>Free option<br />E2EE text, voice, and video group chats<br />Syncs across up to eight devices<br />Advanced video conferencing features</p>
<p>Cons</p>
<p>Quite a lot of metadata logged (and possibly stored in plaintext)<br />Phone number or email address required to register</p>
<p>Wire is another service based in privacy-friendly based in Switzerland. A phone number or an email email to register. In order to facilitate syncing across multiple devices, however, Wire keeps quite a lot of metadata. </p><p>For years Wire kept a list of all users a customer has contacted in <a href="https://www.vice.com/en/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text" target="_blank" rel="noreferrer noopener">plaintext</a> on their servers until an account is deleted, and it is unclear if this practice continues. Wire’s <a href="https://www.vice.com/en/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text" target="_blank" rel="noreferrer noopener">privacy white paper</a>, however, makes it clear it logs data such as the participants in a group chat and user-defined folders used for organizing chats. </p><p>The functional benefit of this is that it allows Wire to work across multiple devices in a way most E2EE messenger apps (including Signal) do not. It’s also worth noting that Edward Snowden <a href="https://twitter.com/snowden/status/1175437588129308672" target="_blank" rel="noreferrer noopener">recommends</a> using Wire (or Signal).</p><p>Wire uses the Proteus protocol to provide end-to-end encryption for text messages. Proteus is an early fork from the code that went on to become the Signal Protocol. <a rel="noreferrer noopener" href="https://www.x41-dsec.de/reports/Kudelski-X41-Wire-Report-phase1-20170208.pdf" target="_blank">Proteus</a>, and all <a rel="noreferrer noopener" href="https://medium.com/@wireapp/wire-application-level-security-audits-98324d1f211b" target="_blank">Wire apps</a>, have been publicly audited (making Wire the only app we are aware of to have this done).</p><p>Voice (up to 25 participants) and video calls (up to 12 participants) are end-to-end encrypted using <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security" target="_blank">DTLS</a> with an <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol" target="_blank">SRTP</a> handshake.</p><p>The app does support advanced video conferencing features that will appeal to business users, though, including screen sharing, screen recording, and advanced meeting scheduling.</p><p>Wire is keen to push users toward its premium Pro and Enterprise products, but a free version is available which offers similar features to the Pro app.</p>
<p>Element (was Riot.im)</p>
<p>Pros</p>
<p>Free option<br />Server federation<br />“Bridges” for interoperability with other apps<br />E2EE text chat<br />No phone number or email needed for signup</p>
<p>Cons</p>
<p>Questions over Matrix server network reliability<br />Not fully audited</p>
<p>All the other messenger apps discussed in this article rely on a centralized server network to function (although, as in the case of using AWS, this can be a highly distributed network).</p><p>Element is instead built on the idea of federation. Users can set up their own servers using the <a href="https://matrix.org/faq/" target="_blank" rel="noreferrer noopener">Matrix</a> communications protocol or connect to Matrix servers that have been set up by other users. Federation has received the <a href="https://twitter.com/Snowden/status/1175457923255951364" target="_blank" rel="noreferrer noopener">support</a> of Edward Snowden, but remains a controversial idea due to the potentially unreliable ad-hoc peer-to-peer nature of such a network.</p><p>Matrix servers are interoperable, so any user of any <a href="https://matrix.org/clients/" target="_blank" rel="noreferrer noopener">Matrix client</a> (Element is the most popular of these) can communicate with any other Matrix user. Matrix “bridges” even allow for communication with the users of other popular messaging platforms, such as Signal, Slack, or even WhatsApp.</p><p>Matrix (and thus Element) uses the <a href="https://matrix.org/docs/guides/end-to-end-encryption-implementation-guide" target="_blank" rel="noreferrer noopener">Olm implementation of the Double Ratchet algorithm</a>, with Megolm used for group communications. All Element apps, plus the Matrix protocol itself, are open source, but have not been formally audited. Olm and Megolm, however, <a href="https://www.nccgroup.trust/globalassets/our-research/us/public-reports/2016/november/ncc_group_olm_cryptogrpahic_review_2016_11_01.pdf" target="_blank" rel="noreferrer noopener">have</a>.</p><p>An email or phone number is not required to register with Element, although these can be added to make contact matching easier. By default, messages are hosted on a large public server run by Matrix, but you can connect to any Matrix server or set one up yourself in a matter of seconds.</p><p>All text chats and 1:1 voice and video calls are end-to-end encrypted. Group voice and video calls ( which also allow screen sharing) leverage Jitsi ( without E2EE support in Element at the present time). The Element app is free, but premium plans are available for Element-managed Matrix servers.</p>
<p>Keybase</p>
<p>Pros</p>
<p>Free (funding model is unclear)<br />E2EE text chats with support for public and private channels<br />Can connect to people via their social media profiles with PGP verification<br />Syncs across multiple devices<br />Self-destructing messages<br />Stellar wallet<br />250 GB free storage per user<br />Encryption is not TOFU</p>
<p>Cons</p>
<p>Owned by Zoom<br />A lot of metadata logged (much of it shared on a public blockchain)</p>
<p>Keybase is a free and open source (FOSS) messenger app (servers are not open source) that end-to-end encrypts all texts and files between users. Voice and video calls are not supported directly, but are possible using a (not E2EE) Jitsi bot.</p><p>E2EE group chat, with support for private and public “Teams” (i.e., channels) is end-to-end encrypted.</p><p>Keybase is notable for allowing you to connect to others using their social media (Twitter, GitHub, Reddit, Hacker News, and Mastodon) identities, which are verified using PGP encryption keys. No phone number or email address is required, and the app will sync across multiple devices. </p><p>The PGP-based end-to-end encryption used by Keybase is solid and underwent a <a rel="noreferrer noopener" href="https://keybase.io/docs-assets/blog/NCC_Group_Keybase_KB2018_Public_Report_2019-02-27_v1.3.pdf" target="_blank">full independent audit</a> in 2019. Interestingly, Keybase is almost unique in <a href="https://keybase.io/blog/chat-apps-softer-than-tofu" target="_blank" rel="noreferrer noopener">not supporting Trust On First Use (TOFU)</a> when connecting to servers. This helps to make it resistant to man-in-the middle attacks.</p><p>The app also offers self-destructing messages; bots to automate your Keybase tasks; a Stellar wallet; full PGP support for encrypting and decrypting messages and files; and 250 GB free storage per user.</p><p>However, messages are stored on centralized servers (based in the US), which log a worrying amount of <a href="https://keybase.io/docs/privacypolicy" target="_blank" rel="noreferrer noopener">personal data</a>. This includes your Team names and memberships, hashed passwords, account activity, your Keybase user ID and your IP address, network activity, and more. Not only is information stored encrypted, but much of it is added (in hashed form) to a public blockchain.</p><p>Arguably even more concerning is that Keybase is now owned by Zoom, a company <a rel="noreferrer noopener" href="https://www.theguardian.com/technology/2020/apr/02/zoom-technology-security-coronavirus-video-conferencing" target="_blank">widely</a> criticized for its many <a rel="noreferrer noopener" href="https://protonmail.com/blog/zoom-privacy-issues/" target="_blank">privacy</a> and <a rel="noreferrer noopener" href="https://www.vice.com/en/article/k7e95m/zoom-leaking-email-addresses-photos" target="_blank">security</a> lapses, and which may be subject to pressure from the <a rel="noreferrer noopener" href="https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/" target="_blank">Chinese government</a>. The fact that it is not clear how Zoom benefits from offering Keybase for free may also be a reason for concern.</p>
<p>Final thoughts</p>
<p>As a replacement for WhatsApp as a general purpose messenger that genuinely respects your privacy, Signal is an obvious choice, although being hosted on AWS servers remains a concern in light of its reliance on SGX. The security concerns around Telegram make it harder to recommend as a simple messenger, although its “channels” feature remains a powerful tool for organizing resistance in restrictive countries.</p><p>Another alternative for secure communication is end-to-end encrypted email. The biggest benefit of ProtonMail is its interoperability: You don’t need to have your recipient using the same messenger service to benefit from end-to-end encryption because, unlike any of the messenger apps discussed here, you can send end-to-end encrypted messages to anyone who has an email address using our <a href="https://protonmail.com/support/knowledge-base/encrypt-for-outside-users/" target="_blank" rel="noreferrer noopener">Encrypt for non-ProtonMail users</a> feature. The simplest way to benefit from E2EE, though, is to have both ends of the conversation using ProtonMail. Our servers are located in privacy-friendly Switzerland, and as with the messenger services discussed in this article, ProtonMail apps are open source.</p><p>The other apps discussed above all offer useful features that will appeal to those who need them, whether it’s anonymous sign-up, business collaboration tools, or server federation. Element/Matrix is a particularly strong choice for privacy enthusiasts, although its niche user base severely hampers its practicality as as a WhatsApp replacement.</p><p>As you take back your privacy in the digital age, anything you do to move more of your personal data behind strong encryption is an important step toward building an internet that puts people first.</p>
<p>FAQ</p>
<p>What are the dangers of using WhatsApp?</p><p>Since 2016, WhatsApp has <a href="https://www.wired.com/story/whatsapp-facebook-data-share-notification/#:~:text=01%3A52%20PM-,WhatsApp%20Has%20Shared%20Your%20Data%20With%20Facebook%20for%20Years%2C%20Actually,been%20in%20place%20since%202016." target="_blank" rel="noreferrer noopener">shared</a> the vast majority of its users’ transactional data and metadata with Facebook. A new privacy statement, which users must agree to by May 15, 2021, or use access to their accounts, “clarifies” this situation.</p><p>Information shared by WhatApp with Facebook includes your IP address, device ID, operating system, browser details, mobile network information, who you message, how long and how often you interact with them, transaction and payment data, and more.</p><p>Is WhatsApp chat private?</p><p>Messages in WhatsApp are end-to-end encrypted using the Signal protocol. This means only you and the intended recipient(s) can read your actual messages. So WhatsApp is secure. It does, however, collect a lot of metadata that is damaging to your privacy (see above).</p><p>What is the safest messaging app?</p><p>Signal is both highly secure and respects your privacy. We discuss it, plus the pros and cons of other good WhatsApp alternatives, in this article. </p><p>How can WhatsApp be free?</p><p>WhatsApp is owned by Facebook, which makes a <a rel="noreferrer noopener" href="https://protonmail.com/blog/how-big-tech-tracks-users/" target="_blank">huge amount</a> of money from invading users’ privacy in order to better target you with personalized ads. WhatsApp adds to the data Facebook knows about you by sending a great deal of metadata regarding your use of WhatsApp to Facebook. </p><p id="footnotes">Note that, as Signal and some of the other apps discussed in this article, show, it is possible to offer a free messaging app without invading users’ privacy in this way.</p><p><a href="https://protonmail.com/blog/whatsapp-alternatives/?utm_campaign=ww-fr-2c-generic-coms_email-monthly_newsletter&amp;utm_source=proton_users&amp;utm_medium=link&amp;utm_content=2021_-_march#table">Return to table</a></p><p>Footnotes:</p>
<p>All Telegram apps are open source, but the backend isn’t. This would not really be an issue if all communications were E2EE, but they are not by default (and no group chat is E2EE).<br />By default, Telegram chats are not end-to-end encrypted. Only client-to-client “secret chats” are. Secret chats are not available for groups or channels.<br />The 2015 audit of MTProto protocol was not very favorable. MTProto 2.0 has been formally verified to be cryptographically sound.<br />Wickr says its code has undergone multiple independent security audits, but the full results of these audits are not publicly available.<br />The Element apps and the Matrix protocol have not been formally audited. However, the Olm and Megolm protocols that underpin Matrix have.<br />All metadata is scrubbed once a message is opened or expires (whichever comes first).<br />Contacts can be added using social media profiles and verified using PGP keys.<br />Wickr has partnered with Psiphon to offer Wickr Open Access, a powerful anti-censorship feature for its servers.<br />Element and/or Matrix don’t actually own their own servers, but new Matrix servers can be set up within minutes on any server platform (or can be self-hosted). It is therefore almost impossible to shut down or block access to the Matrix platform. <br />Wire is based in Switzerland and all users outside the United States are subject to Swiss law. US users, however, are subject to US law.<br />Matrix is a community-developed open source platform whose federated servers can be hosted anywhere in the world. <br />Keybase is owned by Zoom, which may also be subject to pressure from China.</p>
<p><a href="https://protonmail.com/blog/whatsapp-alternatives/?utm_campaign=ww-fr-2c-generic-coms_email-monthly_newsletter&amp;utm_source=proton_users&amp;utm_medium=link&amp;utm_content=2021_-_march#table">Return to table</a></p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/506/signal-blog-exploiting-vulnerabilities-in-cellebrite-ufed-and-physical-analyzer-from-an-apps-perspective</guid>
	<pubDate>Sat, 24 Apr 2021 12:23:54 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/506/signal-blog-exploiting-vulnerabilities-in-cellebrite-ufed-and-physical-analyzer-from-an-apps-perspective</link>
	<title><![CDATA[Signal &gt;&gt; Blog &gt;&gt; Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app&#039;s perspective]]></title>
	<description><![CDATA[<p>Cellebrite makes software to automate physically extracting and indexing data from mobile devices. They exist within the grey – where enterprise branding joins together with the larcenous to be called “digital intelligence.” Their customer list has included authoritarian regimes in Belarus, Russia, Venezuela, and China; death squads in Bangladesh; military juntas in Myanmar; and those seeking to abuse and oppress in Turkey, UAE, and elsewhere. A few months ago, they <a href="https://signal.org/blog/cellebrite-and-clickbait/">announced that they added Signal support to their software</a>.</p><p>Their products have often been linked to the persecution of imprisoned journalists and activists around the world, but less has been written about what their software actually does or how it works. Let’s take a closer look. In particular, their software is often associated with bypassing security, so let’s take some time to examine the security of their own software.</p>
<p>The background</p>
<p>First off, anything involving Cellebrite starts with someone else physically holding your device in their hands. Cellebrite does not do any kind of data interception or remote surveillance. They produce two primary pieces of software (both for Windows): UFED and Physical Analyzer.</p><p>UFED creates a backup of your device onto the Windows machine running UFED (it is essentially a frontend to adb backup on Android and iTunes backup on iPhone, with some additional parsing). Once a backup has been created, Physical Analyzer then parses the files from the backup in order to display the data in browsable form.</p><p>When Cellebrite announced that they added Signal support to their software, all it really meant was that they had added support to Physical Analyzer for the file formats used by Signal. This enables Physical Analyzer to display the Signal data that was extracted from an unlocked device in the Cellebrite user’s physical possession.</p><p>One way to think about Cellebrite’s products is that if someone is physically holding your unlocked device in their hands, they could open whatever apps they would like and take screenshots of everything in them to save and go over later. Cellebrite essentially automates that process for someone holding your device in their hands.</p>
<p>The rite place at the Celleb…rite time</p>
<p>By a truly unbelievable coincidence, I was recently out for a walk when I saw a small package fall off a truck ahead of me. As I got closer, the dull enterprise typeface slowly came into focus: Cellebrite. Inside, we found the latest versions of the Cellebrite software, a hardware dongle designed to prevent piracy (tells you something about their customers I guess!), and a bizarrely large number of cable adapters.</p><p></p>
<p>The software</p>
<p>Anyone familiar with software security will immediately recognize that the primary task of Cellebrite’s software is to parse “untrusted” data from a wide variety of formats as used by many different apps. That is to say, the data Cellebrite’s software needs to extract and display is ultimately generated and controlled by the apps on the device, not a “trusted” source, so Cellebrite can’t make any assumptions about the “correctness” of the formatted data it is receiving. This is the space in which virtually all security vulnerabilities originate.</p><p>Since almost all of Cellebrite’s code exists to parse untrusted input that could be formatted in an unexpected way to exploit memory corruption or other vulnerabilities in the parsing software, one might expect Cellebrite to have been extremely cautious. Looking at both UFED and Physical Analyzer, though, we were surprised to find that very little care seems to have been given to Cellebrite’s own software security. Industry-standard exploit mitigation defenses are missing, and many opportunities for exploitation are present.</p><p>As just one example (unrelated to what follows), their software bundles FFmpeg DLLs that were built in 2012 and have not been updated since then. There have been <a href="https://www.cvedetails.com/product/6315/?q=ffmpeg">over a hundred security updates</a> in that time, none of which have been applied.</p><p></p>
<p>The exploits</p>
<p>Given the number of opportunities present, we found that it’s possible to execute arbitrary code on a Cellebrite machine simply by including a specially formatted but otherwise innocuous file in any app on a device that is subsequently plugged into Cellebrite and scanned. There are virtually no limits on the code that can be executed.</p><p>For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures. This could even be done at random, and would seriously call the data integrity of Cellebrite’s reports into question.</p><p>Any app could contain such a file, and until Cellebrite is able to accurately repair all vulnerabilities in its software with extremely high confidence, the only remedy a Cellebrite user has is to not scan devices. Cellebrite could reduce the risk to their users by updating their software to stop scanning apps it considers high risk for these types of data integrity problems, but even that is no guarantee.</p><p>We are of course willing to responsibly disclose the specific vulnerabilities we know about to Cellebrite if they do the same for all the vulnerabilities they use in their physical extraction and other services to their respective vendors, now and in the future.</p><p>Below is a sample video of an exploit for UFED (similar exploits exist for Physical Analyzer). In the video, UFED hits a file that executes arbitrary code on the Cellebrite machine. This exploit payload uses the MessageBox Windows API to display a dialog with a message in it. This is for demonstration purposes; it’s possible to execute any code, and a real exploit payload would likely seek to undetectably alter previous reports, compromise the integrity of future reports (perhaps at random!), or exfiltrate data from the Cellebrite machine.</p>
<p>The copyright</p>
<p>Also of interest, the installer for Physical Analyzer contains two bundled MSI installer packages named AppleApplicationsSupport64.msi and AppleMobileDeviceSupport6464.msi. These two MSI packages are digitally signed by Apple and appear to have been extracted from the Windows installer for iTunes version 12.9.0.167.</p><p></p><p>The Physical Analyzer setup program installs these MSI packages in C:\Program Files\Common Files\Apple. They contain DLLs implementing functionality that iTunes uses to interact with iOS devices.</p><p></p><p>The Cellebrite iOS Advanced Logical tool loads these Apple DLLs and uses their functionality to extract data from iOS mobile devices. The screenshot below shows that the Apple DLLs are loaded in the UFED iPhone Logical.exe process, which is the process name of the iOS Advanced Logical tool.</p><p></p><p>It seems unlikely to us that Apple has granted Cellebrite a license to redistribute and incorporate Apple DLLs in its own product, so this might present a legal risk for Cellebrite and its users.</p><p>In completely unrelated news, upcoming versions of Signal will be periodically fetching files to place in app storage. These files are never used for anything inside Signal and never interact with Signal software or data, but they look nice, and aesthetics are important in software. Files will only be returned for accounts that have been active installs for some time already, and only probabilistically in low percentages based on phone number sharding. We have a few different versions of files that we think are aesthetically pleasing, and will iterate through those slowly over time. There is no other significance to these files.</p><p><a href="https://twitter.com/intent/tweet?text=Exploiting%20vulnerabilities%20in%20Cellebrite%20UFED%20and%20Physical%20Analyzer%20from%20an%20app's%20perspective&amp;url=https://signal.org/blog/cellebrite-vulnerabilities/&amp;via=signalapp&amp;related=signalapp" title="Share on Twitter" target="_blank" class="btn btn-twitter">Tweet</a> <a href="https://facebook.com/sharer.php?u=https://signal.org/blog/cellebrite-vulnerabilities/" rel="nofollow" title="Share on Facebook" target="_blank" class="btn btn-facebook"> Facebook</a></p>
<p>Want to get involved with Signal? <a href="https://signal.org/workworkwork/">We're hiring!</a></p>
]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/505/how-to-stay-private-when-using-android</guid>
	<pubDate>Sat, 24 Apr 2021 06:39:26 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/505/how-to-stay-private-when-using-android</link>
	<title><![CDATA[How to stay private when using Android]]></title>
	<description><![CDATA[<p>The smartphone is one of the most invasive devices ever invented. It’s easy to forget that, of course, because we are so familiar with them, and they are so useful. But while you might value your smartphone for the convenience it gives you, tech companies value it for an entirely different reason: it is collecting data on everything you do.</p><p>If you believe, like us, that <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://protonmail.com/blog/internet-privacy/" target="_blank">privacy is a human right</a>, Android is <a href="https://digitalcontentnext.org/wp-content/uploads/2018/08/DCN-Google-Data-Collection-Paper.pdf" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">something of a nightmare</a>. Most people who use Google services are aware the company is tracking their location, checking which websites they go to, recording their voice, and reading their emails. What a lot of people forget is that Android was developed by Google, and is one of the most important tools for this data collection.</p><p>It is possible, though, to use Android in a way that drastically limits the amount of data you are sharing with Google (and other companies who want your data). In this guide, we’ll show you how to do that.</p><p>In each step below, we’ll show you how to use the settings menu on your device to increase your security and privacy. Most of the menus we mention will be the same for most current Android devices, but since devices vary you might find these options in a slightly different location or named differently. With a little poking around in your device’s menu, you should be able to find the relevant option. </p>
<p>The basic principle: Turn everything off</p>
<p>Before we begin with the specific steps necessary to make your Android device more private, let’s highlight a basic principle of using your phone: turn off all the connectivity you do not need.</p><p>This goes for whatever smartphone, and whichever operating system, you have. Don’t let your phone connect to unknown WiFi networks because they may be a source of malware. Don’t leave your Bluetooth on because there are plenty of <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://www.csoonline.com/article/3431705/are-you-being-tracked-through-a-bluetooth-security-vulnerability.html" target="_blank">Bluetooth security vulnerabilities</a>. Don’t connect your phone to your computer (if you can avoid it), because smartphones can also act as a reservoir of malware, and your phone can be infected without you realizing it. </p><p>In short: if you are not using a service right now, turn it off.</p><p>With that out of the way, let’s make your phone more secure. Here is a short(ish) list of how to do that.</p>
<p>1. Avoid Google Data Protection</p>
<p>First and foremost, you should be aware of <a href="https://protonmail.com/blog/google-fake-online-privacy/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">Google’s fake commitment to privacy</a> and limit the data the company collects from your phone. Android phones let you do this, but it is hidden. Go to your settings, and look for “activity controls.” Here, you can limit the data that Google is collecting via your phone. </p><p>Going further, you can even use your Google device without signing into your Google account. Unfortunately, this really limits what you can do with your phone. </p>
<p>2. Use a PIN</p>
<p>Another basic privacy step is to lock your phone with a personal identification number (PIN). Locking your phone prevents random strangers from being able to get into it and keeps your data private in the event that your phone is stolen or one of your friends “borrows” it.</p><p>When you set up a PIN on your device, some versions of Android will ask you if you want to encrypt the device as well. This is also a good idea, and we’ll come to that process shortly.</p><p>In 2019, it might seem a bit old-fashioned to use a PIN (or, even better, an <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://protonmail.com/blog/how-to-create-a-strong-password/" target="_blank">alphanumeric password</a>), but in terms of data privacy, a PIN is still king. That’s because if you are using the other locking methods that Android provides — your fingerprint or face recognition — you are consenting for this biometric information to be stored on your phone, and <a href="https://www.cnet.com/how-to/google-collects-face-data-now-what-it-means-and-how-to-opt-out/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">occasionally transmitted to Google</a>. </p>
<p>3. Encrypt your device</p>
<p>Encrypting your entire phone is pretty simple, but not many people do this. <a href="https://protonmail.com/support/knowledge-base/what-is-encryption/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">Encryption</a>, though, is by far the best way to keep your data private, whether your phone is hacked or stolen.</p><p>Encrypting your phone can be done from the “security” menu in Android. You need to enter a PIN to do this, and the phone needs to be plugged in. Just don’t forget the PIN, because if you do all of the data on your phone may be lost forever.</p>
<p>4. Keep your software up-to-date</p>
<p>Everyone knows that keeping your software up-to-date is incredibly important, but even the most security-conscious people sometimes skip that annoying notification. If you don’t keep your phone updated, you are opening yourself up to vulnerabilities that can be exploited by hackers to steal your data.</p><p>In Android, you can update your software at any time by going to Settings &gt; About Phone &gt; System Update.</p>
<p>5. Be wary of unknown sources</p>
<p>By default, Android locks down the sources of software you can use by only allowing you to download apps from “approved sources” that have been vetted by Android developers. This is actually something that Android has inherited from Linux, which the OS is based on. However, sometimes your phone asks you to enable “unknown sources” for software, and if you’re in a rush you can accidentally turn this on. You should never trust software from these sources: some of it is malware, and some of it is merely riddled with security flaws.</p><p>To disable unknown software sources, go to Settings &gt; Security &gt; Unknown Sources, and uncheck the box. It’s probably not enabled anyway, but it doesn’t hurt to check.</p>
<p>6. Check app permissions</p>
<p>Yep. You know already that you should carefully check all of the permissions that an app asks for when you install it, but in a hurry you may not. There is no hard-and-fast rule when it comes to checking these permissions, but there is a good guiding principle: are the permissions an app is asking for appropriate for what it does? Does this silly game you’ve downloaded really need to access your camera, contacts, and microphone? Probably not.</p><p>The situation, when it comes to app permissions, has improved in recent years. In response to user concerns over privacy, Android apps now ask for (almost) all of the permissions they need. They will also ask for these selectively, so you can use an app without granting it all the permissions it asks for. An app will ask for Bluetooth permission, for instance, only when you try to use this functionality. </p><p>On the other hand, there are some permissions that are so “basic” that they are not even counted as permissions by Android. The most striking example of this is access to your Internet connection. All apps are granted this permission by default, they will not ask you to confirm this, and you cannot disable it. This means that even your flashlight app can send and receive data.</p><p>You should check the permissions that an app asks for when you install it, but you should also audit your apps frequently to make sure that you have not granted them more permissions than they need. Building this kind of audit into your monthly schedule is a great way of staying on top of your cybersecurity, since you can easily spot extra permissions that you may have granted in a rush. To check these permissions, go to Settings &gt; Apps &gt; ⚙ icon &gt; App permissions.</p><p>In general, if you think an app is asking for greater permissions than necessary, look for an alternative that takes your privacy more seriously.</p>
<p>7. Review your cloud sync</p>
<p>Plenty of apps request permission to sync data with the cloud, and sometimes you might want them to do this. There are many advantages of cloud storage for messaging apps and those that store important data. But, just like checking the permissions they ask for, you should also limit the number of apps you have syncing to the cloud. </p><p>You can turn off cloud syncing for individual apps by going to Settings &gt; Accounts, and then tapping on the app name. </p>
<p>8. Hide notifications</p>
<p>An often overlooked way of making Android devices more private is simply to turn off notifications on the lock screen. That way, someone who picks up your phone won’t be able to see your contacts, message previews, reminders, and alerts.</p><p>Turning off these notifications is easy. Just go to Settings &gt; Sound &amp; Notifications.</p>
<p>9. Review default apps</p>
<p>Now we’re getting to some more technical measures. Android opens certain types of files with certain apps, and these are controlled by a list held in Settings &gt; Apps &gt; ⚙ icon &gt; Default. Here, you can see which apps Android uses for each type of file. </p><p>The key here is to make sure that Android is using the most secure apps available to open particular files. If you’ve installed ProtonMail, for example, make this your default app for email. The same goes for any other secure app you download because by default Android opens everything with the least privacy-focused apps available (i.e. the apps made by Google, which wants to spy on you).</p>
<p>10. Don’t share your location with apps</p>
<p>Many apps request that you share your location with them. For some apps, this is incredibly useful. In fact, some apps lose all functionality unless you give them your location data. </p><p>On the other hand, plenty of apps that don’t need to know where you are ask for this information. This, in fact, has been one of the major <a href="https://www.cso.com.au/article/663680/can-security-industry-keep-up-5g/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">security concerns of the 5G network</a>, and why Huawei is banned from taking part in it. There was a fear that the Chinese tech giant was collecting location data by default for everyone who used their hardware, and that this could be used to identify individuals even when they had taken precautions against this.</p><p>To turn off location permissions for your apps, go to Settings &gt; Apps &gt; ⚙ icon &gt; App permissions &gt; Location.</p><p>A more general way of limiting access to your location data is to disable Google’s attempts to track your every move. You can do that by going to Settings &gt; Location &gt; Google Location History.</p><p>Limiting which apps have location permission is even more important now that <a rel="noreferrer noopener" href="https://www.vice.com/en_us/article/jgxk3g/secret-service-phone-location-data-babel-street" target="_blank">Vice reported on Locate X</a>, a service that aggregates and sells location data harvested by users’ apps. An internal Secret Service document confirms that the agency has purchased location data, information that it would normally need a warrant or court order to access, from Locate X. Other federal agencies, like Immigration and Customs Enforcement and the Internal Revenue Service, have engaged in similar practices.</p>
<p>11. Use a non-Google version of Android</p>
<p>If you take your privacy seriously, you could also consider using a version of Android that is not built by Google and won’t send them data.</p><p>Though most device manufacturers make their own “flavor” of Android, most of these variant systems are built around the core functionality that Google provides. As a result, almost all “mainstream” versions of Android will share your data with Google. </p><p>There are some versions of Android, however, that do not do this. Installing them is a pretty major and complicated step, though, so you should carefully consider whether you want to wipe the existing OS from your phone. At the moment, the most developed (and stable) alternative Android OS is <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="http://lineageos.org/" target="_blank">LineageOS</a>. This is based on CyanogenMod, which limits access to your phone by third parties. Installing an alternative OS requires technical knowledge, though there are plenty of <a href="http://wiki.lineageos.org/install_guides.html" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">install guides</a> to help you.</p>
<p>12. Don’t use Google for search</p>
<p>You might be wondering why this option is not higher up on this list. It should be easy to change your default search engine within Android, right? Well, yes and no. No surprise, Android doesn’t let you use any other search service from within its default browser. </p><p>In order to use a more secure search engine, you need to <a href="https://protonmail.com/blog/best-browser-for-privacy/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">download an alternative browser</a>. These let you change the default search engine and avoid Google collecting data on your queries. </p>
<p>13. Use a VPN</p>
<p>A virtual private network (VPN) encrypts all of the data passing between your phone (or computer, or tablet) and the wider Internet. </p><p>There are plenty of VPN providers out there, but you should be careful about which one you choose. In general, VPN providers often are not transparent about who operates them or how they may or may not use your data. In addition, be wary of VPN providers that are based in the EU or (even worse) the US, because they may be required to <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://protonvpn.com/blog/5-eyes-global-surveillance/" target="_blank">share data with foreign intelligence agencies</a>. With our own VPN service, we have gone to great lengths to demonstrate why we offer a <a href="https://protonvpn.com/blog/is-protonvpn-trustworthy/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">VPN worthy of your trust</a>. </p>
<p>14. Use a secure email provider</p>
<p>Finally, you should use an email provider that doesn’t read your emails. It may sound pretty obvious. But you should remember that everything you do on Gmail is being read by Google. If you are uncomfortable with that, there are plenty of secure (and private) email providers out there. </p><p>One of them is ProtonMail. We use <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://protonmail.com/blog/what-is-pgp-encryption/" target="_blank">PGP encryption</a> to keep your emails private when they are in transit, and <a href="https://protonmail.com/blog/zero-access-encryption/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">zero-access encryption</a> to secure your data at rest. As a result, no one but you can access your messages, not even us. It’s also quite easy to transfer your data from Gmail using the ProtonMail <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://protonmail.com/blog/import-export-beta/" target="_blank">Import-Export application</a> (now in beta).</p><p><a href="https://protonmail.com/blog/is-protonmail-trustworthy/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">Learn more: why ProtonMail is trustworthy</a></p>
<p>Using Android privately</p>
<p>In closing, it’s also worth pointing out that, although Android is a risk to your privacy if you don’t lock it down correctly, smartphones per se are not evil.</p><p>In fact, if used correctly they can be extremely useful in securing other parts of your online life. The clearest example of this is <a href="https://protonmail.com/blog/what-is-two-factor-authentication-how-to-use-it/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">two-factor authentication</a>, in which a time-based code from a smartphone app is required in addition to your password to log in to your account. (Where possible, you should set up this kind of system for all of your online accounts.)</p><p>The trick to using a smartphone securely, as with any other device, is to take the time to find out how it actually works. That way, you can disable the data-collection and data-sharing “functions” that you don’t need. </p><p>And just by reading this article, you’ve taken the first step on that road. </p><p>Best Regards,<br />The ProtonMail Team</p><p>UPDATE August 17, 2020: This article was updated to incorporate Vice’s reporting on Locate X and the Secret Service purchasing user location data.</p><p>You can get a <a href="https://protonmail.com/signup" target="_blank" rel="noreferrer noopener">free secure email account from ProtonMail here</a>.</p><p>We also provide a <a href="https://protonvpn.com/" target="_blank" rel="noreferrer noopener">free VPN service</a> to protect your privacy.</p><p>ProtonMail and ProtonVPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a <a rel="noreferrer noopener" href="https://protonmail.com/support/knowledge-base/paid-plans/" target="_blank">paid plan</a> or <a rel="noreferrer noopener" href="https://protonmail.com/donate" target="_blank">donate</a>. Thank you for your support.</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/486/deplacez-votre-historique-de-messages-depuis-dautres-applications</guid>
	<pubDate>Mon, 19 Apr 2021 20:42:30 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/486/deplacez-votre-historique-de-messages-depuis-dautres-applications</link>
	<title><![CDATA[Déplacez votre historique de messages depuis d&#039;autres applications]]></title>
	<description><![CDATA[
<p><a href="https://telegram.org/file/464001367/2/CjzwCFB1BDY.178283/4c049986f45118c1a6" target="_blank"></a></p>
<p>Plus de 100 millions de nouveaux utilisateurs ont rejoint Telegram en ce mois de janvier, en quête de plus de confidentialité et de liberté. Mais qu'en est-il des messages et des souvenirs laissés sur les apps remplacées ?</p><p>À compter d'aujourd'hui, tout le monde peut emmener son historique de discussions avec lui (incluant les vidéos et les documents) dans Telegram depuis des applications telles que WhatsApp, Line et KakaoTalk. Cela fonctionne aussi bien pour les conversations individuelles que pour les groupes :</p><p>Pour déplacer une discussion depuis WhatsApp sur iOS, ouvrez la page des Infos de contact ou des Infos de groupe dans WhatsApp, touchez Exporter discussion, puis choisissez Telegram dans le menu de partage.</p><p>Sur Android, ouvrez une discussion WhatsApp, touchez ⋮ &gt; Plus &gt; Exporter discussion, puis sélectionnez Telegram dans le menu de partage :</p><p>WhatsApp pour iOS vous permet aussi d'exporter vos discussions directement depuis la liste des conversations. Balayez une discussion vers la gauche, puis choisissez '…' &gt; Exporter discussion.</p><p>Les messages seront importés dans le jour courant mais incluront également leurs horodatages d'origine. Tous les membres de l'échange dans Telegram verront les messages.</p>
<p>Déplacez des échanges et économisez de l'espace</p>
<p>Le meilleur dans tout cela réside dans le fait que les messages et les médias que vous déplacez ne nécessitent pas d'espace de stockage supplémentaire. Les anciennes apps stockent toutes les données sur votre appareil - contrairement à Telegram qui n'occupe virtuellement aucun espace tout en vous permettant de consulter tous vos messages, photos et vidéos quand vous le souhaitez.</p><p>Vous pouvez <a href="https://t.me/TelegramTips/243">libérer de l'espace</a> et contrôler la taille de votre cache dans Paramètres &gt; Données et stockage &gt; Utilisation du stockage.</p>
<p>Maîtrisez votre empreinte numérique</p>
<p>Vos données vous appartiennent, c'est pourquoi les utilisateurs de Telegram peuvent non seulement <a href="https://telegram.org/blog/export-and-more">exporter leurs échanges</a>, mais aussi <a href="https://telegram.org/blog/unsend-privacy-emoji#unsend-anything">supprimer les messages</a> qu'ils envoient et reçoivent pour tout le monde – sans laisser la moindre trace.</p><p>Avec cette mise à jour, vous bénéficiez d'encore plus de contrôle : les échanges secrets, les groupes que vous avez créés et votre historique d'appels peuvent désormais aussi être supprimés pour tout le monde à tout moment.</p><p>Les serveurs Telegram ne stockent pas d'information à propos des échanges et journaux d'appels supprimés. Ainsi, les données disparaissent complètement, pour toujours.</p>
<p>Salons vocaux améliorés</p>
<p>Vous pouvez maintenant voir lesquels de vos groupes disposent de <a href="https://telegram.org/blog/voice-chats">salons vocaux</a> actifs, depuis le sommet de la page de votre historique d'appels.</p><p>Lors d'un salon vocal, vous pouvez maintenant ajuster le volume individuellement pour chaque participant afin de contrôler les niveaux de leurs microphones. Les ajustements faits par les admins de groupe seront appliqués pour tous les auditeurs.</p>
<p>Lecteur audio amélioré</p>
<p>Pendant la lecture d'un morceau, touchez le nom de l'artiste dans le lecteur pour voir leurs morceaux parmi tous vos échanges. Si vous avez besoin d'avancer ou de répéter quelque chose que vous avez manqué, appuyez et maintenez la pression sur les boutons Suivant et Précédent pour faire une avance rapide et revenir en arrière.</p><p>Nous avons aussi ajouté un effet de fondu pour enchanter vos oreilles lors de la pause et la reprise de la musique.</p>
<p>Autocollants de bienvenue</p>
<p>Si vos contacts ont récemment rejoint Telegram, il peut être sympa de leur souhaiter la bienvenue en utilisant une des <a href="https://t.me/TelegramTips/233">fonctionnalités uniques</a> de Telegram. Un autocollant de bienvenue sera suggéré dans vos nouveaux échanges, prêt à être envoyé d'un simple toucher.</p>
<p>Nouvelles animations sur Android</p>
<p>Qui dit nouvelle mise à jour dit chic nouvelles animations. Attrapez-les toutes en téléchargeant des fichiers, en jouant de la musique ou en chargeant les échanges après s'être authentifié.</p>
<p>Signaler les faux canaux</p>
<p>Toutes les apps Telegram vous permettent de signaler un spam et d'autres types de contenu illégal, notamment les appels à la violence ou l'abus sur mineurs. Désormais, vous pouvez également signaler de faux canaux ou groupes se faisant passer pour des personnes célèbres ou des organisations. Ouvrez leur page de profil et touchez '…' &gt; Signaler &gt; Faux compte pour nous prévenir que quelque chose de louche se passe par ici. Nos modérateurs y jetteront un oeil.</p>
<p>Améliorations d'accessibilité</p>
<p>De nombreuses améliorations d'accessibilité ont été ajoutées à la fois pour les utilisateurs de TalkBack et de VoiceOver. Pendant que nous continuons à affiner l'interface de nos applications pour tous les utilisateurs, nous suivons avec intérêt vos retours sur notre <a href="https://telegram.org/blog/voice-chats#feature-suggestion-platform">plateforme de suggestions</a>.</p><p>Nous souhaitons chaleureusement la bienvenue à tous ceux qui nous ont rejoints récemment ! La prochaine mise à jour ne devrait pas tarder.</p><p>28 janvier 2021<br />L'équipe Telegram</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>
<item>
	<guid isPermaLink="true">https://ememiom.fr/iom/blog/view/485/canaux-des-millions-dauditeurs-enregistrement-des-audioconferences-et-outils-dadministration</guid>
	<pubDate>Mon, 19 Apr 2021 20:40:04 +0000</pubDate>
	<link>https://ememiom.fr/iom/blog/view/485/canaux-des-millions-dauditeurs-enregistrement-des-audioconferences-et-outils-dadministration</link>
	<title><![CDATA[canaux, des millions d&#039;auditeurs, enregistrement des audioconférences et outils d&#039;administration]]></title>
	<description><![CDATA[
<p><a href="https://telegram.org/file/464001284/3/rHzxN3afclE.253809/78fbb9de14cac31e08" target="_blank"></a></p>
<p>Les salons vocaux ont fait leur apparition pour la première fois <a href="https://telegram.org/blog/voice-chats">en décembre</a>, apportant une nouvelle dimension de vie aux discussions des groupes Telegram. À compter d'aujourd'hui, ils sont également disponibles dans les canaux, et il n'y a plus aucune limite sur le nombre de participants.</p><p>Cette mise à jour apporte également les salons vocaux enregistrables, les listes enrichies de participants, un système de lever de main, des liens d'invitation pour les intervenants et les auditeurs, les titres de salons vocaux, et une manière pour les personnalités publiques de rejoindre des salons vocaux en tant que leurs propres canaux.</p>
<p>Salons vocaux sans limites</p>
<p>Les admins de <a href="https://telegram.org/tour/channels">canaux</a> et de groupes publics peuvent maintenant organiser des discussions vocales pour des millions d'auditeurs en direct. Peu importe le degré de popularité atteint; de nouveaux utilisateurs pourront se joindre à l'écoute de la discussion. C'est un peu comme la radio publique réinventée pour le 21ème siècle.</p><p>Pour démarrer un salon vocal, ouvrez le profil de n'importe quel groupe ou canal dans lequel vous êtes admin, puis touchez (⋮) ou (⋯) et sélectionnez Démarrer un salon vocal.</p>
<p>Enregistrement des conversations audio</p>
<p>Alors que certaines conversations sont <a href="https://telegram.org/blog/autodelete-inv2#auto-delete-messages">sensées être temporaires</a>, d'autres doivent être préservées et transmises. Les admins peuvent désormais lancer l'enregistrement audio d'un salon vocal pour garder une trace des conversations et les publier pour les abonnés ayant manqué l'évènement en direct.</p><p>Une fois l'enregistrement terminé, le fichier audio devient disponible instantanément dans vos <a href="https://t.me/TelegramTips/242">messages enregistrés</a>. Pour éviter les surprises, les salons dans lesquels un enregistrement est en cours sont marqués d'un point rouge à côté de leur titre.</p>
<p>Lever la main</p>
<p>Dans les salons où les participants sont muets, les auditeurs peuvent d'un simple toucher lever la main et signaler aux admins qu'ils souhaitent prendre la parole. Exactement comme dans un talk show, mais avec des animations addictives.</p><p>Votre texte de bio est à présent visible dans la liste des participants, que vous pouvez utiliser pour détailler votre expertise, vos intérêts, ou juste dire quelques mots à propos de vous. Cette information peut aider les admins à trouver un bon créneau pour vos questions et commentaires.</p>
<p>Liens pour intervenants et auditeurs</p>
<p>Les administrateurs de groupes publics et de canaux peuvent maintenant créer des liens d'invitation ouvrant directement le salon vocal. Des liens séparés peuvent être créés pour les intervenants et les auditeurs. De cette façon, vous n'aurez pas à enlever la sourdine les invités importants lorsqu'ils rejoignent le salon - et ils peuvent utiliser un lien différent pour promouvoir une discussion à venir à leurs communautés.</p><p>Les salons vocaux disposent aussi en option de titres aidant les utilisateurs à connaître le sujet de conversation avant de rejoindre.</p>
<p>Rejoindre en tant que…</p>
<p>En entrant dans un salon vocal de canal, les utilisateurs ont la possibilité de rejoindre en prenant l'identité de leur compte personnel ou de l'un de leurs canaux. Ainsi, les célébrités et personnalités publiques peuvent prendre part à des conférences audio en public sans pour autant afficher leur compte personnel, et éviter un regain d'activité indésirable dans leurs messages privés.</p>
<p><a href="https://telegram.org/file/464001305/4/mLAGs_eJ4h4.98472/c3b8a619c32ca54cab" target="_blank"></a></p>
<p>Par exemple, le Président du <a href="https://t.me/jairbolsonarobrasil">Brésil</a> et Premier Ministre d'<a href="https://t.me/bnetanyahu">Israël</a> peuvent se rencontrer pour échanger dans le <a href="https://t.me/durov">canal de Pavel Durov</a> et répondre aux questions des utilisateurs sans risquer de voir leur liste d'échanges submergée par des admirateurs.</p>
<p>Et bien plus encore</p>
<p>Si vous choisissez par erreur le mauvais échange en transférant des messages, touchez le bouton X avant leur envoi, soit pour annuler le transfert ou sélectionner un autre échange de destination.</p>
<p><a href="https://telegram.org/file/464001284/4/radytJhwK-c.52636/0afbf0d4080e59767f" target="_blank"></a></p>
<p>Vous pouvez également reprendre la lecture de là où vous l'avez interrompue pour l'écoute des longs messages vocaux. Auparavant, cette fonction était disponible pour de longues vidéos ou de longs morceaux audio, et nous avons pensé que nous avions couvert tous les cas possibles - mais c'était sans compter sur notre grand-mère une fois qu'elle s'est inscrite.</p><p>Dernier point mais pas des moindres, les utilisateurs Android peuvent choisir quelle action est assignée au balayage vers la gauche dans la liste d'échanges : archiver, épingler, mettre en sourdine, supprimer des échanges ou les marquer comme lus. (Sur iOS, toutes ces actions de balayage sont toujours disponibles, selon la direction vers laquelle vous balayez l'écran.)</p><p>Et c'est tout pour aujourd'hui, restez à l'écoute pour la prochaine mise à jour !</p><p>19 mars 2021<br />L'équipe Telegram</p>]]></description>
	<dc:creator>La loupe</dc:creator>
</item>

</channel>
</rss>