News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Beginner’s Guide: Setting Up Pidgin with OTR for Secure Messaging : OpSec | Torhoo darknet markets

Beginner’s Guide: Setting Up Pidgin with OTR for Secure Messaging
/u/CypherWW
1 points
3 months ago
I don't think I would want to use OTR in 2025...
WHY THAT?
[removed by moderators]
What are you talking about? Don't mislead users especially on this sub. Not cool.


Claim #1 - FALSE
potential MITM available


Claim #2 - FALSE
the information has to be protected for less than 9-10 years


Claim #3 - FALSE
metadata is exposed


Let me first say OTR is outdated and shouldn't be used or recommended anymore. OMEMO is the upgrade for a variety of reasons and as such it was also taken from the OTR key exchange protocol. OMEMO is based on Axolotl Ratchet and implementation used by Signal itself. Signal has own privacy-related problems but their core technology is solid.

With that being said OMEMO is an end-to-end encryption scheme making MITM impossible. OMEMO has future and Perfect Forward Secrecy as well deniability [Claim #2] among other modern features like offline message delivery (unlike OTR). There isn't a potential for MITM if you're using OMEMO plugin on XMPP and you've verified the other parties fingerprint [Claim #1].

You're repeating what you read on the SimpleX website [ simplex.chat ] without putting any thinking, I'll explain more on SimpleX below.

Metadata leaks can be mitigated if all communicating parties use XMPP servers under anonymization networks such as Tor. [Claim #3] On the note I'd agree XMPP can do more by default to minimize metadata leaks.

If you meant for right out the box default settings without any setup or plugins then your claims can be considered only then true. XMPP is (pretty much to a global adversary) clear text and most servers operate on the clearnet. It becomes an entirely different beast when you use OMEMO and Tor underneath.

Don't get me even started on Briar, there's enough information for you to do your own research. A great tool to use though if our masters decide total Internet blackouts. CWTCH is a p2p protocol if you want to go the way of (I forgot which service/admins) who got caught with their traffic analyzed using Tox - be my guest. In XMPP at least you have intermediary servers which can protect it.

Coming back to SimpleX. SimpleX has been called out many times on forums and on their own reddit. In the list below I'll refer as SimpleX table the table on their website comparing other messengers.

  • Biggest and most crucial issue is SimpleX has no reproducible builds last I checked. If I can't compile the source code I should trust your binary? Big no.
  • On SimpleX table. It states there's Possibility of MITM for Signal (??? bold unverified statement ???) and XMPP (no given using OMEMO with verified counter-party fingerprints)
  • On SimpleX table. They state XMPP relies on DNS. It doesn't if you run it under networks such as Tor.
  • On SimpleX table. They state XMPP Central component contradicting the previous Single or Centralized network row on their own table stating XMPP is federated. XMPP is indeed federated if one server goes down you can always register at another or create your own if you wish. No central component.


I don't like the fact they're stretching the truth only for marketing. Isn't a great start to trusting it is worth investing your time in examining their code (before use). Don't get me wrong I'd take SimpleX over Telegram or Session any day. But not over other established solutions.

I'd suggest to you and other members of Dread to read and do your own research before repeating without thinking and dangerously spreading misinformation.
/u/Yugong, thank you for your insights
Thanks! I like reading yours too.
All assumptions wrong unfortunately.

MITM
Both OMEMO or OTR are irrelevant in the face of XMPP. the XMPP is dependent on the third party server side, most usually of the 3rd party one. If one doesn't manually check the pub keys of the counterparty, the server can act as a MITM agent. Most of the users DON'T check the pub keys of their contacts and the design of the OTR and OMEMO includes the necessity of the manual check to prevent the MITM. SimpleX doesn't need any of that as it is fully MITM resistant.
Verdict - MITM is possible on any form of the XMPP. If you mind of the MITM, don't use XMPP.

9-10 years of protection lifetime.
OTR nor OMEMO offer quantum resistance and are not PQC ready. If you need 9-10 years of information lifetime protection, use solutions that are PQC enabled like SimpleX for example. SimpleX is quantum resistant while Briar and CWTCH is not as clearly stated in their docs.
Verdict - OTR nor OMEMO are quantum resistant and cannot offer any resistance against the quantum computer attack.

Metadata in the XMPP
XMPP is centered around 3rd party servers. The server can see all messages except for the content (in case the MITM wasn't the point). The server can see the timing of the messages, volume of the messages, size of the messages, full social graph and so on. If it is your own server (wast majority of ppl using 3rd party servers), the server observer can see all the above except less structured and no social graph.
Verdict - Metadata is a huge unsolved issue of the XMPP. Simplex doesn't have any similar issues with metadata, because there is no account to spy on and the server doesn't know what message belongs to what user. If you mind concealing the metadata, don't use the XMPP.

Overall and publicly provable verdict is that the XMPP (even with OTR and OMEMO) is an ancient protocol offering inferior privacy and anonymity and therefore inferior security features compared to newer and modern protocols like SimpleX and (without PQC) the Briar and CWTCH.

All of that is clearly visible in the underlying code and publicly available information about each of the protocol.

Cheers ;)
You're spreading misinformation once again. I don't know if on purpose or you're simply misinformed (there's another word for it but lets be civil).



MITM

MITM
Both OMEMO or OTR are irrelevant in the face of XMPP. the XMPP is dependent on the third party server side, most usually of the 3rd party one.

False. Refer to the specification of OMEMO or OTR. They are end to end encrypted, I'm not going to baby feed you the basics.

Provide proof and code with your claim as it would be the worlds first. I never knew there were so talented people on Dread, we should invite a panel of experts to see how asfaleia will be breaking the Double Ratchet. We'll make the world news /u/Paris /u/HugBunter /u/DaVenom We are all watching with interest.


Most of the users DON'T check the pub keys of their contacts

You're talking about how user behaves. Entirely different from the technology itself. A user can on accident enter their personal information on website while using Tor. Does it mean Tor can be MITM'd too?

If you're talking about out of the box solution XMPP does need more configuration to make it running right. XMPP does need to improve in that aspect I said it in my previous comment too. Doesn't mean a properly configured one isn't a good solution for secure communication. Kind of like VPN. You can have different protocols and some are better than others but if you don't follow the best security practices in either everything can be subverted in default configurations.


More on MITM & SimpleX
Let me remind you another thing. What does SimpleX use? That's right OTR.


Double-ratchet protocol —
OTR messaging with perfect Forward secrecy and Break-in recovery.


By your logic claims you can MITM SimpleX too. Remember SimpleX has, and I can't stress it enough, NO REPRODUCIBLE BUILDS. What does it mean? In layman terms a trust me bro no backdoor. No such thing with XMPP with decades of proven track record.

You conveniently left that detail in your response. Based on your Dread history of generic & superficial security comments you seem to imagine yourself as a security expert. How does it compute to trust a random binary if you can't compile it?



9-10 years of protection lifetime.

Now let me turn your attention to SimpleXs actual website. A lot of information in research papers but since you see them as the standard in security I'll quote their own website.

[simplex chat/blog/20240314-simplex-chat-v5-6-quantum-resistance-signal-double-ratchet-algorithm.html]

none of the post-quantum algorithms are proven to be secure against quantum or conventional computers. They are usually referred to as
"believed to be secure"
by the researchers and security experts.
There is continuous research to break post-quantum algorithms, and to prove their security, and many of these algorithms are broken every year, often by conventional computers.


I put it in bold, red text and subtitled it so you don't miss it. Believed to be secure isn't secure. No research has PQE nailed down and if they did until we see Shors algorithm in action can't know for sure. Not a single protocol has protection against quantum computers, SimpleX included.

Is it better to have it than nothing compared to XMPP or others? Absolutely and since it's encapsulated you don't need to rely on it being secure or not against quantum computer breaking it or risk attacks by traditional modern computers. I'd love for XMPP or other messenger to add such functionality regardless if it only might be wishful thinking.

Shortly commenting on PQE itself. There've been a couple of tests one of the first were with South Koreas SK Telecom and some Chinese ones with satellites. The real issue with real PQE is the infrastructure. Traditional computers can relay information through switches and routers who essentially copy and pass on the information. With quantum communication such possibility doesn't exist as once the state of a byte is inspected it must have a 0 or 1. In such you can't pass on the information without error and the reasoning why it is believed if implemented correctly PQE can inform users if their connections are attempted to be spied on (error-correction alerts). The longest internet cable has a physical limit (SK Telecoms experiment) while the Chinese one used satellite kind of bypassing that physical limitation. I'm not going to be searching for the exact links as it is out of the scope of this topic but they are out there.



Metadata in the XMPP


XMPP is centered around 3rd party servers.

SimpleX too? You use preset SimpleX servers but can host your own. The network models are different to XMPP yes but with XMPP you can host your own server too. No one is disputing XMPP should have less metadata by default. Once again I said it in my previous comment to you.


The server can see the timing of the messages, volume of the messages, size of the messages, full social graph and so on.

Mitigation: run your own server. Same as saying default vanilla Tor hidden service onions can be discovered more easily yes. That's why things like vanguards were created. You can see your logic makes no sense. If there was no mitigation on Tors part then that's another topic same with XMPP. But they exist and because you don't know or don't want to acknowledge them doesn't make it insecure.


If it is your own server (wast majority of ppl using 3rd party servers), the server observer can see all the above except less structured and no social graph.

Mitigation: run the server completely under Tor. Already mentioned in my previous comment refer to it.

I'm not saying XMPP is perfect and its default state far from it. I'm not saying SimpleX can't be better starting with source code you can compile, in its default state ignoring the source code issue it would be a better choice. However mitigations exist for XMPP running your own server, Tor, OMEMO. If you take a second to search for them. If you'd like to put your trust in trust me bro binaries on messengers and protocols with limited audits and lifespan - be my guest.




All of that is clearly visible in the underlying code and publicly available information about each of the protocol.

Show and prove it then. You made the initial outlandish claim, the burden of proof is on your side. I can't believe nobody has called you out on your claims which based on your posts seem to be a recurring theme.

Verdict - You got no idea what you're talking about and repeating what you read online without verifying/researching deeper. I could be wrong and you're a super cool 1337 master hacker. We'll see who is right once you provide your PoCs and additional documentation to prove your claims.

Cheers ;)
I understand that the hatred and rage you have within you and that you need to ventilate it, but it would be better to find a rather than spending time here proving your low level of education and experience in the field.

If you cannot read the code or understand the underlying protocols, read at least the OTR website. Imposter here is the MITM actor.

https://torhoo.cc/go.php?u=YUhSMGNITTZMeTl2ZEhJdVkzbHdhR1Z5Y0hWdWEzTXVZMkV2YUdWc2NDOW1hVzVuWlhKd2NtbHVkQzV3YUhBPQ==#

Consider finding a doctor, seriously. Your life will turn into a hell if you continue with this shit further.
You were called out on your misinformation claims with the same tone as in your reply to me ( Cheers ;) ) so might want to look yourself in the mirror.

Not being able to prove your claims shows one thing - you don't understand what you're talking about at all and your advice anywhere on Dread should be taken with a big pinch of salt.

You might fool others with the superficial security comments on the subforum but once you get called out for a single claim suddenly you feel threatened & other parties need to find a doctor. Perhaps you'd like to report me to the police for verbal abuse?

All you had to do was paste a PoC to prove your point or documentation or anything really and I would have agreed with you or very least started a fruitful conversation. But you didn't and it speaks volumes. Don't put the blame on me because I'm passionate about the subject and don't like seeing people being misled.


proving your low level of education and experience in the field.

Again, look in the mirror kid. You failed to provide any Proof of Concept or any code to MITM the Double Ratchet protocol on any platform despite making the initial outlandish claims.

Talk is cheap.
Read the docs please. Also note that a compromised server can serve fake keys to the communicating counterparties, if the acounts or identities are known unlike in the case of SimpleX (no identities, no accounts).

To prevent this, one has to manually check the fingerprints which most of the people don't do.

Metadata exposure is a hell of a problem in the XMPP and cannot be solved. All of it is exposed to the server.

And find a doctor for yourself. Your mental issues can be solved unlike the XMPP issues that cannot.
Unless you're going to have a fruitful discussion and answer with proof, code and references to what I've replied to you there is no point in talking as you're talking in circles.


To prevent this, one has to manually check the fingerprints which most of the people don't do.

User behavior isn't Man-in-the-Middle attack. /u/DrugHub mentioned it recently /post/51f6471ee0d8974c6535/#c-0b75e706c3f2253504 - if users don't use it properly that is up to them. I ask you once more as you failed to respond to that part of my set of arguments. If a user enters his personal information name address tax details all on a hidden service within the Tor network does it mean by your logic Tor can be MITM'd too?


if the acounts or identities are known unlike in the case of SimpleX (no identities, no accounts).

SimpleX has no reproducible builds. You ignored it once again.


Metadata exposure is a hell of a problem in the XMPP and cannot be solved. All of it is exposed to the server.

For a self imaged security expert you sure don't like reading. Mitigations were explained in my previous comment.

Present PoC in your next comment or continue to talk to yourself. If I were you though I'd stop talking as you embarrassed yourself plenty already.
/u/cokegoblin
1 points
3 months ago*
Mum I'm on TV



░░░░░░▄▄▄▄▀▀▀▀▀▀▀▀▄▄▄▄▄▄▄
░░░░░█░░░░░░░░░░░░░░░░░░▀▀▄
░░░░█░░░░░░░░░░░░░░░░░░░░░░█
░░░█░░░░░░▄██▀▄▄░░░░░▄▄▄░░░░█
░▄▀░▄▄▄░░█▀▀▀▀▄▄█░░░██▄▄█░░░░█
█░░█░▄░▀▄▄▄▀░░░░░░░░█░░░░░░░░░█
█░░█░█▀▄▄░░░░░█▀░░░░▀▄░░▄▀▀▀▄░█
░█░▀▄░█▄░█▀▄▄░▀░▀▀░▄▄▀░░░░█░░█
░░█░░░▀▄▀█▄▄░█▀▀▀▄▄▄▄▀▀█▀██░█
░░░█░░░░██░░▀█▄▄▄█▄▄█▄▄██▄░░█
░░░░█░░░░▀▀▄░█░░░█░█▀█▀█▀██░█
░░░░░▀▄░░░░░▀▀▄▄▄█▄█▄█▄█▄▀░░█
░░░░░░░▀▄▄░░░░░░░░░░░░░░░░░░░█
░░▐▌░█░░░░▀▀▄▄░░░░░░░░░░░░░░░█
░░░█▐▌░░░░░░█░▀▄▄▄▄▄░░░░░░░░█
░░███░░░░░▄▄█░▄▄░██▄▄▄▄▄▄▄▄▀
░▐████░░▄▀█▀█▄▄▄▄▄█▀▄▀▄
░░█░░▌░█░░░▀▄░█▀█░▄▀░░░█
░░█░░▌░█░░█░░█░░░█░░█░░█
░░█░░▀▀░░██░░█░░░█░░█░░█
░░░▀▀▄▄▀▀░█░░░▀▄▀▀▀▀█░░█
░░░░░░░░░░█░░░░▄░░▄██▄▄▀
░░░░░░░░░░█░░░░▄░░████
░░░░░░░░░░█▄░░▄▄▄░░▄█
░░░░░░░░░░░█▀▀░▄░▀▀█
░░░░░░░░░░░█░░░█░░░█
░░░░░░░░░░░█░░░▐░░░█
░░░░░░░░░░░█░░░▐░░░█
░░░░░░░░░░░█░░░▐░░░█
░░░░░░░░░░░█░░░▐░░░█
░░░░░░░░░░░█░░░▐░░░█
░░░░░░░░░░░█▄▄▄▐▄▄▄█
░░░░░░░▄▄▄▄▀▄▄▀█▀▄▄▀▄▄▄▄
░░░░░▄▀▄░▄░▄░░░█░░░▄░▄░▄▀▄
░░░░░█▄▄▄▄▄▄▄▄▄▀▄▄▄▄▄▄▄▄▄█
shilling deepweb website

their jabber server sucks and everyone knows it
If you could read, you'd see that this is intended for beginners. I understand there are many better Jabber servers available, and I'm not sure why you're expressing hate or jealousy. You also commented on my other post. If you don't like it, that's perfectly fine for me.
I wouldn't worry too much. /u/DaVenom and I agreed that you deserve flair for your posts.

We like them.
Thank you! That means a lot to me. You both are the best!
did you put my flair too? toxic to ask why the most stupid posts get many upvotes?
Additionally, since you don't even have a Jabber account, I think this post is perfect for you.
😎😎😎😎😎😎