To view the list of links, please access this site using Tor Browser.
If you’re seeing this message, access is restricted for regular browsers.
Already using Tor? If you are sure you’re currently in Tor Browser, proceed to our .onion version:
potential MITM available
the information has to be protected for less than 9-10 years
metadata is exposed
MITM
Both OMEMO or OTR are irrelevant in the face of XMPP. the XMPP is dependent on the third party server side, most usually of the 3rd party one.
Most of the users DON'T check the pub keys of their contacts
Double-ratchet protocol —
OTR messaging with perfect Forward secrecy and Break-in recovery.
none of the post-quantum algorithms are proven to be secure against quantum or conventional computers. They are usually referred to as"believed to be secure"by the researchers and security experts. There is continuous research to break post-quantum algorithms, and to prove their security, and many of these algorithms are broken every year, often by conventional computers.
XMPP is centered around 3rd party servers.
The server can see the timing of the messages, volume of the messages, size of the messages, full social graph and so on.
If it is your own server (wast majority of ppl using 3rd party servers), the server observer can see all the above except less structured and no social graph.
All of that is clearly visible in the underlying code and publicly available information about each of the protocol.
proving your low level of education and experience in the field.
To prevent this, one has to manually check the fingerprints which most of the people don't do.
if the acounts or identities are known unlike in the case of SimpleX (no identities, no accounts).
Metadata exposure is a hell of a problem in the XMPP and cannot be solved. All of it is exposed to the server.