Our criticism of recently published

Wired article: "Wired's Attack on Privacy"

https://simplex.chat/blog/20241016-wired-attack-on-privacy.html

Reply to this note

Please Login to reply.

Discussion

It’s alarming to see Wired not only criticize SimpleX for its strong privacy protections, but also subtly blame the European Court of Human Rights for upholding basic human rights by rejecting laws that would force encrypted apps to scan and hand over private messages before encryption.

nostr:nevent1qqsf0llpvstpkljv4rsatjrcgc3jkq7s2cjsawvgwkauyqxxzps7ytspzemhxue69uhhyetvv9ujumt0wd68ytnsw43z7q3qht6s6d0xuscv0rkt09wt7y7wzfvs6d6uk3ysf3kan44a040hh2dsxpqqqqqqz099ndh

What is the big diference of simpleX to ricochet?

Richochet is an experimental, peer-to-peer messenger based on tor. It says it provides anonymity, but it's based on user identity like virtually every other messenger. It's closer to Tox than SimpleX.

SimpleX is a robust communications protocol that completely eliminates the concept of user identities. It's also server-based, so it avoids the inherent shortcomings of p2p systems, mostly related to persistence and reliability. SimpleX works with tor and has several tor integration points, but tor isn't required. It includes an integrated 2-hop onion routing protocol known as private routing. On its own, or in conjunction with tor, private routing protects the IP and session metadata of messaging connections. SimpleX encryption is quantum-resistant, based on the Signal double-ratchet protocol. I'm unsure of what richochet is using for encryption, but the differences between the two are significant.