I saw some threads here about Telegram and piracy stuff being banned. So, as an experimental alternative, I created a public Signal group for piracy.

Maybe it’ll be useful?

Before joining

Signal supports usernames and hiding telephone numbers. Here’s a blog entry on how to do so. You might want to:

  • set a username
  • change your profile name (these are two separate things!)
  • hide your phone number
  • Negligent_Embassy@links.hackliberty.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    Yeah, for me personally I’m sticking to simplex. I can get an anonymous sim card, but none of the people I’d be talking to would do that. I don’t want this relationship/network map out there at all if I can avoid it.

    • Tregetour@lemdro.id
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      What makes you think Signal is maintaining relationship maps, and secondly, even if it is, is there any evidence they’re included in LEO subpoenas?

      • Negligent_Embassy@links.hackliberty.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        2 months ago

        There is no evidence. safety is about staying multiple steps ahead and risk mitigation when possible.

        Centralized servers are a single point of failure that could be compromised in the future.

        My contact’s devices they use signal on are insecure and could be easily compromised in the future.

        SMS/Cell network in general are insecure as hell and I avoid it as much as possible.

        Why would I expose all that sensitive data when there’s literally no need to? Simplex works great for me.

      • oldfart@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        They pinky promise they don’t maintain these relationships. Maybe even they really don’t. But they have the ability to, if they were to change their mind, and that’s the problem.

        Use secure protocols which don’t give anyone that ability.