• mosiacmango@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    4 months ago

    Thats a different tech. End to end is cut and dry how it works. If you do anything to data mine it, it’s not end to end anymore.

    Only the users involved in end to end can access the data in that chat. Everyone else sees encrypted data, i.e noise. If there are any backdoors or any methods to pull data out, you can’t bill it as end to end.

    • circuitfarmer@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      You are suggesting that “end-to-end” is some kind of legally codified phrase. It just isn’t. If Google were to steal data from a system claiming to be end-to-end encrypted, no one would be surprised.

      I think your point is: if that were the case, the messages wouldn’t have been end-to-end encrypted, by definition. Which is fine. I’m saying we shouldn’t trust a giant corporation making money off of selling personal data that it actually is end-to-end encrypted.

      By the same token, don’t trust Microsoft when they say Windows is secure.

      • mosiacmango@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 months ago

        Its a specific, technical phrase that means one thing only, and yes, googles RCS meets that standard:

        https://support.google.com/messages/answer/10262381?hl=en

        How end-to-end encryption works

        When you use the Google Messages app to send end-to-end encrypted messages, all chats, including their text and any files or media, are encrypted as the data travels between devices. Encryption converts data into scrambled text. The unreadable text can only be decoded with a secret key.

        The secret key is a number that’s:

        Created on your device and the device you message. It exists only on these two devices.

        Not shared with Google, anyone else, or other devices.

        Generated again for each message.

        Deleted from the sender’s device when the encrypted message is created, and deleted from the receiver’s device when the message is decrypted.

        Neither Google or other third parties can read end-to-end encrypted messages because they don’t have the key.

        They have more technical information here if you want to deep dive about the literal implementation.

        You shouldn’t trust any corporation, but needless FUD detracts from their actual issues.

        • sugar_in_your_tea@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          Even if we assume they don’t have a backdoor (which is probably accurate), they can still exfiltrate any data they want through Google Play services after it’s decrypted.

          They’re an ad company, so they have a vested interest in doing that. So I don’t trust them. If they make it FOSS and not rely on Google Play services, I might trust them, but I’d probably use a fork instead.

    • micballin@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      They can just claim archived or deleted messages don’t qualify for end to end encryption in their privacy policy or something equally vague. If they invent their own program they can invent the loophole on how the data is processed

      • cheesemoo@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Or the content is encrypted, but the metadata isn’t, so they can market to you based on who you talk to and what they buy, etc.

        • mosiacmango@lemm.ee
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          This part is likely, but not what we are talking about. Who you know and how you interact with them is separate from the fact that the content of the messages is not decryptable by anyone but the participants, by design. There is no “quasi” end to end. Its an either/or situation.

          • sugar_in_your_tea@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 months ago

            It doesn’t matter if the content is encrypted in transit if Google can access the content in the app after decryption. That doesn’t violate E2EE, and they could easily exfiltrate the data though Google Play Services, which is a hard requirement.

            I don’t trust them until the app is FOSS, doesn’t rely on Google Play Services, and is independently verified to not send data or metadata to their servers. Until then, I won’t use it.