very good advise, it's really the only way for sensitive talks.After seeing something like this, I’d say if you really want secure comms, just meet your business partner in a sauna. Of course, only if your threat model permits. ;-)
very good advise, it's really the only way for sensitive talks.After seeing something like this, I’d say if you really want secure comms, just meet your business partner in a sauna. Of course, only if your threat model permits. ;-)
thisAnother one is Line which uses encryption for parts of conversations
japan based. Line has nice design and user experience for me, similar to telegram
If you don't want to be spied by the US, EU or any western country it's the best solution to use China tech.it is Chines again? how can you relay on Chinese based tech?
I wouldn't trust a Japanese company.japan based. Line has nice design and user experience for me, similar to telegram
Japanese
Google Japanese privacy lawsI wouldn't trust a Japanese company.
Or RussianIf you don't want to be spied by the US, EU or any western country it's the best solution to use China tech.
That's a valid point. The risks associated with engaging (most) external cybersecurity experts or auditors are huge, particularly when it comes to red team exercises. The probability of sensitive information leaking is considerable, and many organizations often fail to implement recommended security measures promptly.If I would need safety, I would never ever engage Cyber-security experts nor auditors Too much confidential information exposure to external persons without leverage and balance.
In this particular incident, the IT environment was compromised elsewhere, and the attackers employed a series of sophisticated techniques and exploits to reach their target. The method they used to infiltrate the R&D networks is quite amusing, as it involved an attack vector that hadn't been considered in their security planning.Somebody was dis-loyal and others were over confident in complex phrases that were compensating their lack of comprehension and a fear of failure.
Indeed, the attack was attributed to a threat actor known for utilizing such advanced approaches. Given the value of the intellectual property at stake, their efforts were justified. This highlights why I emphasize the importance of threat modeling. Defending against these adversaries is an uphill battle, as they combine human intelligence, signals intelligence, and cyber tactics.There is a seriously good program from Israeli vendor regarding perky microphones for let's say, less hospitable and extreme environments
Absolutely! While they managed to access sensitive information, they couldn't exfiltrate the most critical data. Their detection was also relatively quick. As mentioned, the organization had a mature security posture, and I'm certain they've further enhanced their defenses since this incident. A common issue I've observed is that many organizations/individuals focus solely on technical solutions without addressing security holistically across all aspects of their operations.At least you know that safety can be achieved across spectrum.
It doesn't matter they will share information in a blink of an eye.Google Japanese privacy laws
See_ LINE Corporation's Compliance with Applicable Laws | LINE Corporation | Security & Privacy
Line is closed source so it's impossible to tell if they have any backdoors or if it's safe.See_ LINE Corporation's Compliance with Applicable Laws | LINE Corporation | Security & Privacy
Line app is encrypted client side FYI between all counterparties unique
All requests have to go through Japanese Justice Processes (LINE Transparency Report - LINE Corporation)
- See US, UK etc
Disclosure Requests
TrueLine is closed source so it's impossible to tell if they have any backdoors or if it's safe.
It was a "honeypot" since the beginning.Another one gone (never heard of before): Europol arrests 51 people and dismantles platform used for cybercrime
Another one gone (never heard of before): Europol arrests 51 people and dismantles platform used for cybercrime
I think it’s better to avoid carrying any electronics at all. The fact is, you can’t really trust any manufacturer of electronic devices used for communication on this planet.If you don't want to be spied by the US, EU or any western country it's the best solution to use China tech.
The enemy of my enemy (i.e., my oppressor by outnumbering me) is my lifelong friend and trusted partner! This shared mentality/strategy has worked for me and others personally for over 40 years!I think it’s better to avoid carrying any electronics at all. The fact is, you can’t really trust any manufacturer of electronic devices used for communication on this planet.
If you don't want to be spied by the US, EU or any western country it's the best solution to use China tech.
@wellington ALREADY mentioned Chinese tech (several times) as an antidote! It was NOT lost on me!Or Russian
Do you think a HK sim with WeChat is good enough? Or are there advantages using a Mainland Chinese number?Chinese tech