• @[email protected]
      link
      fedilink
      851 month ago

      Wish OP had written that in post… I nearly got a heart attack and was wondering how TF they done that 🤣

      • @CAVOKOP
        link
        211 month ago

        I don’t change the headline generally, but I also didn’t catch that it wasn’t “the real” matrix.

      • @[email protected]
        link
        fedilink
        English
        101 month ago

        Since France uses matrix themselves, they could’ve simply shut their own server down 😛 Which would be horrible of course …

    • UnfortunateShort
      link
      411 month ago

      I would love to call the headline clickbaity bs, but it’s technically accurate and somehow this makes it worse and better at the same time.

    • @SmoothIsFast
      link
      11 month ago

      It’s it different from the matrix Neo lives in too?

    • veee
      link
      fedilink
      English
      211 month ago

      I just listened to the Search Engine podcast episode covering ANOM last night! Completely wild the reach of this program entailed.

      Link to the episode for those that are interested.

        • veee
          link
          fedilink
          English
          11 month ago

          I’ll check it out. I don’t normally tune in, but they have a good show.

      • d-RLY?
        link
        fedilink
        41 month ago

        More than likely would mass post “Knock knock…” and wait for the first “who’s there?” reply.

  • @[email protected]
    link
    fedilink
    English
    66
    edit-2
    1 month ago

    The investigation did not spotlight the similarly-named Matrix open source communication protocol.

    Feel like there are going to be a lot of confused Lemmy users who won’t read more than the title.

    • ⓝⓞ🅞🅝🅔
      link
      fedilink
      51 month ago

      Well goodness. I read the article, fortunately, but it’s good to see other people pointing out here.

      My initial thought was that this was the matrix we obviously care about. I didn’t look at the details to see if these people are truly nefarious and do belong in jail, which I’m okay with, but it was definitely troubling to imagine that something I thought secure wasn’t secure. 😬

  • @[email protected]
    link
    fedilink
    521 month ago

    The investigation did not spotlight the similarly-named Matrix open source communication protocol.

    huh

    • @[email protected]
      link
      fedilink
      81 month ago

      I like the full quote better:

      Dutch police said the Matrix app was targeted along with similar encrypted services known by the names Mactrix, Totalsex, X-quantum and Q-Safe. The investigation did not spotlight the similarly-named Matrix open source communication protocol.

      Absolute dupe-magnets.

  • @[email protected]
    link
    fedilink
    English
    441 month ago

    I wonder if this matrix app was just a honeypot that was named to trick people into thinking they were using the “real” matrix.

  • @Zak
    link
    281 month ago

    I’m surprised so many criminals are picking these niche services that haven’t had their security verified by trustworthy third parties. That’s just asking for trouble.

        • d-RLY?
          link
          fedilink
          11 month ago

          Given the massive take down. I think you mean “I wonder who ‘worked’ in the cartel’s IT department.”

    • @[email protected]
      link
      fedilink
      English
      131 month ago

      The allure of the potential for “security through obscurity” is great if you don’t know better.

      • @[email protected]
        link
        fedilink
        31 month ago

        Encryption is really really hard, and avoiding some form of sidechannel attack is much much harder.

        Sure key exchange also isn’t trivial, but I would say that key exchange is significantly easier. Care to elaborate?

    • @CAVOKOP
      link
      41 month ago

      Probably an implementation issue. Make a small error there, like storing parts of a key in memory or something like that and you’ve compromised security.

    • @[email protected]
      link
      fedilink
      11 month ago

      RSA doesn’t scale, so if the message is large then RSA becomes unwieldy. So most encryption methods that make use of RSA actually encrypt the data with a symmetric algorithm, and then just encrypt the key for the symmetric data using the RSA key.

      But there is still way way way too many ways to implement crypto wrong, which can completely compromise the security of it.

  • Chemical Wonka
    link
    fedilink
    English
    -111 month ago

    My undergraduate professor once worked for one of the largest banks in Germany, and she told me clearly that all encryption algorithms exported by the US have a way of being broken. A backdoor in the algorithm? Perhaps

    • JackbyDev
      link
      fedilink
      English
      41 month ago

      When was this? In years past there were weird restrictions about exporting strong encryption algorithms from the US. So much so that Java didn’t have unlimited strength algorithms bundled by default. Depending on the time she said this/she was talking about then it could’ve just been a comment on the weak algorithms being, well, weak.