• @[email protected]
      link
      fedilink
      852 months ago

      Wish OP had written that in post… I nearly got a heart attack and was wondering how TF they done that 🤣

      • @CAVOKOP
        link
        212 months ago

        I don’t change the headline generally, but I also didn’t catch that it wasn’t “the real” matrix.

      • @[email protected]
        link
        fedilink
        English
        102 months ago

        Since France uses matrix themselves, they could’ve simply shut their own server down 😛 Which would be horrible of course …

    • UnfortunateShort
      link
      412 months ago

      I would love to call the headline clickbaity bs, but it’s technically accurate and somehow this makes it worse and better at the same time.

    • @SmoothIsFast
      link
      12 months ago

      It’s it different from the matrix Neo lives in too?

    • veee
      link
      fedilink
      English
      212 months ago

      I just listened to the Search Engine podcast episode covering ANOM last night! Completely wild the reach of this program entailed.

      Link to the episode for those that are interested.

        • veee
          link
          fedilink
          English
          12 months ago

          I’ll check it out. I don’t normally tune in, but they have a good show.

      • d-RLY?
        link
        fedilink
        42 months ago

        More than likely would mass post “Knock knock…” and wait for the first “who’s there?” reply.

  • @[email protected]
    link
    fedilink
    English
    65
    edit-2
    2 months ago

    The investigation did not spotlight the similarly-named Matrix open source communication protocol.

    Feel like there are going to be a lot of confused Lemmy users who won’t read more than the title.

    • ⓝⓞ🅞🅝🅔
      link
      fedilink
      52 months ago

      Well goodness. I read the article, fortunately, but it’s good to see other people pointing out here.

      My initial thought was that this was the matrix we obviously care about. I didn’t look at the details to see if these people are truly nefarious and do belong in jail, which I’m okay with, but it was definitely troubling to imagine that something I thought secure wasn’t secure. 😬

  • @[email protected]
    link
    fedilink
    522 months ago

    The investigation did not spotlight the similarly-named Matrix open source communication protocol.

    huh

    • @[email protected]
      link
      fedilink
      82 months ago

      I like the full quote better:

      Dutch police said the Matrix app was targeted along with similar encrypted services known by the names Mactrix, Totalsex, X-quantum and Q-Safe. The investigation did not spotlight the similarly-named Matrix open source communication protocol.

      Absolute dupe-magnets.

  • @[email protected]
    link
    fedilink
    English
    442 months ago

    I wonder if this matrix app was just a honeypot that was named to trick people into thinking they were using the “real” matrix.

  • @Zak
    link
    282 months ago

    I’m surprised so many criminals are picking these niche services that haven’t had their security verified by trustworthy third parties. That’s just asking for trouble.

        • d-RLY?
          link
          fedilink
          12 months ago

          Given the massive take down. I think you mean “I wonder who ‘worked’ in the cartel’s IT department.”

    • @[email protected]
      link
      fedilink
      English
      132 months ago

      The allure of the potential for “security through obscurity” is great if you don’t know better.

      • @[email protected]
        link
        fedilink
        32 months ago

        Encryption is really really hard, and avoiding some form of sidechannel attack is much much harder.

        Sure key exchange also isn’t trivial, but I would say that key exchange is significantly easier. Care to elaborate?

      • irelephant 🍭
        link
        fedilink
        22 months ago

        The real matrix’s key exchange is pretty headacheless, is there any downsides to it?

    • @CAVOKOP
      link
      42 months ago

      Probably an implementation issue. Make a small error there, like storing parts of a key in memory or something like that and you’ve compromised security.

    • @[email protected]
      link
      fedilink
      12 months ago

      RSA doesn’t scale, so if the message is large then RSA becomes unwieldy. So most encryption methods that make use of RSA actually encrypt the data with a symmetric algorithm, and then just encrypt the key for the symmetric data using the RSA key.

      But there is still way way way too many ways to implement crypto wrong, which can completely compromise the security of it.

  • Chemical Wonka
    link
    fedilink
    English
    -112 months ago

    My undergraduate professor once worked for one of the largest banks in Germany, and she told me clearly that all encryption algorithms exported by the US have a way of being broken. A backdoor in the algorithm? Perhaps

    • JackbyDev
      link
      fedilink
      English
      42 months ago

      When was this? In years past there were weird restrictions about exporting strong encryption algorithms from the US. So much so that Java didn’t have unlimited strength algorithms bundled by default. Depending on the time she said this/she was talking about then it could’ve just been a comment on the weak algorithms being, well, weak.