jimi_henrik@lemmy.worldtoPrivacy@lemmy.ml•U.K. orders Apple to let it spy on users’ encrypted accounts
2·
3 hours agoI suspect it’s the latter one. The book titled “The Hacker and the State” goes into detail about how it can be done (or may have been done in the past). A fascinating read for anyone interested in the subject.
I agree with using open source software, but the source code of said chat apps is just one part of the equation.
AFAIK cryptography implementation relies on the operating system / firmware the app is running on (they tend to be closed source). Most implementations rely on random generators provided be the operating system. Doesn’t really matter how good the encryption implementation is in the chat app if the software it relies on is compromised - see book I recommended above (The hacker and the state).