they say: “incomprehension tends to be as mutual as love should be”
The Intercept’s censors/”moderators”/”thought police” collaborators/ … have even let me know my comments are being automatically placed in the “moderation queue” at time for more than two days and some have been even removed. They don’t say specifically why. As you may have noticed, as emotional as I may get, I am never ad hominem and all I say I back either by facts or easily falsifiable statements. Ironically this is what they criticize of other “responsible” Western MSM outlets.
Micah Lee -> James: March 8 2017, 8:56 p.m.
Signal doesn’t store the private key in the Apple Keychain, and it has no chance of ever getting synced to iCloud. Also, all Signal data (including your database of messages) are excluded from iOS backups, which means your plaintext messages also have no chance of ever getting synced to iCloud.
Here is the source code: https://github.com/WhisperSystems/Signal-iOS
And here’s a Signal for iOS FAQ: https://github.com/WhisperSystems/Signal-iOS/wiki/FAQ
I wonder why Lee continues entertaining and propagating falsehoods and fallacies.
He certainly does or should know that the “Apple Keychain” and a message “not having a chance of ever getting synced to iCloud” doesn’t make an effing difference if they can intercept a message before it is encrypted and after it is decrypted anyway. They can get right into your BIOS! I really don’t get his point. Could he possibly mean he expects for people to already encrypt the words coming out of their mouths and into their ears?
Notice the unhappy, half @ssed analogy of that Nicholas Weaver, a computer security expert from the International Computer Science Institute cited by wired magazine. As if the “intelligence” agencies give an eff about “breaking into the anyone’s @ss and hiding in their underwear!” They do that for fun and profit, for Christ’s sake! When I notice technical people having to use movies for their metaphors I know what is going on is more “persuasion” than reality.
According to WikiLeaks, once an Android smartphone is penetrated the agency can collect “audio and message traffic before encryption is applied”. Some of the agency’s software is reportedly able to gain access to messages sent by instant messaging services. This method of accessing messages differs from obtaining access by decrypting an already encrypted message, which has not yet been reported. While the encryption of messengers that offer end-to-end encryption, such as Telegram, WhatsApp and Signal, wasn’t reported to be cracked, their encryption can be bypassed by capturing input before their encryption is applied, by methods such as keylogging and recording the touch input from the user.
 WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents
In one revelation that may especially trouble the tech world if confirmed, WikiLeaks said that the C.I.A. and allied intelligence services have managed to compromise both Apple and Android smartphones, allowing their officers to bypass the encryption on popular services such as Signal, WhatsApp and Telegram. According to WikiLeaks, government hackers can penetrate smartphones and collect “audio and message traffic before encryption is applied.”
 Don’t Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps
“If you compromise a target’s phone, you don’t care about encryption anymore.”
That makes saying the CIA can “bypass” encryption apps like WhatsApp akin to saying Jimmy Stewart could have bypassed his neighbor’s blinds in Rear Window by breaking into the guy’s house and hiding in his closet. Sure, that’s one way to do it. But it doesn’t make the blinds any less effective.
// __ The Young Turks: WikiLeaks – The CIA Bugs Everyone’s Phones, TVs, Cars…
“… they are bypassing encryption altogether anyway …”
the one surveillance technology I haven’t heard of and I would bet one of my balls exists is the automatic lip-syncing of people while talking and the lip 2 texting it, using the so many cameras everywhere. I know they are past facial recognition.