Yeah, this smells to high heaven. Smells like advertising.
Let me tell you how the world really works, if you make an unhackable E2E messaging app.
If you build an app with a new E2E strong algo, not using the standard hash and encryption algo (and their stock libraries), you will get a personal visit from CIA/GCHQ.
They will promptly give you two options
Full access to source code, incl. the encryption algos
OR
Cease and desist order that takes your company into immediate bankruptcy and you into legal proceedings.
I know a guy, who knows a guy, who knows a guy.... exactly this scenario happened.
And, the same happened to the Lavabit and many others that never got the headlines.
NSA/NRO have basically backdoors in almost all standard libs and algos. For sure everything in WA, FB, TG, Signal, SC and the rest of the big 7.
If you go to any of the more quantum proof algos not yet standardized, and you start go gain an audience, then you get the visit.
BTW, there is no info on converso site about the algos they use for encryption.
This is the brand my local area uses. They regularly sanitize the internet, but they have a YouTube channel. And the people that make a living promoting that brand give the details they've removed from their site. But, I was able to find the product on ebay. If you scroll the name on ebay, you'll see anyone has access to this equipment.
From persona experience, that software turns your cellular device into a bug. It is set to connect to any Bluetooth device in radius, and send audio back to the LEO that put the malware on the device. I have three pics I took with this phone of the malware on my old phone,
Edit : that phone went in the freezer until my appointment with my attorney. However, when I used the Bluetooth on this phone just to see, I was close to my neighbors Google home, Alexa, kodi, apple home. All of those people would have had their privacy invaded if I wasn't aware of what was done to my cell.
So how could someone who does that for a living make an error that bad? You call it advertising, I call it fake.
Instead of checking his bag or frisking his person, authorities demanded Haas give them access to his phone and computer so they could examine them out of sight “in the back.”
Less than two weeks prior, Haas had launched a new messaging app, Converso, which is currently available on Apple and Android devices. (You can download it here.)
Think WhatsApp or Signal except, unlike those apps, Converso actually protects your data from being sold to third parties or even accessed via federal subpoenas.
Whereas other encrypted messaging apps store all user conversations on external servers that can be accessed after the fact, all conversations on Converso (including calls) are only managed on users’ devices and are never uploaded onto a server.
Yeah, this smells to high heaven. Smells like advertising.
Let me tell you how the world really works, if you make an unhackable E2E messaging app.
If you build an app with a new E2E strong algo, not using the standard hash and encryption algo (and their stock libraries), you will get a personal visit from CIA/GCHQ.
They will promptly give you two options
OR
I know a guy, who knows a guy, who knows a guy.... exactly this scenario happened.
And, the same happened to the Lavabit and many others that never got the headlines.
NSA/NRO have basically backdoors in almost all standard libs and algos. For sure everything in WA, FB, TG, Signal, SC and the rest of the big 7.
If you go to any of the more quantum proof algos not yet standardized, and you start go gain an audience, then you get the visit.
BTW, there is no info on converso site about the algos they use for encryption.
This is the brand my local area uses. They regularly sanitize the internet, but they have a YouTube channel. And the people that make a living promoting that brand give the details they've removed from their site. But, I was able to find the product on ebay. If you scroll the name on ebay, you'll see anyone has access to this equipment.
https://cellebrite.com/en/services/
https://www.iltanet.org/blogs/russ-capps/2017/10/17/cellebrite-extraction-reports-frequently-asked-questions
https://www.ebay.com/itm/165706819131?mkcid=16&mkevt=1&mkrid=711-127632-2357-0&ssspo=ynEPI-fxTci&sssrc=2349624&ssuid=EpdC3InRQuC&var=&widget_ver=artemis&media=COPY
From persona experience, that software turns your cellular device into a bug. It is set to connect to any Bluetooth device in radius, and send audio back to the LEO that put the malware on the device. I have three pics I took with this phone of the malware on my old phone,
https://files.catbox.moe/6oqmaj.png
https://files.catbox.moe/mky9m2.JPG
https://files.catbox.moe/txoh3q.JPG
Edit : that phone went in the freezer until my appointment with my attorney. However, when I used the Bluetooth on this phone just to see, I was close to my neighbors Google home, Alexa, kodi, apple home. All of those people would have had their privacy invaded if I wasn't aware of what was done to my cell.
So how could someone who does that for a living make an error that bad? You call it advertising, I call it fake.
Plot of this movie
https://archive.org/details/pi-1998_202107
https://www.westernjournal.com/man-creates-messaging-app-fbi-cant-crack-anyone-can-download-stopped-airport-days-later/?utm_source=RSSfeed&utm_medium=RSSfeed&utm_campaign=RSSfeed&utm_content=2023-04-15
It's really bad marketing! It's basically open-source now. I wouldn't trust it. And, it's an issue the creator didn't know 2023 SOP IP security.
All you guys "oh, this smells like advertising". Really. You know, you could have actually read the article you know, just to mix things up a bit:
Very first line:
Smells like advertising, huh?
It's bad advertising. It's anti advertising.
A very bad ad. An anti ad.