Yeah, this smells to high heaven. Smells like advertising.
Let me tell you how the world really works, if you make an unhackable E2E messaging app.
If you build an app with a new E2E strong algo, not using the standard hash and encryption algo (and their stock libraries), you will get a personal visit from CIA/GCHQ.
They will promptly give you two options
Full access to source code, incl. the encryption algos
OR
Cease and desist order that takes your company into immediate bankruptcy and you into legal proceedings.
I know a guy, who knows a guy, who knows a guy.... exactly this scenario happened.
And, the same happened to the Lavabit and many others that never got the headlines.
NSA/NRO have basically backdoors in almost all standard libs and algos. For sure everything in WA, FB, TG, Signal, SC and the rest of the big 7.
If you go to any of the more quantum proof algos not yet standardized, and you start go gain an audience, then you get the visit.
BTW, there is no info on converso site about the algos they use for encryption.
This is the brand my local area uses. They regularly sanitize the internet, but they have a YouTube channel. And the people that make a living promoting that brand give the details they've removed from their site. But, I was able to find the product on ebay. If you scroll the name on ebay, you'll see anyone has access to this equipment.
From persona experience, that software turns your cellular device into a bug. It is set to connect to any Bluetooth device in radius, and send audio back to the LEO that put the malware on the device. I have three pics I took with this phone of the malware on my old phone,
Edit : that phone went in the freezer until my appointment with my attorney. However, when I used the Bluetooth on this phone just to see, I was close to my neighbors Google home, Alexa, kodi, apple home. All of those people would have had their privacy invaded if I wasn't aware of what was done to my cell.
So how could someone who does that for a living make an error that bad? You call it advertising, I call it fake.
Yeah, this smells to high heaven. Smells like advertising.
Let me tell you how the world really works, if you make an unhackable E2E messaging app.
If you build an app with a new E2E strong algo, not using the standard hash and encryption algo (and their stock libraries), you will get a personal visit from CIA/GCHQ.
They will promptly give you two options
OR
I know a guy, who knows a guy, who knows a guy.... exactly this scenario happened.
And, the same happened to the Lavabit and many others that never got the headlines.
NSA/NRO have basically backdoors in almost all standard libs and algos. For sure everything in WA, FB, TG, Signal, SC and the rest of the big 7.
If you go to any of the more quantum proof algos not yet standardized, and you start go gain an audience, then you get the visit.
BTW, there is no info on converso site about the algos they use for encryption.
This is the brand my local area uses. They regularly sanitize the internet, but they have a YouTube channel. And the people that make a living promoting that brand give the details they've removed from their site. But, I was able to find the product on ebay. If you scroll the name on ebay, you'll see anyone has access to this equipment.
https://cellebrite.com/en/services/
https://www.iltanet.org/blogs/russ-capps/2017/10/17/cellebrite-extraction-reports-frequently-asked-questions
https://www.ebay.com/itm/165706819131?mkcid=16&mkevt=1&mkrid=711-127632-2357-0&ssspo=ynEPI-fxTci&sssrc=2349624&ssuid=EpdC3InRQuC&var=&widget_ver=artemis&media=COPY
From persona experience, that software turns your cellular device into a bug. It is set to connect to any Bluetooth device in radius, and send audio back to the LEO that put the malware on the device. I have three pics I took with this phone of the malware on my old phone,
https://files.catbox.moe/6oqmaj.png
https://files.catbox.moe/mky9m2.JPG
https://files.catbox.moe/txoh3q.JPG
Edit : that phone went in the freezer until my appointment with my attorney. However, when I used the Bluetooth on this phone just to see, I was close to my neighbors Google home, Alexa, kodi, apple home. All of those people would have had their privacy invaded if I wasn't aware of what was done to my cell.
So how could someone who does that for a living make an error that bad? You call it advertising, I call it fake.
Plot of this movie
https://archive.org/details/pi-1998_202107