this post was submitted on 03 Oct 2025
188 points (100.0% liked)
Privacy
42260 readers
808 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Custom roms is your best bed at that point. I do use GOS already.
It's great as long as you can guarantee that the person you're communicating on the receiving side does the same. Otherwise it's useless as your messages will be read on the receiving device. In practice it will make private communication extremely cumbersome and niche.
Also, the authorities can backdoor your custom ROM device at will, when seized.
I mean I don't see them back dooring GOS anytime soon. But your right both ends need to have a custom ROM.
Steganography. There’s more than one way to protect your communication.
And encryption in transit is better than no encryption at all (assuming the baddies don’t already have full access to your phone data).
That's the whole point of Chat Control 2.0
Not quite; Chat Control hearkens back to Apple’s doomed attempt at on-device CSAM filtering - the idea is that on-device images and message contents would be scanned for known hashes. This means a nation state could go fishing on devices for known content, but it wouldn’t allow them to indiscriminately sift through all the content at rest — they’d have to know what they were looking for.
That’s where the steganography comes in, because the hash based approach will fail if the content they’re looking for is obscured in some manner.
Didn't know they come with sleeping facilities. They're so versatile nowadays! SCNR
😅🤣