Communications security in about trying to prevent unwanted persons from listening, intercepting, triangulating and other techniques understand what, who and where you are communications to and from.
More and more apps are coming out alleging they can provide you ‘secure’ communications. However, can you really trust they are secure? How do you know they don’t have a flaw that hackers can use to ‘see’ all your messages? How do you know they aren’t ‘in bed’ with someone and have a ‘back door’ to allow someone to access all your information? After all, a ‘invulnerable’ program is just an invite to hackers to break in.
Signal, one of the most popular ‘secure’ apps has been revealed that it is compromised, it appears by design.
The only ‘real’ solution you can trust is one you control end-to-end. A process of encryption where the ‘key’ that is used to encrypt your message is generated by you, only share on a ‘need-to-know’ basis and then only used once. If a key is used more than once it becomes vulnerable. While it may not be convenient to create a new key each time you want to send a message it is the only way to be 100% sure that your message remains known only to you and the recipient.
As this sections gets expanded we will address techniques to try and prevent unwanted people from intercepting your communications.
However, it should be noted that on radio frequencies available to the public under normal circumstances it is illegal to encrypt, use codes or any other means to high the meaning of your messages. The techniques discussed are for educational purposes.
A much more in-depth discussion for Patrons