!vwmBiTqilorqNCbGab:matrix.org

UnifiedPush

1013 Members
website: https://unifiedpush.org/ github: https://github.com/UnifiedPush/ space: https://matrix.to/#/#unifiedpush-space:matrix.org85 Servers

Load older messages


SenderMessageTime
24 Apr 2024
@foretold:matrix.orgforetoldI would like something that doesnt require an account ideally, and its also a learning opportunity for me. 16:24:34
@spaetz:sspaeth.despaetz
In reply to @foretold:matrix.org
Honestly, never heard of livekit
https://docs.livekit.io/realtime/
17:21:34
@spaetz:sspaeth.despaetzit might not be targetting the p2p case too much though, not sure17:22:46
@spaetz:sspaeth.despaetzI just know that the element-call stack uses it.17:23:00
@spaetz:sspaeth.despaetz * I just know that the element-call stack uses it for video calls.17:23:07
@spaetz:sspaeth.despaetz * I just know that the element-call stack uses it for video calls. (but OT in here, so I'll stop)17:23:25
25 Apr 2024
@theimpulson:matrix.org@theimpulson:matrix.org left the room.03:21:25
@michael_seven:matrix.orgmichael_seven joined the room.16:50:04
@michael_seven:matrix.orgmichael_sevenNotifications are sent to the provider using HTTP, so does that mean the network (ISP or VPN, mine or the server's) can read them?17:01:32
@walter.dietrich:matrix.orgwalter.dietrich i guess it depends on the chosen push server... but most of them use https. and secondly - what the user can't really decide - it depends on how the app/service works. for example Element uses an ID or something to just wake up the app and receive & decrypt the actual E2EE message. 17:32:59
@walter.dietrich:matrix.orgwalter.dietrichplease correct me if i got something completely wrong (not so sure about the first part).17:33:36
@walter.dietrich:matrix.orgwalter.dietrich * i guess it depends on the chosen push server... but most of them use https. and secondly - what the user can't really decide - it also depends on how the app/service works. for example Element uses an ID or something to just wake up the app and receive & decrypt the actual E2EE message. 17:34:29
@michael_seven:matrix.orgmichael_sevendiagram.png
Download diagram.png
17:37:11
@michael_seven:matrix.orgmichael_sevenSo what's this HTTP POST thing?17:37:34
@jonasled:jonasled.deJonas LederThe HTTP Post comes from the Server of your Application (e.g. Telegram) to your UnifiedPush Server (e.g. Ntfy.sh)17:45:45
@michael_seven:matrix.orgmichael_sevenI see that, I'm wondering if it can be read by the ISP17:46:37
@walter.dietrich:matrix.orgwalter.dietrich that's the communication from the app server to the push server you have chosen... let it be ntfy, NextPush or even still Google Firebase. - but if you use a FOSS option you can (bit don't have to) run your own server.
this communication uses usually transport encryption via TLS.
17:47:37
@jonasled:jonasled.deJonas LederThe ISP can theoreticall see that there's a HTTP request, but as the communication uses HTTPs it's fully encryptes17:48:07
@walter.dietrich:matrix.orgwalter.dietrich * that's the communication from the app server to the push server you have chosen... let it be ntfy, NextPush or even still Google Firebase. - but if you use a FOSS option you can (but don't have to) run your own server.
this communication uses usually transport encryption via TLS.
17:48:09
@michael_seven:matrix.orgmichael_sevenGreat, thanks17:49:06
@mayeul:mayeul.netMayeulC

A few notes:

  • Your ISP can only intercept the brown vertical arrow in the middle (push provider -> distributor)
    • Usually this is encrypted (depends on the distributor)
  • Other ISPs (the one used by the server of your provider, and the application server, as well as transit ISP) can only see the HTTP post on the top of this diagram
    • Usually this is encrypted
  • Most applications do not send sensitive data via push, it's mostly a "ping", and when there is data, it's generally encrypted (depends on the app)
  • Usually, what your ISP can see and collect is metadata: when your phone receives a notification, and what distributor contacted it. Not its content. If it has more data, it can theoritically correlate this (with the data size and the timings) with what's being sent from the application server, and to other phones. This requires extensive surveillance, and could be used to infer your social groups and apps that you use. This attack is not specific to UnifiedPush though, and could be used against Google Firebase+Whatsapp, for instance (but would be harder to pull of due to the noise of so many other users).

The last point is pretty theoretical, but I think I read something about the NSA asking similar metadata from Google?

17:57:04
@walter.dietrich:matrix.orgwalter.dietrich * i guess it depends on the chosen push server... but most of them use https. and secondly - what the user can't really decide - it also depends on how the app/service works. for example Matrix uses an ID or something to just wake up the app and receive & decrypt the actual E2EE message. 18:06:47
@xeld:matrix.orgxeld joined the room.18:40:05
@xeld:matrix.orgxeld set a profile picture.18:50:20
@xeld:matrix.orgxeld changed their profile picture.18:54:15
@xeld:matrix.orgxeld changed their profile picture.19:00:10
@xeld:matrix.orgxeld changed their profile picture.19:02:41
@xeld:matrix.orgxeld changed their display name from xeld to xld.19:04:04
@xeld:matrix.orgxeld changed their display name from xld to xeld.19:04:36
@houssem:matrix.orgcomodo joined the room.22:23:52

There are no newer messages yet.


Back to Room ListRoom Version: 6