You're the one with warped perceptions, bias, lack of experience, and lack of threat modelling.
-
-
Replying to @CopperheadOS
Attacker breaking into home/office & successfully tampering w/phys tamper-resistent server != normal person's threat model.
2 replies 0 retweets 0 likes -
Replying to @RichFelker @CopperheadOS
Device seizure at border or traffic stop & browser-sandbox-escape drive-by malware OTOH are in normal person's threat model.
1 reply 0 retweets 0 likes -
-
Replying to @CopperheadOS
Seizure is completely mitigated by having no data on the device.
2 replies 0 retweets 0 likes -
Replying to @RichFelker
No it isn't. The device has access to the data on the server. The server clearly exists too.
1 reply 0 retweets 0 likes -
Replying to @CopperheadOS
No it doesn't. Input side of session is closed as soon as screen locks.
1 reply 0 retweets 0 likes -
Replying to @RichFelker
So the user can't receive a notification that they've received a call or a message? And they type server addr each time?
2 replies 0 retweets 0 likes -
Replying to @CopperheadOS
One-way channel for ring/vibrate commands is kept open. To regain full access, have to auth.
1 reply 0 retweets 0 likes -
Replying to @RichFelker
So the phone is even still connected to the server. It's clear it exists. It's not deniable at all.
2 replies 0 retweets 0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.