<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote gmail_quote_container"><div dir="ltr" class="gmail_attr">On Fri, Mar 28, 2025 at 5:27 PM Henry Baker <<a href="mailto:hbaker1@pipeline.com">hbaker1@pipeline.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><u></u>
<div>
<p>On 3/28/25 12:55, Kent Borg wrote:</p>
<blockquote type="cite">On
3/28/25 11:59 AM, Ray Dillinger wrote:
<br>
<blockquote type="cite">The thing that pisses me off most about
cell phones is, no matter how secure you personally may have
your own set up, when you set up a supposedly secure chat, if
ANYBODY on the list has accidentally […]
<br>
</blockquote>
<br>
Beyond securing the endpoint devices, securing the endpoint people
is a fundamental problem of any group. </blockquote></div></blockquote><div> ...</div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div>
<p>This is the Los Angeles/Washington DC "Kibu" company whose CEO is
Ari Andersen, not the CT-based "Kibu" which is aimed at
disabilities.<br></p></div></blockquote><div>... </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div><p>
</p>
<p>Kibu pods are end-to-end encrypted spaces for private, secure
collaboration between verified members. Members can protect
confidential workflows, assets, and communication, ***knowing
exactly who is on the other end***.</p></div></blockquote><div> </div><div>The only way they can do this is to exactly know the ID of all. That makes them the weak point of trust.<br>Years ago key exchange for PGP and the like was "In person" and It did not work with groups. <br><br>Phones are promiscuous and not a secure endpoint. Even if phone A is secure phone B can image the screen of A.<br>This is why all gadgets are checked Outside the secure space of a secure facility.<br><br>There is more security with the next episode of White Lotus than the members of this Group Chat exhibited. <br>Some reviewers do get early access but do not break trust.<br><br>It is possible this group expects secrets be marked as secret which is also naive.<br><br>Even 24 hours after the attack the plan has secrets that are critical. Time of flight order or attack and time between attack<br>waves to avoid friendly fire are hidden in the plan shared on Signal and validated in detail by ground observations. Coaches<br>know to watch for offense and defense from scouting reports and alter their play accordingly.<br><br>Recall the then NEW radar on Hawaii saw the attack. The report was dismissed because friendly traffic was expected and radar "new".<br>Had the navy and air core known two hours in advance that an attack was coming the outcome could have been very different.<br><br>The silly BUT DANGEROUS ax throwing event tells me weapons are not understood by too many,<br><br><br></div><div><br></div><div><br></div></div><div><br clear="all"></div><div><br></div><span class="gmail_signature_prefix">-- </span><br><div dir="ltr" class="gmail_signature"><div dir="ltr"> T o m M i t c h e l l (on NiftyEgg[.]com )</div></div></div>