WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.1K

I never considered Telegram to be safe or private, but it was too convenient for semi-normies to get them to use anything else.

This is what someone recommend, but someone also commented that Session is likely compromised and a honeypot:

Briar "Censorship-resistant peer-to-peer messaging that bypasses centralized servers. Connect via Bluetooth, Wi-Fi or Tor, with privacy built-in."

Session "Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance."

XMPP The original 25 year old open-source instant messaging standard.

Settin up an own Matrix server with Element would also be great, but might be a bit too complicated.

I never considered Telegram to be safe or private, but it was too convenient for semi-normies to get them to use anything else. This is what someone recommend, but someone also commented that Session is likely compromised and a honeypot: >Briar "Censorship-resistant peer-to-peer messaging that bypasses centralized servers. Connect via Bluetooth, Wi-Fi or Tor, with privacy built-in." >Session "Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance." >XMPP The original 25 year old open-source instant messaging standard. Settin up an own Matrix server with Element would also be great, but might be a bit too complicated.

(post is archived)

[–] 7 pts

It does not matter what software you use. The backdoors are baked in at the hardware level. There is no such thing as "private messaging".

[–] 0 pt

explain further. cpus do have some hidden instructions and backdoors, but there are encryptions without backdoors that can't be cracked easily.

[–] 3 pts

Your data gets encrypted via the software. You can use the worlds most advanced encryption and it does not matter because the hardware has access to the raw data you enter into any given software BEFORE it gets encrypted. CPU, GPU, modem/radio, etc.. Chips galore...

Your BT, Wifi, IR, NFC, GPS, Modem, etc. are always enabled regardless of what the on/off toggle on your phone/PC might say.