The Crime Messenger

Criminal use of encryption

  • Many argue criminals will increasingly adopt strong encryption, but others note most criminals are unsophisticated and still use insecure channels (GSM, unencrypted apps).
  • Even with perfect crypto, classic methods (infiltration, flipping lower-level members, physical surveillance) still work.
  • Large criminal groups or chats (hundreds–thousands of people) are seen as inherently vulnerable to infiltration, regardless of E2E.

Why criminals used niche “secure” phones instead of Signal

  • Several commenters are surprised criminals chose bespoke “secure” systems rather than mature tools like Signal.
  • Explanations offered: marketing/pitch decks targeted at criminals, desire for fully locked‑down devices, and overconfidence in proprietary systems.
  • Some note Signal’s phone-number requirement is a deterrent; others suggest that you don’t hear about criminals who successfully used mainstream E2E apps.

How Sky ECC and similar systems were compromised

  • The article and linked sources are described as vague; unclear whether crypto was truly broken or if endpoints/servers were compromised.
  • Hypotheses discussed: fake apps, modified devices, server probes, or misuse of “E2E” as just HTTPS.
  • Bespoke, secret protocols designed by non‑cryptographers are heavily criticized; “don’t roll your own crypto” is a recurring theme.
  • There is interest in a technical post‑mortem; some suspect weaknesses in app design rather than fundamental cryptanalysis.

Law enforcement, privacy, and rights

  • Strong backlash to official statements that “privacy is important, but encryption enables crime.”
  • One side argues that universal strong encryption hampers ordinary police work and changes the game.
  • Others counter that law enforcement has more data than ever (metadata, tracking, etc.), and calls for backdoors are about power, not necessity.
  • Debate over tools marketed mainly to criminals: some see that as abetting crime, others stress dual‑use and worry about mass interception of innocent users’ traffic.
  • Concern is raised about cross‑border cooperation used to sidestep domestic legal limits.

Infrastructure providers and trust

  • OVH is discussed as a weak link: alleged hidden SSH backdoor, past cooperation with law enforcement, and multiple high‑profile takedowns involving servers hosted there.
  • Commenters highlight the gap between marketing claims of privacy and behind‑the‑scenes access or cooperation.

Broader reflections

  • Some note the irony that criminals might have been safer on stock iPhones with mainstream E2E apps than on “secure” custom phones.
  • References are made to talks, podcasts, and books about AN0M and related operations, reflecting strong interest but also skepticism toward official narratives.