Three Avenues Of Approach: Baofeng’s BF-R3

As I tell students in the the RTO and Signals Intelligence Courses, its not necessarily what can be monitored (everything has the capacity to be monitored) but rather, how your adversary can exploit it. This in turn points to the criticality of the ability to plan and act based on that plan. And often enough, …

Continue reading Three Avenues Of Approach: Baofeng’s BF-R3

Security Chart of Messaging Apps

IntelTechniquesSecureE2EE CommsComparisonBeta v. 0.1October 2020                                            MessagingConfideDustJitsiiMessageMatrix/ElementSessionSignalSudoTelegramThreemaWhatsAppWickrWireNotes          E2EE Messaging (In-Network)YESYESYESYESOPTIONALYESYESYESYESYESPARTIAL*YESYES*Whatsapp cloud (Google) backups are not E2EE          Country of OwnershipUSAUSAUSAUSAUKAustraliaUSAUSAUAESwitzerlandUSAUSAUSAMany other cloud backups (Google, iCloud, etc) may not be E2EE          14-Eyes AssociationYESYESYESYESYESYESYESYESNONOYESYESYES           Open SourceNONOYESNOYESYESYESNOYESPARTIALNOPARTIALYES           3rd-Party MetadataYESYESYESYESNONONONOYESNOYESYESNO           3rd-Party AnalyticsYESYESYESYESNONONONOYESNOYESYESNO           FundingVariousMark Cuban8x8AppleMatrix/ElementLokiSignalAnonyome LabsVariousThreemaFacebookVariousWire           Registration RequirementsNoneEmailNonePhone/EmailNoneNonePhoneNonePhonePaymentPhoneNoneEmail           Device Contact AccessOptionalYESNOYESNONOYESOptionalYESNOOptionalOptionalNO           Message Control Across DevicesYESYESYESNOYESNONOYESYESNOYESYESYES           Ephemeral MessagesYESYESYESNONOYESYESYESYESYESYESYESYES           User ID FormatMember IDEmailNamePhone/EmailUsernameUsernamePhonePhonePhoneUsernamePhoneUsernameUsername           Free Version AvailableYESYESYESYESYESYESYESYESYESNOYESYESYES           Desktop/Browser AvailabilityYESNOYESYESYESYESYESYESYESYESYESYESYES           Third-Party AuditYESNONONONOIn ProgressYESNon-PublicNOYESNONon-PublicYES                                    EmailCTemplarDiscreetMailboxPosteoProtonmailTutanotaSudo                 E2EE (In-Network)YESYESYESYESYESYESYES                 E2EE (Non-Network)YESNOYESYESYESYESNO                 Country of OwnershipIcelandCzech RepublicGermanyGermanySwitzerlandGermanyUSA                 14-Eyes AssociationNONOYESYESNOYESYES                 Open SourceYESNOYESYESYESYESNO                 3rd-Party MetadataNONOYESNONONONO                 3rd-Party AnalyticsNONOYESNONONONO                 FundingSelf …

Continue reading Security Chart of Messaging Apps

One Hundred and Fifty Questions to a Guerrilla

General Alberto Bayo’s classic should be considered a must-read by anyone interested in small unit warfare and is the first post in a series on perspectives covering the last century into the present. A basic read on guerrilla warfare, “One Hundred and Fifty Questions To A Guerrilla” is a well thought out and realistic plan …

Continue reading One Hundred and Fifty Questions to a Guerrilla

Radio Contra Episode 33

Radio Contra Episode 33: I cover a question from a reader concerning the practicality of clandestine communications devices that I described in Episode 31 and my fighting carbine setup. Brushbeater Training Calendar Amazon Affiliate Link