Signal Is More Than Encrypted Messaging. Under Meredith Whittaker, It’s Out to Prove Surveillance Capitalism Wrong (www.wired.com)
from minnix@lemux.minnix.dev to privacy@lemmy.ml on 28 Aug 19:20
https://lemux.minnix.dev/post/477143

ghostarchive.org/archive/0QgXq

#privacy

threaded - newest

yogthos@lemmy.ml on 28 Aug 19:49 next collapse

Yeah, Signal is more than encrypted messaging it’s a metadata harvesting platform. It collects phone numbers of its users, which can be used to identify people making it a data collection tool that resides on a central server in the US. By cross-referencing these identities with data from other companies like Google or Meta, the government can create a comprehensive picture of people’s connections and affiliations.

This allows identifying people of interest and building detailed graphs of their relationships. Signal may seem like an innocuous messaging app on the surface, but it cold easily play a crucial role in government data collection efforts.

Also worth of note that it was originally funded by CIA cutout Open Technology Fund, part of Radio Free Asia. Its Chairwoman is Katherine Maher, who worked for NDI/NED: regime-change groups, and a member of Atlantic Council, WEF, US State Department Foreign Affairs Policy Board etc.

sunzu2@thebrainbin.org on 28 Aug 20:04 next collapse

Cross referenced you on the sister thread.

People there positing that this is no correct. Granted their info appears to be signal "disclosed" to the feds as part of a court proceed what it collects, which is only apparently when you connect to the server.

Doesnt answer the issue if they could collect your call logs though

yogthos@lemmy.ml on 28 Aug 20:11 collapse

My reply from the other thread. People who claim this isn’t true aren’t being honest. The phone number is the key metadata. Meanwhile, nobody outside the people who are actually operating the server knows what it’s doing and what data it retains. Faith based approach to privacy is fundamentally wrong. Any data that the protocol leaks has to be assumed to be available to adversaries.

Furthermore, companies can’t disclose if they are sharing data under warrant. This is why the whole concept of warrant canary exists. Last I checked Signal does not have one.

en.wikipedia.org/wiki/Warrant_canary

mukt@lemmy.ml on 28 Aug 20:20 next collapse

phone number isn’t just any metadata; it is the anchoring data around which the rest of metadata is collected, and it is also connected to govt/corporate verified real identity.

why would anyone even claim to offer privacy around such an anchor ?

yogthos@lemmy.ml on 28 Aug 20:24 collapse

Exactly, especially when we’re talking about the US government that has access to all the data from other large US based media companies like Google and Meta. We know this for a fact thanks to Snowden leaks. Once you have a phone number, you know the identity of the person, and you can trivially cross reference all the other data to see if that person is of interest. And thanks to their Signal connection graph, the government can easily tell what other people they communicate privately with.

zingo@sh.itjust.works on 28 Aug 22:55 collapse

And thanks to their Signal connection graph, the government can easily tell what other people they communicate privately with.

So what? I’m sure your neighbor couple talk privately to each other most of the time and you know that happens. The important part is that the conversation is private.

Signal is not an anonymous messenger app. It never claimed to be. It’s for you to have a private conversation where your device holds the encryption keys.

Not like WhatsApp, where Meta has access to the keys of all conversations. Also 95 % of the worlds population is on WhatsApp, so why don’t you go and complain to them for lack of privacy and security?

If you want an “anonymous” chat client they are out there to use. Good luck getting more people onboard other than your savy friend.

yogthos@lemmy.ml on 28 Aug 22:59 next collapse

If you understand that this information is being leaked, and that’s not part of your threat profile that’s perfectly fine. The problem is that a lot of people don’t seem to understand the implications of Signal harvesting phone numbers, and therefore make bad assumptions regarding the safety of using Signal. It’s pretty clear that a lot of people aren’t conscious about this in this very thread in fact.

sunzu2@thebrainbin.org on 28 Aug 23:28 collapse

yes most people seem oblivious what mass bulk data collection can do.

and nobody has yet to answer, if there is something to stop Signal from collecting metadata logs of its users and their groups.

it does not seem people understand this risk.

either way, nobody produced a reasonable position on this. so presumption is that signal can farm this data and sell/give it out. since best we got is Signal's responses to US courts which would also be subject to the same conditions if national security type people got involved.

yogthos@lemmy.ml on 28 Aug 23:34 collapse

Wire uses Signal protocol and doesn’t harvest phone numbers, so I’m pretty sure we do actually know what the answer is. The fact that Signal made this design choice is very concerning to anybody who understand the implications of doing that.

sunzu2@thebrainbin.org on 28 Aug 23:41 collapse

i don' disagree with the thesis and i think the best we will get is not answer that tan effectively rebuke the position.

stupid AI said that server would know who start the connection but not back and forth. connection is static and is reset, so presumably longer convos would involve several timestamps.

I am not sure if signal would know who the recipient but that's the logical next conclusion.

mukt@lemmy.ml on 30 Aug 02:48 collapse

Signal’s use case is “authentic communication”. like when a govt person interacts with other govt person and doesn’t want a second govt to snoop on the actual contents on the communication, but accepts that metadata is public.

It is whatsapp for such people, without being whatsapp.

But then why would you use whatsapp either ?

cowpattycrusader@thelemmy.club on 28 Aug 20:22 next collapse

This is really interesting. It brings two questions to mind.

  1. Don’t all messaging apps use phone number as a primary metadata value?

  2. Are you suggesting that Signal could either not use this metadata or not collect it and yet they choose to collect it and can therefore lose it to exfiltration or warrant?

yogthos@lemmy.ml on 28 Aug 20:35 collapse
  1. Nope, for example Wire is based on Signal protocol and doesn’t harvest phone numbers wire.com/en
  2. I’m suggesting that if metadata is being leaked then it has to be assumed that it will be used nefariously at some point

Exact same argument that applies for wanting e2e encrypted messages that aren’t seen by the server also applies to any metadata associated with these messages.

davel@lemmy.ml on 28 Aug 20:36 collapse

JWZ seven years ago: Signal

<img alt="" src="https://lemmy.ml/pictrs/image/10337cb8-7b89-4134-ab75-5adf265c9ba2.png">

When you install Signal, it asks for access to your contacts, and says very proudly, “we don’t upload your contacts, it all stays on your phone.”

And then it spams all of your contacts who have Signal installed, without asking your first.

And it shares your phone number with everyone in your contacts who has Signal installed.

And then when you scream ARE YOU FUCKING KIDDING ME and delete your account and purge the app, guess what? All those people running Signal still have your phone number displayed for them right there in plain text. Deleting your account does not delete the information that the app shared without your permission.

So yeah. Real nice “privacy” app you’ve got there.

Update, 2018: Subsequently.

yogthos@lemmy.ml on 28 Aug 21:05 next collapse

Wow didn’t even know about that, what a shit show. It’s so weird how Signal has become a sacred cow in the west now, and you can’t have a rational discussion about its many problems without a whole bunch of trolls piling on saying you should just put faith in Signal unconditionally.

sunzu2@thebrainbin.org on 28 Aug 23:31 collapse

It is a decent app, it does what it says. Daddy can't read your shit until quantum break encryption.

Real question is whether it is a honeypot to make edgelords feelz good. Strong allegation, no doubt but we are also in the grey zone it seems. Based on that, you have to assume, they are farming the info at least to the security apparatus.

yogthos@lemmy.ml on 29 Aug 01:22 collapse

That’s my view as well, the only way to know that data isn’t being used for adversarial purposes is not to share it in the first place. I think it’s fine to use Signal as long as it’s an informed choice. The primary issue I have is that people don’t seem to want to accept that Signal collects phone numbers and that this could be used in a nefarious way. It seems to be an ideological stance as opposed to a rational one.

Wistful@discuss.tchncs.de on 29 Aug 04:03 collapse

The app (locally, on your device) checks if someone from your contact list installed (became available) on Signal, and if they did, you get notified by the app.

 

And it shares your phone number with everyone in your contacts who has Signal installed.

Someone can get notified only if they already have you in their contact list (so they already have your phone number), and have Signal installed.

 


I still wish you could choose if you want others to be notified tho…

davel@lemmy.ml on 28 Aug 20:05 next collapse
Pherenike@lemmy.ml on 28 Aug 20:22 next collapse

I use the Molly-FOSS fork, do you know if that removes the metadata collection? I know it doesn’t use any Google Play Services and it comes with its own notification bubble though.

yogthos@lemmy.ml on 28 Aug 20:38 next collapse

It doesn’t because you’re still talking to the same server.

Pherenike@lemmy.ml on 28 Aug 21:06 collapse

I see. Thanks.

akilou@sh.itjust.works on 28 Aug 20:39 next collapse

Signal does not collect metadata.

signal.org/blog/sealed-sender/

yogthos@lemmy.ml on 28 Aug 21:14 next collapse

that amounts to trust me bro since nobody actually knows what the server does with the data

Max_P@lemmy.max-p.me on 28 Aug 22:14 next collapse

You don’t have to trust the server and shouldn’t have to trust the server if the client is doing proper E2E because you know the maximum amount of metadata it’s got.

yogthos@lemmy.ml on 28 Aug 22:17 collapse

Your phone number is the metadata that’s not encrypted, that’s literally the whole problem here. Signal server is able to harvest graphs of phone numbers that interact with one another.

notabot@lemm.ee on 28 Aug 22:40 next collapse

With ‘sealed sender’ your phone number, or any other identifying information, is not included in the metadata on the envelope, only the recipient’s id is visible, and it’s up to the recipient’s client to validate the sender information that is inside the encrypted envelope. It looks like a step in the right direction, though I don’t use signal enough to have looked into auditing it myself.

yogthos@lemmy.ml on 28 Aug 23:03 next collapse

I’m talking about the information the server has. The encrypted envelope has nothing to do with that. Your register with the server using your phone number, that’s a unique identifier for your account. When you send messages to other people via the server it knows what accounts you’re talking to and what their phone numbers are.

notabot@lemm.ee on 28 Aug 23:32 collapse

Whilst I absolutely agree it’s correct to be skeptical about it, the ‘sealed sender’ process means they don’t actually know which account sent the message, just which account it should be delivered to. Your client doesn’t even authenticate to send the message.

Now, I’m just going on what they’ve published on the system, so either I could be completely wrong, or they could be being misleading, but it does look like they’ve tried to address the very issue you’ve been pointing out. Obviously it’d be better if they didn’t have your phone number at all, but this does seem to decouple it in a way that means they can’t build a connection graph.

yogthos@lemmy.ml on 29 Aug 01:17 collapse

The problem is that there is no way to verify any of this. You’re just putting trust into people operating this service. That’s not how security is supposed to work.

notabot@lemm.ee on 29 Aug 01:28 next collapse

Strictly you’re having to trust the build of the client rather than the people running the server. If the client doesn’t send/leak the information to the server, the people running the server can’t do anything with it. It’s definitely still a concern, and, if I’m going to use a hosted messaging app, I’d much rather see the client built and published by a different group, and ideally compile it myself. Apart from that I’m not sure there’s any way to satisfy your concerns without building and running the server and client yourself.

yogthos@lemmy.ml on 29 Aug 03:11 collapse

The problem is that a phone number is required to make an account, and that’s a unique identifier for each person using Signal.

turmoil@feddit.org on 29 Aug 10:10 collapse

The government can then know you use Signal. This may be problematic in heavily autocratic regimes, but besides those, what threat scenario are you arguing for here? The Sealed Sender concept disallows building a social graph. However, you can utilize a VPN to mask your point of origin or, if necessary, even use a burner number. Under the worst case scenario that the US gov takes over the whole AWS infrastructure and tries to correlate connections to users, there’s still very high information entropy. At that point, we’re talking about the US gov as a targeting threat actor. If that’s your opponent, you shouldn’t use everyday customer electronics or applications anyway. That’s some spy shit, even domestic activists won’t fall under that much scrutiny.

yogthos@lemmy.ml on 29 Aug 14:23 collapse

The government can know you use Signal, and know who your contacts are, and can correlate all the data they have on your and your contacts to see if any of it makes your whole group of contacts of interest. So, yeah it’s pretty concerning for people living in autocratic regimes like the US. Meanwhile, the sealed sender concept is just trust me bro because nobody aside from people who are actually operating the server know what it’s doing. The fact that people in this thread have so much trouble understanding that any data that gets leaked has to be assumed to be in the hands of a bad actor is phenomenal. Signal is proof that vast majority of people don’t understand the basics of privacy and security, and they don’t actually care. It’s just pure ideology for them.

sunzu2@thebrainbin.org on 29 Aug 02:06 collapse

the protocol is secure, but privacy is this issue

yogthos@lemmy.ml on 29 Aug 03:10 collapse

I’d argue that this is part of the overall protocol design. The e2e encryption aspect of the protocol seems sound, but the system as implemented overall is problematic.

sunzu2@thebrainbin.org on 28 Aug 23:38 next collapse

first comment to provide a decent counterpoint.

Looks like signal and email use both. but it still does not answer

AI said:

The server knows who initiated the communication (they handed over their lockbox first), but not the direction of individual messages within a conversation.

notabot@lemm.ee on 29 Aug 01:02 collapse

‘Sealed sender’ seems to avoid this by not actually requiring the client to authenticate to the server at all, and relying on the recipient to validate that it’s signed by the sender they expect from the encrypted data in the envelope. As I mentioned in another reply, I’m just going on what they’ve published on the system, so either I could be completely wrong, or they could be being misleading, but it does look like they’ve tried to address this issue.

sunzu2@thebrainbin.org on 29 Aug 01:10 collapse

I’m just going on what they’ve published on the system, so either I could be completely wrong, or they could be being misleading

same here overall. thank you for responding.

yogthos@lemmy.ml on 29 Aug 01:16 collapse

Again, this is a trust based system because you don’t know what the server is actually doing. The fact is that the server does collect enough information to trivially make the connection between phone numbers and the connections on the network. If trust me bro from Moxie is good enough for you, that’s of course your prerogative.

notabot@lemm.ee on 29 Aug 01:37 collapse

You’re correct that if you use the system the way it used to work they can trivially build that connection, but (and I know this is a big assumption) if it does now work the way they say it does, they do not have the information to do that any more as the client doesn’t actually authenticate to the server to send a message. Yes, with some network tracing they could probably still work out that you’re the same client that did login to read messages, and that’s a certainly a concern. I would prefer to see a messaging app that uses cryptographic keys as the only identifiers, and uses different keys for different contact pairs, but given their general architecture it seems they’ve tried to deal with the issue.

Assuming that you want to use a publicly accessible messaging app, do you have any ideas about how it should be architected? The biggest issue I see is that the client runs on your phone, and unless you’ve compiled it yourself, you can’t know what it’s actually doing.

yogthos@lemmy.ml on 29 Aug 03:20 collapse

Again, everything you say is based purely on faith. As you acknowledge, the design of the system is such that people operating the server can trivially build out graphs of user connections. All the same arguments people apply to no trusting server side encryption equally apply to metadata.

Meanwhile, there are plenty of examples of messaging apps that don’t require phone numbers. Matrix, Wire, SimpleX chat, are just a few examples. Being able to build your own client is also important, and there is a concept of reproducible builds which allows people to be reasonably sure that a binary being shipped is compiled from the source that’s published. These are solved problems, and there is no technical reason for Signal to do what it’s doing.

notabot@lemm.ee on 29 Aug 09:02 collapse

I agree that them having users’ phone numbers isn’t ideal. There are other identifiers they could use that would work just as well. However, both the client and server are open source, so you can build, at least the client, yourself. If you can content yourself that it does not leak your ID when sending messages, then you don’t need to trust the server as it does not have the information to build a graph of your contacts. Sealed sender seems to have been announced in 2018, so it’s had time to be tested.

Don’t get me wrong, the fact they require a phone number at all is a huge concern, and the reason I don’t really use it much, but the concern you initially stated was addressed years ago and you can build the client yourself to validate that.

yogthos@lemmy.ml on 29 Aug 14:24 collapse

Except that Signal won’t allow third party clients to talk to their server, and the server doesn’t federate. So, Signal being open source is completely meaningless in practice. If you want to use their network then you have to use the client they ship against the server they run, and only people operating this server actually know what it’s doing.

Max_P@lemmy.max-p.me on 28 Aug 23:45 collapse

The identifier is unavoidable for push notifications to work. It needs to know which phone to send it after all, even if it doesn’t use Google’s services, it would still need a way to know which device has new messages when it checks in. If it’s not a phone number it’s gonna be some other kind of ID. Messages need a recipient.

Also, Signal’s goal is protecting conversations for the normies, not be bulletproof to run the next Silk Road at the cost of usability. Signal wants to upgrade people’s SMS messaging and make encryption the norm, you have to make some sacrifices for that. Phone numbers were a deliberate decision so that people can just install Signal and start using E2E texting immediately.

If you want something really private you should be using Tor or I2P based solutions because it’s the only system that can reasonably hide both source and destination completely. Signal have your phone number and IP address after all. They could track your every movements.

Most people don’t need protection against who they talk to, they want privacy of their conversations and their content. Solutions with perfect anonymity between users are hard to understand and use for the average person who’s the target audience of Signal.

yogthos@lemmy.ml on 29 Aug 01:14 next collapse

The identifier absolutely does not need to be your phone number, and plenty of other apps are able to do push notifications without harvesting personal information from the users.

Meanwhile, normies don’t need Signal in the first place since e2ee primarily protects you from things like government agencies snooping on your data.

possiblylinux127@lemmy.zip on 29 Aug 05:44 collapse

Just a side note but both Simplex Chat and Briar are free of unique identifiable IDs.

For Simplex Chat it uses hash tables. It still has a centralized server (which you can self host) but you can use the built in Tor functionality to hide your IP.

For Briar it is totally decentralized. All messages go directly over Tor but it also can use WiFi and Bluetooth. It supports group content types such as Forms and blogs. The downside is that you need a connected device. You can also use Briar Mailboxes on a old phone to receive messages more reliably.

KLISHDFSDF@lemmy.ml on 29 Aug 01:41 next collapse

Signal has been forced by court to provide all the information they have for specific phone numbers [0][1]. The only data they can provide is the date/time a profile was created and the last date (not time) a client pinged their server. That’s it, because that’s all the data they collect.

Feel free to browse the evidence below, they worked with the ACLU to ensure they could publish the documents as they were served a gag order to not talk about the request publicly [2].

[0] signal.org/bigbrother/

[1] aclu.org/…/new-documents-reveal-government-effort…

[2] www.aclu.org/…/open_whisper_documents_0.pdf#page=…

yogthos@lemmy.ml on 29 Aug 03:14 collapse

Once again, even if this is the way things worked back in 2016 there is no guarantee they still work like that today. This is the whole problem with a trust based system. You are trusting that people operating the server. It’s absolutely shocking to me that people have such a hard time accepting this basic fact.

possiblylinux127@lemmy.zip on 29 Aug 05:38 next collapse

True but I find the opposite end of the spectrum hard to believe. Extraordinary claims require extraordinary proof.

What is known is that government agents from countries like Iran, China and Russia actively are spreading misinformation. Not to say that you are a government agent but you should doubt the argument on both sides. For instance, using Signal is way better than not using an audited encrypted messager. Often times I see people jump to worse platforms. I think it is important to understand the problems with Signal.

yogthos@lemmy.ml on 29 Aug 14:32 collapse

It’s well known that the US and other western countries actively spread misinformation. It’s also known thanks to Snowden that the US regime harvests personal data aggressively. Anybody who puts blind faith into a US based security company is frankly an imbecile.

JSharp1436@mstdn.social on 29 Aug 14:34 collapse

@yogthos @possiblylinux127

Sad but true. It's definitely concerning.

KLISHDFSDF@lemmy.ml on 29 Aug 08:17 collapse

Once again, even if this is the way things worked back in 2016 there is no guarantee they still work like that today.

You have to trust someone. You’re not building all your software and reading every line yourself are you?

While there’s no guarantees, Signal continues to produce evidence that they don’t collect data. Latest publication August 8th, 2024: signal.org/bigbrother/santa-clara-county/

The code is open has had a few audits: community.signalusers.org/t/…/13243

This is the whole problem with a trust based system

Can you point me to a working trustless system? I’m not sure one exists. You might say peer-to-peer systems are trustless because there’s no third party, but did you compile the code yourself? did you read every last line of code before you compiled and understood exactly what it was doing?

It’s absolutely shocking to me that people have such a hard time accepting this basic fact.

What’s shocking to me is the lack of understanding that unless you’re developing the entire platform yourself, you have to trust someone at some point and Signal continues to post subpoenas to prove they collect no data, has an open source client/server, provides reproducible builds and continues to be the golden standard recommended by cryptographers.

I would recommend to anyone reading this to rely on the experts and people who are being open and honest vs those who try to push you to less secure platforms.

yogthos@lemmy.ml on 29 Aug 14:31 collapse

You have to trust someone. You’re not building all your software and reading every line yourself are you?

No, you don’t have to trust anyone. That’s literally the point of having secure protocols that don’t leak your personal data. 🤦

Signal made an intentional choice to harvest people’s phone numbers. The rationale for doing that is very thin, and plenty of other messengers avoid doing this. The fact that Signal insists on doing that is a huge red flag all of its own.

The code is open has had a few audits

Only people who are actually operating the server know what’s running on it. The fact that Signal aggressively prevents use of third party clients and refuses to implement federation that would allow other servers to run is again very suspect.

Can you point me to a working trustless system?

SimpleX, Matrix, Briar, and plenty of other chat systems do not collect personal data.

You might say peer-to-peer systems are trustless because there’s no third party, but did you compile the code yourself? did you read every last line of code before you compiled and understood exactly what it was doing?

The discussion in this thread is specifically about Signal harvesting phone numbers. Something Signal has no technical reason to do.

What’s shocking to me is the lack of understanding that unless you’re developing the entire platform yourself, you have to trust someone at some point and Signal continues to post subpoenas to prove they collect no data, has an open source client/server, provides reproducible builds and continues to be the golden standard recommended by cryptographers.

Kind of ironic that you’ve exposed yourself as being utterly clueless on the subject while accusing me of lack of understanding.

I would recommend to anyone reading this to rely on the experts and people who are being open and honest vs those who try to push you to less secure platforms.

I would recommend anyone reading this to rely on rational thinking and ignore trolls who tell you to just trust Signal. Privacy and security are not based on trust, and if you ask any actual expert in the field they will tell you that.

KLISHDFSDF@lemmy.ml on 29 Aug 17:51 collapse

No, you don’t have to trust anyone. That’s literally the point of having secure protocols that don’t leak your personal data. 🤦

Unless you’re reading all the code, understand the protocols, and compiling yourself you are placing your trust in someone else to do it for you. There’s no way around this fact.

You suggest SimpleX, Matrix, and Briar (which I believe are great projects btw, I’ve used them all and continue to use SimpleX and Matrix) but have you read the code, understand the underlying protocols, and compiled the clients yourself or are you placing your trust in a third party to do it for you? Be honest.

I will agree though, if you absolutely do not trust Signal, you should use Briar or SimpleX, but neither are ready for “every day” users. Briar doesn’t support iPhones so its basically dead in the water unless you can convince family/friends to switch their entire platform. SimpleX is almost there but it still continues to fail to notify me of messages, continues to crash, and the UX needs significant improvement before people are willing to put up with it.

The discussion in this thread is specifically about Signal harvesting phone numbers. Something Signal has no technical reason to do.

Let me give you a history lesson, since you seem to have no clue about where Signal started and why they use phone numbers. Signal started as an encryption layer over standard text/SMS named TextSecure. They required phone numbers because that’s how encrypted messages were being sent. In 2014, TextSecure migrated to using the internet as a data channel to allow them to obscure additional metadata from cell phone providers, as well as provide additional features like encrypted group chats. Signal continued to use phone numbers because it was a text message replacement which allowed people to install the app and see all their contacts and immediately start talking to them without having to take additional action - this helps with onboarding of less technical users. Fast forward to today and Signal is only using phone numbers as a spam mitigation filter and to create your initial profile that is no longer being shared with anyone unless you opt into it.

Now, you can say they’re collecting phone numbers for other nefarious purposes but they publish evidence that they don’t. Will they ever get rid of phone numbers? Unlikely unless they figure out a good alternative to block spam accounts.

Privacy and security are not based on trust

You’re 100% right. If you read the code, understand the protocols, and build the clients from source, you don’t have to trust anyone 😊

yogthos@lemmy.ml on 29 Aug 18:22 collapse

Unless you’re reading all the code, understand the protocols, and compiling yourself you are placing your trust in someone else to do it for you. There’s no way around this fact.

That’s why you have a lot of eyes on the code and security experts who dedicate their research to finding flaws and breaking algorithms. It’s certainly a very different scenario from simply trusting people who run a server. The fact that this even needs to be said is frankly phenomenal. There’s also a concept of reproducible builds, so even if you’re not compiling everything yourself you can be reasonably sure that what’s package in the binary was in fact compiled from the source. Again, these are solved problems.

SimpleX is almost there but it still continues to fail to notify me of messages, continues to crash, and the UX needs significant improvement before people are willing to put up with it.

If people genuinely care about privacy then it’s important to promote apps that actually care about privacy by design and invest in improving these apps instead of just perpetuating the problem by recommending Signal. Even Matrix is far better in terms of privacy and it’s plenty mature at this point.

Let me give you a history lesson, since you seem to have no clue about where Signal started and why they use phone numbers.

I’m well aware of the history, and the justifications. The fact remains is that I simply do not trust Signal knowing where it originates.

Fast forward to today and Signal is only using phone numbers as a spam mitigation filter and to create your initial profile that is no longer being shared with anyone unless you opt into it.

The correct statement is that Signal claims to do this, there is no way for an outside party to verify that this is actually the case, hence why it comes down to you taking what people operating Signal say on faith.

You’re 100% right. If you read the code, understand the protocols, and build the clients from source, you don’t have to trust anyone 😊

Trusting countless researchers an security experts to read the code, understand the protocols, and provide reproducible builds, is a lot better than trusting a sketchy US company that was started by the CIA and NED. I guess that’s a concept that’s difficult for some to wrap their head around though.

KLISHDFSDF@lemmy.ml on 29 Aug 19:08 collapse

Even Matrix is far better in terms of privacy and it’s plenty mature at this point.

I would disagree, this guy’s been finding issues and reporting them to Matrix for a while now and appears to find them every time he glances at the project. I LOVE Matrix. I would recommend it over Discord, Telegram etc, but I would not recommend Matrix over Signal.

The fact remains is that I simply do not trust Signal knowing where it originates.

This is fair. No critique against this stance.

Trusting countless researchers an security experts to read the code, understand the protocols, and provide reproducible builds,

I agree! Trust the countless researchers, security and cryptography experts.

… is a lot better than trusting a sketchy US company that was started by the CIA and NED.

You’re gonna have to cite your sources.

yogthos@lemmy.ml on 29 Aug 19:32 collapse

I would disagree, this guy’s been finding issues and reporting them to Matrix for a while now and appears to find them every time he glances at the project.

Issues being found with technology is perfectly normal, and in fact contradicts your whole previous argument. People do find flaws, and then these flaws get fixed, and things get more secure in the process. That’s how things work. However, the key difference is that Matrix doesn’t harvest metadata like phone numbers by design while Signal does. That’s not a problem that has been identified but cannot be fixed because Signal is central server that’s controlled by a US company.

I agree! Trust the countless researchers, security and cryptography experts.

I love how I’ve addressed this numerous times but you’re still unable to understand the difference. Trusting that the protocol works correctly is different from trusting people operating a server. Clearly this is a concept that is beyond your comprehension.

You’re gonna have to cite your sources.

Maybe go read up on where Signal comes from instead of spending your time trolling here. surveillancevalley.com/…/internet-privacy-funded-…

KLISHDFSDF@lemmy.ml on 29 Aug 20:27 collapse

Matrix doesn’t harvest metadata like phone numbers by design while Signal does.

You’re right, Matrix doesn’t ask for a phone number but it damn sure leaks metadata like a sieve. Unless things have significantly changed in the last year, here’s a list of things Matrix can see about you in an encrypted room, that an app like Signal cannot:

  • Your content
    • Your username
    • Your display name
    • Your avatar
    • Your rank within the room (admin, moderator, etc)
    • The Sent date of every message
    • A link to every message you responded to (the contents of which are encrypted)
    • Every emoji reaction you send, and to which message
    • (If on your home server) your IP address
  • The room content
    • The room name
    • The room icon
    • The room description
    • The room membership
  • Your changes
    • The time and message ID of messages you edit
    • The time and message ID of messages you delete
    • A history of rank changes (promotions, demotions) and who changes your rank
    • A history of things you do to other users, if appropriate
  • Room changes
    • Who enters the room and when
    • Who leaves the room and when
    • Who gets promoted/demoted and when
    • Changes to the room name, avatar, description, etc - when they happened-

I love how I’ve addressed this numerous times but you’re still unable to understand the difference. Trusting that the protocol works correctly is different from trusting people operating a server. Clearly this is a concept that is beyond your comprehension.

I clearly understand the difference, what you fail to address is that at the end of the day you are placing your trust in a third party, whether its the code, the protocols or a back-end server. Matrix removes the server if you host your own and never interact with other instances, but otherwise, you’re still trusting the code and the protocols and that - as I’ve pointed out above - that what you’re recommending isn’t already leaking tons of data. And don’t get it twisted, I’m ROOTING for Matrix, it just has a long way to go to address issues that Signal clearly identified early on would hold back the platform (federation + third party clients).

Maybe go read up on where Signal comes from instead of spending your time trolling here. surveillancevalley.com/…/internet-privacy-funded-…

I know what you’re talking about but you don’t want to bring it up because its all tinfoil hat wearing flat-earth conspiracy theory web of poorly connected dots. Your response is the MAGA equivalent of “do your research”. I’ve done my research. The onus is on you to bring forth the evidence. To quote Carl Sagan, “Extraordinary claims require extraordinary evidence”. Don’t try and connect dots that don’t back up your claim and stand proud behind what’s at best poorly thought out misinformation.

yogthos@lemmy.ml on 29 Aug 22:51 collapse

You’re right, Matrix doesn’t ask for a phone number but it damn sure leaks metadata like a sieve. Unless things have significantly changed in the last year, here’s a list of things Matrix can see about you in an encrypted room, that an app like Signal cannot:

None of the thing you listed are personally identifying information. I have to ask at this point, do you even understand what personally identifiable information is?

I clearly understand the difference, what you fail to address is that at the end of the day you are placing your trust in a third party, whether its the code, the protocols or a back-end server.

If you can’t understand the fundamental difference between trusting that an algorithm is provably safe mathematically vs putting trust into some random people then it’s clear that a rational discussion is not possible with you.

I know what you’re talking about but you don’t want to bring it up because its all tinfoil hat wearing flat-earth conspiracy theory web of poorly connected dots.

Imagine saying that without a hint of irony after Snowden revelations. Either you’re a troll or the most gullible person to have ever walked this planet.

I’m going to stop replying to you here because I’ve said all there is to say on the issue and we’re just going in circles. I think that you understand the problems with Signal perfectly well, as will anybody reading this thread. It’s pretty clear that you’re intentionally trolling, and there’s no point continuing to engage with you. People can make their own mind whether they want to put their trust into a CIA outfit or not.

KLISHDFSDF@lemmy.ml on 29 Aug 23:58 collapse

Imagine saying that without a hint of irony after Snowden revelations

Funny enough, “Edward Snowden has reiterated his faith in the Signal app by saying that he uses it every day.” - published 2021.

I’m going to stop replying to you here because I’ve said all there is to say on the issue and we’re just going in circles.

Same here, lets end this amicably and find common ground. I think we’re both pushing for what we believe is best in attempts to guide people towards a secure platform, can we both at least agree that SimpleX is superior under more threat models compared to other messengers, even if it does have a few UX issues it needs fix?

yogthos@lemmy.ml on 30 Aug 00:14 collapse

I do think we can agree that SimpleX approach is the way to go long term. Cheers.

possiblylinux127@lemmy.zip on 29 Aug 05:35 collapse

True, however your claim lacks evidence. They have your phone number and a few time stamps. That isn’t going help much.

yogthos@lemmy.ml on 29 Aug 14:46 collapse

My claim is that privacy should not be based on trust. This appears to be a very difficult concept for people in this thread to understand.

possiblylinux127@lemmy.zip on 29 Aug 17:06 collapse

You always will have to trust something at some level.

yogthos@lemmy.ml on 29 Aug 17:40 collapse

Yeah, you trust that the encryption algorithm is designed correctly and that it doesn’t leak data because many people have audited it and nobody found a flaw in it. You absolutely will not have to trust people operating servers however. If you can figure out why e2ee is important then I’m sure you’ll be able to extrapolate from that why metadata shouldn’t be seen by the server either.

Pherenike@lemmy.ml on 28 Aug 21:17 collapse

I’m not very tech-savvy, and that article looks very nice, but it’s kind of old and it’s true that they haven’t been as transparent (and frequently audited) as other services and they still require a phone number to set up an account, even if you can switch to only using a username later. Also, they removed encrypted database, and Molly brings that back which is the main reason I use it. Another thing I don’t like about Signal is how ferociously they’ve tried to shut down forks in the past, and how they don’t say that you need Google Play Services for it to work properly. Sadly it’s the only “privacy-conscious” service I’ve managed to make most of my family and friends use, after trying for years.

possiblylinux127@lemmy.zip on 29 Aug 05:33 collapse

They only shut down forks that violate Signal branding. Mozilla does the same thing with Firefox.

It is libre so if you fork it there is nothing they can do. Also if they were really hostile they would of used a non libre license or made it entirely proprietary.

possiblylinux127@lemmy.zip on 29 Aug 05:32 collapse

They have your phone number and time stamps. Nothing more nothing less. Also chances are that isn’t being used to create a massive social graph or whatever the Lemmy.ml users are going on about.

For most people it doesn’t matter. Signal has the benefit of being widely adopted and being easy to use. Simplex Chat is another alternative although it isn’t as well funded or as well known.

TheHobbyist@lemmy.zip on 28 Aug 21:06 next collapse

This message is definitely giving all the vibes of a disinformation/misinformation attempt. There is no metadata to harvest from signal.

Here is an example of all the extent of data that signal has on any given user: signal.org/bigbrother/cd-california-grand-jury/

It involves phone number, account creation time and last connected time. That’s it. Nothing more.

The cross referencing of data is just nonsense. Google and meta already have your phone number. Adding signal info to it adds absolutely zero information to them. They have it all already. They know nothing of who you talk with, which groups you are part of.

The funding of Signal did involve public grants but that’s not anything bad. Many projects and nonprofits receive public money. It does not imply that there are backdoors or anything like that. And signal was purposefully designed so that no matter who owns and operates it, the messages stay hidden independently on the server infrastructure. They did the best possible to remove themselves from the chain of trust. Expert cryptographers and auditors trust signal. Don’t listen to this random ramble of an online stranger whose intentions are just to confuse you and make you doubt.

yogthos@lemmy.ml on 28 Aug 21:10 next collapse

It’s fascinating that these kinds of trolls come out of the woodwork any time obvious problems with Signal are brought up.

Phone numbers very obvious are metadata. If you think that cross referencing data is nonsense then you have absolutely no clue what you’re talking about. It’s not about Google or Meta having your phone number, it’s about having a graph of people doing encrypted communication with each other over Signal. The graph of contacts is what’s valuable.

Don’t listen to this random ramble of an online stranger whose intentions are just to confuse you and make you doubt.

What you absolutely shouldn’t listen to are trolls who tell you to just trust that Signal is not abusing the data it’s collecting about you. The first rule of security is that it can’t be faith based.

TheHobbyist@lemmy.zip on 28 Aug 22:10 collapse

What are you talking about? you get a phone number from signal, and what will you be able to derive from it? there is no graph. signal does not hold any “relationships” information.

yogthos@lemmy.ml on 28 Aug 22:19 next collapse

The phone number is a unique identifier for your account. When you send a message to another user on Signal, that message goes to the server, and then gets routed to the other party. The server therefore has to know which parties talk to each other. Let me know if you have trouble understanding this and need it explained in simpler terms.

TheHobbyist@lemmy.zip on 28 Aug 23:02 collapse

Youre right, thats how it works in almost all messaging apps. But signal implemented sealed sender specifically to counter this.

You can read more about it here: signal.org/blog/sealed-sender/

I encourage you to read the first paragraph, which is important in the context of our conversation.

yogthos@lemmy.ml on 28 Aug 23:05 next collapse

I’m talking about the information the server has. The encrypted envelope has nothing to do with that. Your register with the server using your phone number, that’s a unique identifier for your account. When you send messages to other people via the server it knows what accounts you’re talking to and what their phone numbers are. The first paragraph amounts to nothing more than trust me bro because the only people who know what the Signal server actually does are the people operating it.

ramenu@lemmy.ml on 28 Aug 23:23 next collapse

Seriously, what are you talking about? The vast majority of people don’t want anonymity. Obviously Signal isn’t cut out for that! The fact is, most people don’t care about anonymity.

And what metadata can you harvest exactly from a UNIX timestamp and phone number? Signal can tell who is communicating to who, but they cannot read your messages.

yogthos@lemmy.ml on 28 Aug 23:31 collapse

Most people, even in this very thread, clearly don’t understand the implications of phone number harvesting. Also do give citations for your bombastic claim that most people don’t want anonymity.

And what metadata can you harvest exactly from a UNIX timestamp and phone number? Signal can tell who is communicating to who, but they cannot read your messages.

The graph of who communicates with whom is precisely the problem. The government can easily correlate that data with all the other data they have on people, and then if somebody is identified as a person of interest it becomes easy to find other people who associate with them. So, here you just proved my point by showing that you yourself don’t understand the implications of metadata harvesting.

ramenu@lemmy.ml on 28 Aug 23:47 next collapse

Also do give citations for your bombastic claim that most people don’t want anonymity.

This is entirely dependent on the situation. Privacy is not a black or white thing where you’re completely private or not private at all. Everyone lives some part of their life publicly. I don’t have data on this unfortunately, but typically where I live, people share phone numbers to people they personally know.

The graph of who communicates with whom is precisely the problem. The government can easily correlate that data with all the other data they have on people, and then if somebody is identified as a person of interest it becomes easy to find other people who associate with them. So, here you just proved my point by showing that you yourself don’t understand the implications of metadata harvesting.

This is not within the vast majority of most peoples threat model.

yogthos@lemmy.ml on 29 Aug 01:13 next collapse

I never suggested privacy was black and white. What I actually said was that a lot of people aren’t making an informed choice. And whenever these threads come up, people pile on to dismiss legitimate problems with the way Signal works which makes it harder for people to make informed choices by spreading noise and misinformation. This very thread is full of wrong claims and dismissals.

Majority of people don’t even need Signal because they’re not talking about anything anybody cares about. At that point you can use whatever messenger that’s convenient and your circle of friends uses. However, people shove Signal down other people’s throat claiming that it’s a privacy focused app which it demonstrably is not.

otp@sh.itjust.works on 29 Aug 01:25 collapse

people share phone numbers to people they personally know.

This is about Signal having the phone numbers. I don’t think anybody “personally knows” Signal…

rcbrk@lemmy.ml on 29 Aug 02:57 collapse

Most people^1^, even in this very thread, clearly don’t […]

  1. Signal shill-bot personas.
possiblylinux127@lemmy.zip on 29 Aug 05:29 collapse

You are routing your traffic over the public internet. Nothing is secure at all. That’s why we implement strong cryptography

yogthos@lemmy.ml on 29 Aug 14:46 collapse

Yes, that’s why we don’t leak personal data. You’re finally starting to get it!

dessalines@lemmy.ml on 30 Aug 00:35 collapse

Anyone who has worked with centralized databases can tell you how useless that is. With message recipients and timestamps, its trivial to find the real sender.

dessalines@lemmy.ml on 30 Aug 00:34 collapse

Give me your phone number. I’ll quickly be able to find out where you live.

istanbullu@lemmy.ml on 28 Aug 21:34 next collapse

Signal’s hostility to 3rd party clients is a huge red flag.

TheHobbyist@lemmy.zip on 28 Aug 22:12 collapse

Can you further explain? A red flag to open-source, federation and such, can’t disagree. But to privacy and security? I’m not convinced.

yogthos@lemmy.ml on 28 Aug 22:23 next collapse

Third party clients are the best way to verify that the protocol works as advertised.

istanbullu@lemmy.ml on 29 Aug 06:46 collapse

If you backdoored your client, then you will naturally oppose anyone else who develops a client.

possiblylinux127@lemmy.zip on 29 Aug 05:28 collapse

Its the tankies.

Honestly if they can recommend something better I’m all for it but I haven’t heard anything.

Majestic@lemmy.ml on 29 Aug 05:52 collapse

Take a look here for some alternatives:

dessalines.github.io/essays/why_not_signal.html#g…

  • Matrix
  • XMPP
  • Briar
  • SimpleX

Also just because there are no alternatives doesn’t mean your default position should be we just have to trust whatever exists now because it’s good enough. Or that we can’t criticize it ruthlessly, distrust it. Call it out and as a result of that build perhaps the desire for something better, a fix as it were.

The evidence and history clearly points towards Signal being very suspicious and likely in bed with the feds. This is not conspiracy thinking. Conspiracy thinking is thinking that the country/empire that gave away old German engima machines whose code they’d cracked to developing countries without telling them they’d cracked it in the late 40s/early 50s, that went on to establish a crypto company just to subvert its encryption. That’s done everything Snowden revealed has in fact changed suddenly for the first time in half a century for no particular reason and not to its own benefit. That’s fanciful thinking. That’s a leap of logic away from the proven trends, the pattern of behavior, and indeed the incentivizes to continue using their dominant position to maintain dominance and power. They didn’t back down on the clipper chip because they just gave up and decided to let people have privacy and rights. They gave up on it because they found better ways of achieving the same results with plausible deniability.

Also why is everything “tankies” with you people. Privacy advocates point out the obvious and suddenly it’s a communist conspiracy. LOL

possiblylinux127@lemmy.zip on 29 Aug 14:51 collapse
  • Matrix and XMPP are not alternatives and are worse for privacy and security

  • Simplex Chat is actually is pretty sold but isn’t the most user friendly

  • Briar is very cool but its complexity makes it hard to use. It also has problems with real time communications

BeeDemocracy@sh.itjust.works on 30 Aug 06:51 collapse

Matrix and XMPP are not alternatives and are worse for privacy and security

XMPP is exactly as good or bad for privacy as the servers and clients you choose. It’s a protocol, not a service. Unlike Signal, which is a brand/app/service package.

possiblylinux127@lemmy.zip on 30 Aug 17:27 collapse

The protocol is worse for privacy

Is that better?

BeeDemocracy@sh.itjust.works on 04 Sep 12:53 collapse

The protocol is worse for privacy

‘Trust me bro’

The problem is, you’re comparing apples with orchards. Analogous would be: ‘email is worse for privacy than yahoomail’. Plus in this scenario yahoomail only lets you send emails to yahoomail addresses.

c0smokram3r@midwest.social on 28 Aug 21:29 next collapse

So no Tor either bc started by US Naval Research Lab?

yogthos@lemmy.ml on 28 Aug 21:30 next collapse

If Tor leaks data about you then yes you should also be concerned about that.

possiblylinux127@lemmy.zip on 29 Aug 05:26 collapse

That has nothing to do with the team behind it. Also it is the best tool right now even if it isn’t perfect. You just need to be aware of its limitations. (For the love of god turn off JavaScript)

I hate to break it to you but the internet itself was created by the US.

yogthos@lemmy.ml on 29 Aug 14:49 collapse

The team behind it very much does matter because you can infer the motivations from knowing who develops a particular piece of technology. However, my point was that the question with both Signal and Tor is what data they leak based on their technical design. That’s what people should be concerned with first and foremost.

Meanwhile, the internet was created by CERN home.cern/science/computing/where-web-was-born

[deleted] on 29 Aug 17:20 collapse
.
possiblylinux127@lemmy.zip on 29 Aug 05:25 collapse

Wait until you here about DARPA

sub_ubi@lemmy.ml on 28 Aug 21:39 next collapse

Yog is gettin downvoted by dotworld feds but as usual is undefeated in the comments.

yogthos@lemmy.ml on 28 Aug 21:47 collapse

😄

ZeroHora@lemmy.ml on 28 Aug 22:29 next collapse

It collects phone numbers of its users, which can be used to identify people making it a data collection tool that resides on a central server in the US. By cross-referencing these identities with data from other companies like Google or Meta, the government can create a comprehensive picture of people’s connections and affiliations.

That’s fuck up. I always found bad to have the phone number as requirement but that’s make a lot of sense.

yogthos@lemmy.ml on 28 Aug 23:06 next collapse

Indeed, the fact that the phone number is a requirement is a huge red flag for any platform that claims to care about privacy.

ScreaminOctopus@sh.itjust.works on 29 Aug 19:12 collapse

Phone numbers are no longer required iirc

BeeDemocracy@sh.itjust.works on 30 Aug 07:12 collapse

Phone numbers are no longer required iirc

Phone numbers are still required to register and maintain an account. Only difference now is you can choose to hide it from other users and give people a ‘username’ to look you up with instead.

archchan@lemmy.ml on 29 Aug 03:56 next collapse

There is no metadata harvesting on Signal and the use of a phone number is so convenient and helped massively with adoption from the general unaware public.

I loved that it acted as a private and secure drop in replacement for SMS (particularly before they removed that integration) that does what I needed and does it very well and easily connects me with people that already have my number. This made sharing Signal very easy. The only data Signal has to even provide to the authorities is your registration date, phone number, and time of last connection. The absolute minimum. It’s fantastic. If you compare this to Whatsapp which has everything but the exact content of your messages, it’s not even a contest.

For myself on Signal and everyone else I’ve known that that uses Whatsapp or Insta or whatever, the extra absolute anonymity of also removing phone numbers from the already small equation just isn’t needed or worth it, otherwise you wouldn’t be using Signal, let alone fucking Facebook.

yogthos@lemmy.ml on 29 Aug 04:01 collapse

You can believe whatever you want of course, but the reality is that Signal collects phone numbers on registration and these can be used in many ways. The fact that you chose to trust Signal to be a good actor is your prerogative, but it’s based purely on your faith which is not how privacy or security works.

[deleted] on 29 Aug 04:39 collapse
.
yogthos@lemmy.ml on 29 Aug 04:53 collapse

I don’t think you’re aware of how independent audits, open source, good cryptography, a non-profit, government data subpoenas, and a lack of data collection works.

I think that you maybe the one who doesn’t understand how any of this works. Security and privacy are guaranteed by design, and any information that is collected has to be assumed to be available to bad actors. Period. The same reason logic about trusting the server to do the encryption applies to letting the server handle metadata. No amount of audits can guarantee that people operating the server are doing it in good faith.

Meanwhile, the concern isn’t just about somebody having your phone number it’s about Signal server having the ability to map out relationships between these numbers. It’s perfectly fine for people to reason that this is not something they’re worried about, and make an informed choice to use Signal. However, it’s incredibly disingenuous to pretend this problem doesn’t exist.

archchan@lemmy.ml on 29 Aug 06:27 collapse

Edit: nevermind I typed a lot but that Lemmygrad user made a far better post that I agree with.

aspensmonster@lemmygrad.ml on 29 Aug 04:35 collapse

Yeah, Signal is more than encrypted messaging it’s a metadata harvesting platform. It collects phone numbers of its users, which can be used to identify people making it a data collection tool that resides on a central server in the US. By cross-referencing these identities with data from other companies like Google or Meta, the government can create a comprehensive picture of people’s connections and affiliations.

This allows identifying people of interest and building detailed graphs of their relationships. Signal may seem like an innocuous messaging app on the surface, but it cold easily play a crucial role in government data collection efforts.

Strictly speaking, the social graph harvesting portion would be under the Google umbrella, as, IIRC, Signal relies on Google Play Services for delivering messages to recipients. Signal’s sealed sender and “allow sealed sender from anyone” options go part way to addressing this problem, but last I checked, neither of those options are enabled by default.

However, sealed sender on its own isn’t helpful for preventing build-up of social graphs. Under normal circumstances, Google Play Services knows the IP address of the sending and receiving device, regardless of whether or not sealed sender is enabled. And we already know, thanks to Snowden, that the feds have been vacuuming up all of Google’s data for over a decade now. Under normal circumstances, Google/the feds/the NSA can make very educated guesses about who is talking to who.

In order to avoid a build-up of social graphs, you need both the sealed sender feature and an anonymity overlay network, to make the IP addresses gathered not be tied back to the endpoints. You can do this. There is the Orbot app for Android which you can install, and have it route Signal app traffic through the Tor network, meaning that Google Play Services will see a sealed sender envelope emanating from the Tor Network, and have no (easy) way of linking that envelope back to a particular sender device.

Under this regime, the most Google/the feds/the NSA can accumulate is that different users receive messages from unknown people at particular times (and if you’re willing to sacrifice low latency with something like the I2P network, then even the particular times go away). If Signal were to go all in on having client-side spam protection, then that too would add a layer of plausible deniability to recipients; any particular message received could well be spam. Hell, spam practically becomes a feature of the network at that point, muddying the social graph waters further.

That Signal has

  1. Not made sealed sender and “allow sealed sender from anyone” the default, and
  2. Not incorporated anonymizing overlay routing via tor (or some other network like I2P) into the app itself, and
  3. Is still in operation in the heart of the U.S. empire

tells me that the Feds/the NSA are content with the current status quo. They get to know the vast, vast majority of who is talking (privately) to who, in practically real time, along with copious details on the endpoint devices, should they deem tailored access operations/TAO a necessary addition to their surveillance to fully compromise the endpoints and get message info as well as metadata. And the handful of people that jump through the hoops of

  1. Enabling sealed sender
  2. Enabling "allow sealed sender from anyone"
  3. Routing app traffic over an anonymizing overlay network (and ideally having their recipients also do so)

can instead be marked for more intensive human intelligence operations as needed.

Finally, the requirement of a phone number makes the Fed’s/the NSA’s job much easier for getting an initial “fix” on recipients that they catch via attempts to surveil the anonymizing overlay network (as we know the NSA tries to). If they get even one envelope, they know which phone company to go knocking on to get info on where that number is, who it belongs to, etc.

This too can be subverted by getting burner SIMs, but that is a difficult task. A task that could be obviated if Signal instead allowed anonymous sign-ups to its network.

That Signal has pushed back hard on every attempt to remove the need for a phone number tells me that they have already been told by the Feds/the NSA that that is a red line, and that, should they drop that requirement, Signal’s days of being a cushy non-profit for petite bourgeois San Francisco cypherpunks would quickly come to an end.

yogthos@lemmy.ml on 29 Aug 04:55 next collapse

Incidentally, this explains why Signal insists that the app has to be installed through the Play store as opposed to f-droid.

aspensmonster@lemmygrad.ml on 29 Aug 05:26 collapse

Strictly speaking, you can download it directly from their website, but IIRC, the build will still default to trying to use Google Play Services, and only fall back to a different service if Google Play Services is not on the device. Signal really, really wants to give Google insight into who is messaging who.

yogthos@lemmy.ml on 29 Aug 14:49 collapse

exactly, vast majority of users will be going through Google’s store when installing it

possiblylinux127@lemmy.zip on 29 Aug 05:24 next collapse

Law enforcement doesn’t request data frequently enough in order to build a social graph. Also they probably don’t need to as Google and Apple likely have your contacts.

Saying that it is somehow a tool for mass surveillance is frankly wrong. It has its issues but it also balances ease of use. It is the most successful secure messager out there. (WhatsApp doesn’t count)

Sure it has problems. I personally don’t understand there refusal to be on F-droid. However, phone numbers are great for ease of use and help prevent spam. You need to give your personal information to get a phone number. Signal also has very nice video calls which no other messager can seem to replicate.

aspensmonster@lemmygrad.ml on 29 Aug 05:29 collapse

Law enforcement doesn’t request data frequently enough in order to build a social graph. Also they probably don’t need to as Google and Apple likely have your contacts.

They don’t need to request data. They have first-class access to the data themselves. Snowden informed us of this over a decade ago.

Saying that it is somehow a tool for mass surveillance is frankly wrong.

Signal per se is not the mass surveillance tool. Its dependence on Google is the mass surveillance tool.

However, phone numbers are great for ease of use and help prevent spam.

And there’s nothing wrong with allowing that ease-of-use flow for users that don’t need anonymity. The problem is disallowing anonymous users.

possiblylinux127@lemmy.zip on 29 Aug 14:53 collapse

Signal is not dependent on Google. Also to my knowledge Signal isn’t part of AT&T

aspensmonster@lemmygrad.ml on 29 Aug 15:07 collapse

Signal is not dependent on Google.

It literally is though.

possiblylinux127@lemmy.zip on 29 Aug 17:03 collapse

If that were the case Molly FOSS wouldn’t exist

aspensmonster@lemmygrad.ml on 29 Aug 20:21 collapse

If that were the case Molly FOSS wouldn’t exist

I’m not speaking of hard dependence as in “the app can’t work without it.” I’m speaking to the default behavior of the Signal application:

  1. It connects to Google
  2. It does not make efforts to anonymize traffic
  3. It does makes efforts to prevent anonymous sign-ups

Molly FOSS choosing different defaults doesn’t change the fact that the “Signal” client app, which accounts for the vast majority of clients within the network, is dependent on Google.

And in either case – using Google’s Firebase system, or using Signal’s websocket system – the metadata under discussion is still not protected; the NSA doesn’t care if they’re wired into Google’s data centers or Signal’s. They’ll be snooping the connections either way. And in either case, the requirement of a phone number is still present.

Perhaps I should restate my claim:

Signal per se is not the mass surveillance tool. Its dependence on Google design choices of (1) not forcing an anonymization overlay, and (2) forcing the use of a phone number, is the mass surveillance tool.

jet@hackertalks.com on 29 Aug 05:34 next collapse

A really excellent writeup!

dessalines@lemmy.ml on 30 Aug 00:32 collapse

Anyone who has any experience with centralized databases, would be able to tell you how useless sealed sender is. With message recipients and timestamps, it’d be trivial to discover who the senders are.

Also, signal has always had a cozy relationship with the US (radio free asia was it’s initial funder) . After yasha levine posted an article critical of signal a few years back, RFA even tried to do damage control at a privacy conference on signal s behalf:

Libby Liu, president of Radio Free Asia stated:

Our primary interest is to make sure the extended OTF network and the Internet Freedom community are not spooked by the [Yasha Levine’s] article (no pun intended). Fortunately all the major players in the community are together in Valencia this week - and report out from there indicates they remain comfortable with OTF/RFA.

These are high-up US government employees trying to further spread signal.

You can read more about this here.

lnxtx@feddit.nl on 28 Aug 21:06 next collapse

I hope they don’t arrest them too.

mipadaitu@lemmy.world on 28 Aug 21:24 next collapse

Not that the action against Telegram is right, but there’s a big difference between what Signal and Telegram is doing.

otter@lemmy.ca on 28 Aug 21:36 next collapse

Would you have more info on the differences? I was wondering the same thing, but I don’t know enough about Telegram to compare

unconfirmedsourcesDOTgov@lemmy.sdf.org on 28 Aug 22:38 next collapse

I’m no authority on it but from what I’ve read it seems to have more to do with the social features of telegram where lots of content is being shared, both legal and illegal. Signal doesn’t have channels that support hundreds of thousands of people at once, nor media hosting to match.

socsa@piefed.social on 29 Aug 00:10 next collapse

Right, the French authorities are going to present evidence that this dude was aware of specific illegal activity and refuse to comply with a legal warrant involving said actively, making him guilty of obstruction at best, and possibly conspiracy. Signal complies with warrants, they just don't have anyone's keys. Telegram has everyone's keys, and theoretically could turn them over but they refuse. That's a huge difference from a legal perspective.

unconfirmedsourcesDOTgov@lemmy.sdf.org on 29 Aug 01:41 collapse

Thank you. I’m going to restate your explanation to be sure I’ve got it:

  • authorities want platforms to comply with legal requests
  • when Signal gets a subpoena, they open the key locker and show that it’s empty. They provide the metadata they can (sign up date and last seen date, full stop) and tell authorities they can’t do better.
  • when Telegram gets a subpoena, they open the key locker and show all the keys, then slam it shut in the face of the investigator, telling them to get bent.
  • conclusion: it’s easier to never have the keys in the first place than to tease the government with them
rottingleaf@lemmy.world on 29 Aug 09:12 collapse

It’s easier, but Telegram’s authors are from Russia. They psychologically can’t accept that “never have the keys” thing. They want to have control and they want to be able to tell “yes” to the investigator, possibly for something in return.

rottingleaf@lemmy.world on 29 Aug 09:09 collapse

And it’s sad that it doesn’t. Because that’s why people use Telegram.

Media hosting - we-ell, I suppose something similar to bittorrent (or just sharing encrypted files over bittorrent) would do to back such a system?

Telegram’s channels are like blogs, they have reactions and comment links leading to a groupchat associated with a channel.

It’s basically a social network in an instant messenger format.

Telegram is socially , in terms of finding a market niche, the smartest thing of what’s happened in the Internet recently. Durov really is a good businessman.

pimeys@lemmy.nauk.io on 28 Aug 23:08 next collapse

Signal always responds to authorities when they ask for data, and they give them all they have: the day they registered, their phone number and the timestamp they last used the app.

Telegram has unencrypted channels of drug dealing, and what I heard is a lot of illegal porn too. The authorities want information on certain users there and Telegram doesn’t comply. This is directly against the law Signal is not breaking, because they always send all the data they have to the law enforcement.

sunzu2@thebrainbin.org on 28 Aug 23:22 next collapse

while not wrong context matters, US social media companies also enable human, weapons, and drug trafficking. they play a role in a few genocides too.

but the western regime does not care.

pimeys@lemmy.nauk.io on 29 Aug 00:02 next collapse

But they give their data when the officials ask. That is all that matters. And I seriously hope none of us uses Telegram or WhatsApp to any discussions. Use Signal because that is so far pretty unbreakable.

Telegram is already in the hands of that tiny Russian old man and WhatsApp is owned by a lizard.

rottingleaf@lemmy.world on 29 Aug 09:04 collapse

Yeah, try telling your family, friends, colleagues, therapist to use Signal.

pimeys@lemmy.nauk.io on 29 Aug 09:13 collapse

Did so years ago. Everybody uses it from my family and friends. I’ve had a very active group chat there for eight years with friends. My mom uses it actively, even calls me using Signal. My partner knows it is the best chat app and actively uses it.

I just asked ages ago for everybody to switch to signal, they valuated the features and for a group chat automatically deleted messages and strong encryption were really interesting for everybody. Now we can shoot shit in a group chat without needing to worry that the logs are stored somewhere forever.

brognak@lemm.ee on 29 Aug 15:08 next collapse

Same. I also sell the fact that it works xPlatform perfectly, so no more Android/SMS/iMessage fuckery happening.

doubtingtammy@lemmy.ml on 30 Aug 16:08 collapse

Yeah, I’m trying to convince everyone to start using signal before the slide towards fascism turns into a drop

independantiste@sh.itjust.works on 29 Aug 07:06 collapse

All of the illegal stuff like that that I’ve seen around on social media always linked to telegram channels. Most of the time what you see on regular social media are bots advertising the telegram channels, where the real people are at

rottingleaf@lemmy.world on 29 Aug 09:03 next collapse

Telegram is a propaganda weapon in some sense, between two worldviews - one is “a good service doesn’t require trust, because they physically can’t sell you”, another is “a good service you can trust because they won’t sell you”. And Telegram helps the latter.

So frankly - kill it with fire. Sadly I’m in Russia and everybody uses it here.

inbeesee@lemmy.world on 29 Aug 15:19 next collapse

Hilarious that it’s impossible. They don’t even horde your data.

misaloun@reddthat.com on 05 Sep 21:16 collapse

Is it time stamp of last usage, or time stamp of all messages?

phase@lemmy.8th.world on 29 Aug 20:32 collapse

She responds to this point in the interview.

istanbullu@lemmy.ml on 28 Aug 21:58 next collapse

Telegram is available on F-Droid. Signal is not. Whatever is Signal doing, it’s pretty bad.

toasteecup@lemmy.world on 28 Aug 22:22 next collapse

Are you developing your opinions based on vibes or have you actually audited their software yourself (you are free to do so both client and federation server code)?

If you audited it, have you produced an actual report with metrics and points of reference for your data points?

southsamurai@sh.itjust.works on 28 Aug 22:43 next collapse

This person has been running around spreading FUD in every post about this

toasteecup@lemmy.world on 29 Aug 04:05 collapse

It’s what Ive come to expect from the lemmy.ml instance and I finally blocked the entire instance.

rottingleaf@lemmy.world on 29 Aug 09:14 next collapse

It’s actually sad, even though I’m a libertarian, tankies and in general marxists could have made a good input into our future. But if they can believe in Telegram being secure because of vibes and not even doing basic research, they’ve already lost.

toasteecup@lemmy.world on 29 Aug 15:22 collapse

Heeey I am also a libertarian, I just tend towards left libertarian. Back to the point of discussion, I find it difficult to ha e a meaningful conversation with the tankies or in general anyone from lemmy.ml . The discussions tend to lack any real data and feel entirely vibe based OR it’s apologist bullshit for Russia.

Like it’s cool if you like communism and have a philosophy based around why you think it’ll help humanity. I can politely disagree but still listen and discuss. It’s quite another to just be a complete dipshit and say “Ukraine had the invasion coming” (actual quote I’ve seen).

rottingleaf@lemmy.world on 31 Aug 08:46 collapse

I’m actually sympathetic to anyone having an ideology not to help their identity, but trying to imagine a structure that works.

Ancaps are expected to be good in that regard, tankies are expected to be bad in that regard, but in general there are good and bad people in any group. I’ve met almost (the premise of racial difference in quality is still wrong obviously) reasonable Nazis, and not alt-rights at that, but real honest Nazis.

I’ve been excited about Trotskyism at some point, because while there are problems with their proposed ideal state (which is similar to what’s described in Norbert Wiener’s “Cybernetics”), they have a proposed mechanism and it’s been even tested in Rojava (their bigger issue is with armed apes around them though, and also with the USA abandoning them after not needing them against ISIS).

doubtingtammy@lemmy.ml on 30 Aug 16:12 collapse

But you still post in lemmy.ml/privacy?

misaloun@reddthat.com on 05 Sep 21:22 collapse

Doesn’t take away the fact that not being on F-droid is a huge issue and says a lot about how much they care about privacy and security.

MerchantsOfMisery@lemmy.ml on 29 Aug 00:31 next collapse

Assuming you’ve audited Signal, can you tell us what your findings were and why you think Signal must be up to something pretty bad? I’m very curious and would love to be enlightened by someone as knowledgeable as you.

poVoq@slrpnk.net on 29 Aug 00:38 next collapse

I’ll leave it up to you to decide if that is bad or not, but one of the reasons the Signal app can’t be put unaltered on F-droid is because it loads in external dependencies from Google at run-time, which can also be altered by Google at will with any Android update.

MerchantsOfMisery@lemmy.ml on 29 Aug 00:51 next collapse

How significant is it that the server code is open-source or not? It’s possible for Signal to publish their server code while running completely different software on their servers. The point of the client is being open source and audited on a regular basis by the community, which is why it doesn’t make sense to trust the server-side software.

The entire point is that we don’t have to trust the sever at all. The client is open source and regularly audited by the community. As long as the client stays fully open source, everything’s fine. Also, the closed source dependencies are part of a spam reduction effort which IMO is well worth it. Prior to this, Signal had a spam problem and the client itself remains fully open source.

Signal could have very well not even told people that they added a closed source dependency on Google to its servers and just lied by publishing fake server code that omits the closed source dependency., but instead they were very transparent about the spam problem. In terms of they “why?” regarding the closed source dependencies, their argument is that making it open source would almost immediately result in all anti-spam measures being thwarted. Frankly I’m inclined to agree and again, as long as the client is fully open source and regularly audited, the server code is irrelevant to user privacy/security.

community.signalusers.org/t/…/26665

signal.org/blog/keeping-spam-off-signal/

poVoq@slrpnk.net on 29 Aug 00:57 next collapse

The external Google dependencies I am talking about are loaded into the client not the server, so that’s an entirely different issue.

MerchantsOfMisery@lemmy.ml on 29 Aug 01:03 collapse

Every app from the Play store requires GCM though, and Signal functions even if a user disables GCM. It pertains to a phone’s ability to notify a user of a new message. But again, users can disable GCM and the app itself will continue to work just fine.

For what it’s work, the APK on Signal’s website (obviously) doesn’t have the external Google dependencies. Personally, I really don’t see this as an issue at all.

poVoq@slrpnk.net on 29 Aug 01:21 collapse

There is also Google maps integration. Sure, it’s not mandatory anymore, but if you install the official Signal app on a phone with Google play services installed, you are effectively not running an open-source app anymore and this potential backdoor is also not noticeable with reproducible builds.

F-droid has strict rules in place to prevent these sort of things for good reasons, thus the original comment is not entirely wrong in saying that an app that claims to be open-source, but can’t be made available on F-droid is a red-flag.

possiblylinux127@lemmy.zip on 29 Aug 05:16 collapse

It would still be nice to have the server code. I want to run my own server on my own hardware

aspensmonster@lemmygrad.ml on 29 Aug 03:57 next collapse

one of the reasons the Signal app can’t be put unaltered on F-droid is because it loads in external dependencies from Google at run-time

IIRC, the APK you get directly from their website doesn’t have the GCM bits in it (edit: I did not recall correctly; the GCM bits are there, but there is a websocket fallback if GCM isn’t available), and will work without them. At least, I didn’t have any issues with notifications back when I was running the website APK with GrapheneOS and no Google bits.

gedaliyah@lemmy.world on 29 Aug 04:01 collapse

Lots of apps have slight modifications in F-Droid. Like Telegram for instance.

brbposting@sh.itjust.works on 29 Aug 01:13 collapse

Someone should audit your downvote

<img alt="" src="https://sh.itjust.works/pictrs/image/3f07d4bb-2d22-402f-9892-802bf142e618.png">

MerchantsOfMisery@lemmy.ml on 29 Aug 01:24 collapse

Jokes aside, I’m a firm believer that upvotes/downvotes should be private and I think it’s very unfortunate that they aren’t. I’m fine with people downvoting me and me not knowing who they are.

brbposting@sh.itjust.works on 29 Aug 03:08 collapse

Wonder how you get negative one down vote…

You see this?

MerchantsOfMisery@lemmy.ml on 29 Aug 03:33 collapse

Yeuup

gedaliyah@lemmy.world on 29 Aug 03:59 collapse

The folks at F-Droid have said that Signal would certainly qualify, but Signal doesn’t want multiple channels out there. F-Droid is just honoring their wishes.

yogthos@lemmy.ml on 30 Aug 00:06 collapse

Indeed there is, one is an op funded by US intelligence agencies and the other is a platform that the US has no control over.

TCB13@lemmy.world on 28 Aug 22:34 next collapse

They won’t there’s no need. Their clients are garbage and they’re most likely backdoored anyways. This action against Telegram is only happening because they can’t get inside it, they can’t backdoor it nor corrupt anyone. If they were able to do that they wouldn’t be doing this.

ArchAengelus@lemmy.dbzer0.com on 28 Aug 23:11 next collapse

No matter how good the protocol or client encryption, your privacy is only as good as your own physical security for the device in question.

Given that if you lose your private key, there is no recovery, I would be surprised if there were real back doors in the clients. Maybe unintentional ways to leak data, but you can go look for yourself: github.com/signalapp/Signal-Android

They have one for each client.

TCB13@lemmy.world on 28 Aug 23:15 next collapse

Maybe unintentional ways to leak data,

Yeah, that’s what I think it may be. Just like Apple reporting on all apps you open on un-encrypted HTTP calls and a few other things.

sunzu2@thebrainbin.org on 28 Aug 23:23 collapse

are you talking about phone notification bullshit and google got caught reporting to government with no warrants.

TCB13@lemmy.world on 29 Aug 00:03 next collapse
ArchAengelus@lemmy.dbzer0.com on 29 Aug 21:02 collapse

Signal’s defaults are pretty good about that. Push notifications are both opt-in and the information they send can be selected by the user. You can have it say “new message” and that’s it. Or the senders name. Or the whole message.

I agree that it’s not intuitive that that’s a leak to most people, but push notifications are kind of wonky how they work.

sunzu2@thebrainbin.org on 29 Aug 21:11 collapse

signal is all around very strong... my main criticism is the "trust signal bro" cult pretending like Signal would not log chats if ordered by the spooks. which is naive AF and feels like they are trying to make normeis comfortable so they don't demand better.

heavyboots@lemmy.ml on 28 Aug 23:57 collapse

As an example of this, I believe SexyCyborg got in trouble for reporting on leaks via people’s 3rd party Chinese language keyboards. So her theory is that the keyboard apps people had installed leaked data when Hong Kong protesters were communicating with the press, rather than the actual Signal app. But… as stated above, people have to take responsibility for their device and in this case, they had chosen to install apps with leak issues into the communication process.

socsa@piefed.social on 29 Aug 00:06 collapse

This is precisely why opsec is more than just an app.

Leaky keyboards are a possibility, but what is actually far more likely is just that someone on the signal group chat was a mole who was archiving the traffic for the party. Signal has since made efforts to bring anonymous accounts to the platform, which will help thwart such attacks. Though against a state actor it is still not enough unless you take additional measures to obfuscate traffic. And then that still doesn't protect you against some CCP brownshirt from tailing you and then snatching your phone out of your hand when you unlock it.

[deleted] on 29 Aug 07:29 next collapse
.
milicent_bystandr@lemm.ee on 29 Aug 07:29 collapse

Leaky keyboards are more than a possibility. Sogou, the biggest one for Chinese typing, got found out a year or so ago for having terrible client-server encryption. They fixed it in an update, but many people didn’t get the update - not to mention it’s still sending every keystroke to Tencent (are the owners I think?) so they could also be saving and analysing private typing anyway.

possiblylinux127@lemmy.zip on 29 Aug 05:14 collapse

Telegram isn’t even E2EE

TCB13@lemmy.world on 29 Aug 14:32 collapse

If you don’t turn on the secret chat feature it wont be, yes. However if E2EE was the only deciding factor for a gov to go against an App then they woudln’t be going after Telegram. The fact that govts are going so hard at telegram simply proves that even when the company has access to all our chats they don’t actually provide them to said govts.

I’m not saying telegram is good from a security perspective, I’m just saying that event without E2EE and all the modern wonders govts can’t still get in because the company doesn’t indulge their requests.

refalo@programming.dev on 29 Aug 04:11 next collapse

She has her hand in too many strategic places, unlike Telegram.

employed at Google for 13 years

speaker at the 2018 World Summit

written for the American Civil Liberties Union

advised the White House, the FCC, the FTC, the City of New York, the European Parliament, and many other governments and civil society organizations

rottingleaf@lemmy.world on 30 Aug 10:44 collapse

It’s a pleasing thought, of course, that an influential person may have morals and good goals (and nice looks).

But since there’s no way to know for sure, I think I’ll just stop trying to classify those names into good and evil.

possiblylinux127@lemmy.zip on 29 Aug 05:12 next collapse

She’s in the US

Say what you will about US but they are pouring money into the cyber security industry

where_am_i@sh.itjust.works on 29 Aug 19:15 collapse

Dude, it’s a non-profit, and their biggest contribution is money that was made by selling WhatsApp to Facebook. Cuz the guy just couldn’t live with what happened to his creation.

yogthos@lemmy.ml on 30 Aug 00:06 collapse

The very fact that there have never been any attempts in the west to stop Signal from operating says volumes in my opinion.

istanbullu@lemmy.ml on 28 Aug 21:32 next collapse

Signal’s hostility to third party clients is a huge red flag.

They also refuse to distance themselves from Google’s app store.

Vitaly@feddit.uk on 28 Aug 22:34 next collapse

Yeah, I would like to use it from f-droid instead of google store or apk

211@sopuli.xyz on 28 Aug 23:30 collapse

molly.im Especially the FOSS version. Need to manually add the repository though.

Interstellar_1@lemmy.blahaj.zone on 29 Aug 00:39 next collapse

Or use Accrescent

Pherenike@lemmy.ml on 29 Aug 02:11 collapse

This is the way.

ramenu@lemmy.ml on 28 Aug 23:16 next collapse

What? How is this a red flag? Having third party clients is not good for security.

sunzu2@thebrainbin.org on 28 Aug 23:20 next collapse

Is there any merit to this comment?

ramenu@lemmy.ml on 28 Aug 23:34 collapse

When you use a client, you are relying on the client’s crypto implementation to be correct. This is only one part of it and there’s a lot more to it when it comes to hardening the program. Signal focuses on their desktop and mobile clients and they hire actual security professionals and cryptographers (unlike the charlatans in this thread) to implement it correctly.

Having third party clients would not definitively mean the client is bad, but it most likely would break the security model. Just take a look at Matrix’s clients.

ahal@lemmy.ca on 28 Aug 23:58 next collapse

Excellent point! If I’m sending someone information that could get me killed if it were intercepted by the state, I’d sure as hell want some guarantees about how the other side is handling my data. Disallowing third party clients gives me at least one such guarantee.

KLISHDFSDF@lemmy.ml on 29 Aug 01:29 next collapse

Signal doesn’t disallow third party clients, you should always understand the risk when messaging anyone on any platform. See my post here: lemmy.ml/post/19672991/13312234

doctortran@lemm.ee on 29 Aug 02:54 next collapse

You have absolutely zero guarantees, with or without their policy on third party apps. You can not send sensitive information to someone else’s phone and tell yourself it couldn’t possibly have been intercepted, or that someone couldn’t get ahold of that phone, or that the person you’re sending it to won’t take a screenshot and save it to their cloud.

A lot of software nowadays is doing a real disservice to their users by continuing to lie to them like this by selling them the notion that they can control their information after it has been sent. It’s really making people forget basic information hygiene. No app can guarantee that message won’t be intercepted or mishandled. They can only give you tools to hopefully prevent that, but there are no guarantees.

Moreover, this policy does not exclude them from including third-party functionality and warning the user when they are communicating with somebody that isn’t using encryption.

Too many of these apps and services are getting away with the “security” excuse for what is effectively just creating a walled garden to lock users in. Ask yourself how you can get your own data out of these services when you decide to quit them, and it becomes more apparent what they’re doing.

ahal@lemmy.ca on 29 Aug 03:03 next collapse

Of course, I fully agree! My point was just that you can eliminate the risk of poorly implemented cryptography at the endpoints. Obviously there’s a thousand and one other ways things could go wrong. But we do the best we can with security.

Anyway apparently third party clients are allowed after all? So it’s a moot point.

rottingleaf@lemmy.world on 29 Aug 09:16 collapse

A lot of software nowadays is doing a real disservice to their users by continuing to lie to them like this by selling them the notion that they can control their information after it has been sent. It’s really making people forget basic information hygiene. No app can guarantee that message won’t be intercepted or mishandled. They can only give you tools to hopefully prevent that, but there are no guarantees.

Oh, yes. These “deleted messages”, or these “hidden likes”, or whatever else.

I mean, there are fundamental things and algorithms allowing to create such a system, with blinded keys, ghost keys and what not, only these disgusting cheats have a centralized service where any employee can see everything, yet pretend that they have “a security feature”.

possiblylinux127@lemmy.zip on 29 Aug 05:12 collapse

You have no control on the receiving end. Zero.

ahal@lemmy.ca on 29 Aug 09:01 collapse

You do if third party clients aren’t possible? You have control over what client the receiving end is using.

But apparently third party clients are possible, so it’s moot.

poVoq@slrpnk.net on 29 Aug 00:14 next collapse

No, if your system can’t support 3rd party clients properly, it is inherently insecure, especially in an e2ee context where you supposedly don’t have to trust the server/vendor. If a system claims to be e2ee, but tightly controls both clients and servers (for example WhatsApp), that means they can rug-pull that e2ee at any point in time and even selectively target people with custom updates to break that e2ee for them only. The only way to realistically protect yourself from that is using a 3rd party client (and yes, I know, in case of Signal also theoretically reviewing every code change and using reproducible builds, but that’s not very realistic).

Now admittedly, Signal has started to be less hostile to 3rd party clients like Molly, so it’s not as bad anymore as it used to be.

ReversalHatchery@beehaw.org on 29 Aug 00:17 next collapse

When you use a client, you are relying on the client’s crypto implementation to be correct.

Nothing prevents this other client from using the same as the original app. When the alt client is just a fork, it’s even easier to check if they kept it intact or not.

This is only one part of it and there’s a lot more to it when it comes to hardening the program.

Something at which even the original Signal fails. It has received criticism multiple times (1, 2) for not being verifiable whether it’s been tampered with by the app’s distributor, and also for having included properietary google services dependencies which dynamically load further code from the phone which is also a security issue. Worthy forks solve both of these.

Signal focuses on their desktop and mobile clients and they hire actual security professionals and cryptographers (unlike the charlatans in this thread) to implement it correctly.

Last I heard (a month or so ago) the desktop client had serious unfixed issues.


I think it further erodes your point that Signal is not just hostile in terms of not wanting it, but Moxie for instance has been very, very verbal about this.

ramenu@lemmy.ml on 29 Aug 13:40 collapse

Something at which even the original Signal fails. It has received criticism multiple times (1, 2) for not being verifiable whether it’s been tampered with by the app’s distributor, and also for having included properietary google services dependencies which dynamically load further code from the phone which is also a security issue. Worthy forks solve both of these.

That’s unfortunate. I do hope that these forks don’t go and start making extensive changes though, because that’s where it becomes a problem.

UltraGiGaGigantic@lemmy.ml on 29 Aug 00:40 next collapse

Appreciate the link. I still believe in Matrix, even if the client ecosystem isn’t there yet. There HAS to be something to replace discord, the enshitification has already begun.

possiblylinux127@lemmy.zip on 29 Aug 05:10 collapse

I wouldn’t call it a discord alternative. It is closer to fancy IRC/live forms.

Then again I don’t really use Discord

possiblylinux127@lemmy.zip on 29 Aug 05:09 collapse

Signal third party clients base off the Signal code base. They just add patches and remove certain dependencies. Also they are often more secure. You logic is from the Apple PR department.

ramenu@lemmy.ml on 29 Aug 13:24 collapse

Again, having third party clients would not definitively mean the client is bad. Obviously, if it’s a simple fork with hopefully small patches that are just UI changes, it’s probably not going to harm the security model.

I should have phrased this better in my original post. When I was thinking about third party clients, Matrix and XMPP immediately came to my mind. Not very simple forks. So I’ll phrase this better: “Having non-trivial third party clients is not good for security.” What non-trivial means is left to interpretation though, I suppose.

doctortran@lemm.ee on 29 Aug 03:02 next collapse

Having third party clients is not good for security.

If the first party provider told you this, you should always second guess them.

Moreover, providing an option that informed users can choose doesn’t hurt security. This idea the user can’t be trusted to use the appropriate type of messaging if provided options needs to die.

PlexSheep@infosec.pub on 29 Aug 19:29 collapse

Why do you think so? I see it as a strength in diversity and a great driving force for a proper server api

KLISHDFSDF@lemmy.ml on 29 Aug 01:26 next collapse

That’s outdated information:

Go forth and contribute, fork, or create your own.

They also refuse to distance themselves from Google’s app store.

This link has existed forever at this point if we count in internet years: signal.org/android/apk/ - getting an app directly from the developer with no middleman is about as distant as you can get from Google’s app store.

possiblylinux127@lemmy.zip on 29 Aug 05:05 next collapse

I wish they had Signal on F-droid but at the end of the day at least it is possible to use Molly Foss.

istanbullu@lemmy.ml on 29 Aug 06:51 next collapse

Those clients exist despite Signal Foundation, not because they encourage community development. They are doing everything they can to discourage third party app development.

KLISHDFSDF@lemmy.ml on 29 Aug 07:03 collapse

They are doing everything they can to discourage third party app development.

I’d say you’re moving the goalpost. Other than the hostility the founder showed towards LibreSignal nearly 10 years ago now, can you source any evidence to support your claim?

istanbullu@lemmy.ml on 29 Aug 08:31 collapse

Lots of red flags here in Github: github.com/signalapp/Signal-Android/issues/9044

KLISHDFSDF@lemmy.ml on 29 Aug 08:34 collapse

That link, and I could be missing it, has nothing to do with what I claimed. Mind editing your post and quoting a red flag linked at the source you provided?

istanbullu@lemmy.ml on 29 Aug 08:46 collapse

Some of my favourite red flags:

Signal’s dependence on Google libraries: github.com/signalapp/Signal-Android/issues/9044#i…

Signal dev bullshitting a non-answer and then hilariously refuting his non-answer: github.com/signalapp/Signal-Android/issues/9044#i…

Signal hiding its serverside source code for many months: github.com/signalapp/Signal-Android/issues/11101

You can find many more examples.

The last one about server side code, together with Signal’s funding sources and their obsession with phone numbers code leads me to suspect that Signal is just a honeypot by US intelligence.

KLISHDFSDF@lemmy.ml on 29 Aug 18:18 collapse

Those clients exist despite Signal Foundation, not because they encourage community development. They are doing everything they can to discourage third party app development.

That was your original claim. None of the sources you provided back up your original claim. We can talk about Google libraries or the delay in server side code if you want to go down that path, but that’s a completely different discussion. Why are you pivoting to other topics? Will you concede your original point or do you have evidence to back it up?

misaloun@reddthat.com on 05 Sep 21:27 collapse

Signal actually has a rule on not using third party clients on its servers. These clients existing do not prove the point you intend.

KLISHDFSDF@lemmy.ml on 06 Sep 17:17 collapse

can you post a link to this rule?

possiblylinux127@lemmy.zip on 29 Aug 05:05 collapse

Do you hate Signal or do you hate the west? There legitimate reasons to not like Signal but calling them hostile toward third party clients is untrue. Last time I checked Signal wasn’t proprietary.

jet@hackertalks.com on 29 Aug 05:25 collapse

They have demonstrated history of asking third party clients to not use the signal name, and not use the signal network. The client that currently exists that do this do it against the wishes of the signal foundation

KLISHDFSDF@lemmy.ml on 29 Aug 07:33 collapse

They have demonstrated history of asking third party clients to not use the signal name, and not use the signal network.

The lead developer, nearly 10 years ago now, specifically asked LibreSignal to stop. A single event does not make a demonstrated history.

The client that currently exists that do this do it against the wishes of the signal foundation

If you have evidence to back this claim, I would like to see it so I can stop spreading misinformation.

jet@hackertalks.com on 29 Aug 07:39 collapse

In the Libra signal issue that you linked to, they made it clear they don’t want third-party clients talking to signal servers

You’re free to use our source code for whatever you would like under the terms of the license, but you’re not entitled to use our name or the service that we run.

If you think running servers is difficult and expensive (you’re right), ask yourself why you feel entitled for us to run them for your product.

KLISHDFSDF@lemmy.ml on 29 Aug 07:49 collapse

He was specifically talking to that developer. The “You” and “You’re” in that quote was specifically targeted at the LibreSignal developer.

I recall the gurk-rs developer specifically mentioned that his client reports to Signal’s servers as a non-official app. The Signal admins can see the client name and version - just like websites can tell what browser you’re using - and could easily block third party clients if they wanted to but they don’t.

If Signal wanted to block third party clients, they would have blocked them already.

jet@hackertalks.com on 29 Aug 07:51 collapse

Moxie made it incredibly clear, he does not want third party is talking to the signal servers.

Libra signal took him at his word and turn themselves off

The other developers, like Molly, take a stronger road.

Is signal currently banning third party clients? No. But they’ve made it clear they don’t like them. They didn’t actually ban Libra signal, they just asked them to stop. Could they ban the clients in the future? Yes

KLISHDFSDF@lemmy.ml on 29 Aug 08:20 next collapse

I’ll reiterate my statement as you didn’t address it.

If Signal wanted to block third party clients, they would have blocked them already.

jet@hackertalks.com on 29 Aug 08:24 collapse

I respectfully disagree. They could be waiting until it becomes a big issue. Right now that would just cost them good PR, but if somebody was using the signal network and their client became very popular they absolutely have expressed the desire, intent, and as you indicated the capability to do so.

KLISHDFSDF@lemmy.ml on 29 Aug 08:44 collapse

They could be waiting until it becomes a big issue

I guess I don’t see that as a problem if its causing a big issue.

Let me throw it back to you: If you were providing a service and a third party client was using your resources and causing a “big issue” like you stated, would you not want to remediate the problem? Lets say you introduced a new feature, but it doesn’t work for 15% of your user base because they’re using an outdated third party client that may not get fixed for another year or two - if ever. What would you do?

Here’s another example, lets say someone develops a client that lets you upload significantly bigger files and has an aggressive retry rate that as more people start using your client, it starts increasing the hardware requirements for your infrastructure. Do you just say “oh well”, suck it up and deal with having to stand up more infrastructure due to the third party client doing things you didn’t expect? Is that reasonable?

jet@hackertalks.com on 29 Aug 09:02 next collapse

hackertalks.com/comment/4806772

They have demonstrated history of asking third party clients to not use the signal name, and not use the signal network. The client that currently exists that do this do it against the wishes of the signal foundation

you keep moving the goal posts, Ive justified my position in the original comment.

By all means, use signal, I do. But let’s not deny the realities. I think we’ve covered all that we need to cover in this discussion thread. We don’t have to agree and that’s okay, and I wish you a good day, but I’m not going to respond anymore

possiblylinux127@lemmy.zip on 29 Aug 14:56 collapse

The servers should absolutely not trust the client. Likewise, the client should not trust the server. When that is the case it is impossible for the third client to have more functionality than the mainstream client.

istanbullu@lemmy.ml on 29 Aug 08:48 next collapse

If you have a backdoored client, then you would naturally object to third party clients :)

possiblylinux127@lemmy.zip on 29 Aug 14:54 collapse

I haven’t seen evidence to back up your claims

NegativeLookBehind@lemmy.world on 29 Aug 05:31 next collapse

Isn’t Signal at least partially funded by the agency?

poVoq@slrpnk.net on 29 Aug 10:29 next collapse

No, they found some billionaires to do it 😉

where_am_i@sh.itjust.works on 29 Aug 19:20 collapse

What part of non-profit and open-source do you not understand?

Review the source, build it yourself, be happy. It uses well-known assymetric encryption algorithms. Not much your agency could really do here even if they harvest all the traffic from the server.

NegativeLookBehind@lemmy.world on 29 Aug 20:39 collapse

Was my fucking question about the integrity of the algorithms they use, or was it about who’s been funding the product? Because a quick web search will show you that they did in fact fund it at one point.

where_am_i@sh.itjust.works on 30 Aug 00:38 collapse

And so what? You could be an oil dictatorship prince and donate a billion to Signal. It’s not going to compromise it in any way that is not directly auditable.

So, your fuckin question is misguided. You’re “only asking questions” while implying intent.

Disgracefulone@discuss.online on 29 Aug 07:19 next collapse

Ppl just gone use it to cheat smh

ByteOnBikes@slrpnk.net on 29 Aug 07:48 next collapse

This is a very rude question, but on this subject of being lean, I looked up your 990, and you pay yourself less than … well, you pay yourself half or a third as much as some of your engineers.

Yes, and our goal is to pay people as close to Silicon Valley’s salaries as possible, so we can recruit very senior people, knowing that we don’t have equity to offer them. We pay engineers very well. [Leans in performatively toward the phone recording the interview.] If anyone’s looking for a job, we pay very, very well.

But you pay yourself pretty modestly in the scheme of things.

I make a very good salary that I’m very happy with.

That’s pretty cool. But knowing the number would matter.

turmoil@feddit.org on 29 Aug 09:43 collapse

IIRC She earns around 400+k per year. Which is a nice salary, but rather low compared to other execs.

aspensmonster@lemmygrad.ml on 29 Aug 13:43 collapse

191,229 USD

projects.propublica.org/nonprofits/…/full

stink@lemmygrad.ml on 29 Aug 14:02 collapse

<img alt="" src="https://lemmygrad.ml/pictrs/image/d1fa12a9-7c3c-4cc2-930a-f7659285ddb7.png">

aspensmonster@lemmygrad.ml on 29 Aug 15:34 collapse

LOL it’s actually even lower if you look at Schedule J. Her base compensation is only 115,057. It’s bonus and incentive comp (76,172) that brings it up.

coolusername@lemmy.ml on 29 Aug 09:41 next collapse

0% chance that the feds don’t have Signal backdoors, otherwise Wired wouldn’t be promoting it. fyi everyone Proton is CIA. It’s modern cryptoAG.

ramenu@lemmy.ml on 29 Aug 13:43 next collapse

Well, I disagree about Signal. Proton however, I agree is extremely shady and should be avoided at all costs.

jaggedrobotpubes@lemmy.world on 29 Aug 13:52 collapse

That’s pretty strong and I’ve never seen or heard anything like it before. If it’s true I’m betting the rest of Lemmy would like some details, too.

ramenu@lemmy.ml on 29 Aug 14:04 collapse

No support for Monero despite it being requested on uservoice 6 years ago. A Bitcoin wallet (seriously?) which is easily traceable. Important email metadata is also not zero access encrypted (i.e., subject headers, from/to headers) which leaks a substantial amount of information even if the body is encrypted. Not to mention they had clearnet redirects from their onion service a while back, something a lot of honeypots usually do.

Even if it’s not a honeypot, you’re sure as hell not getting any privacy with Proton. That’s for sure.

ScreaminOctopus@sh.itjust.works on 29 Aug 18:57 collapse

You can’t e2e the to and from headers in an email. that’s a problem with the protocol, not with proton. I’d assume the subject line falls into a similar bucket, because mailservers probably want to use it to filter spam

ramenu@lemmy.ml on 29 Aug 19:59 collapse

I never said anything about E2EE. Please re-read what I wrote carefully.

servobobo@feddit.nl on 29 Aug 15:12 next collapse

Centralized service with servers in the US, requires a phone number to create an account, and tech bros like it. “0% chance” 100% confirmed.

mipadaitu@lemmy.world on 29 Aug 16:14 collapse

community.signalusers.org/t/…/13243

freedom.press/…/crossfire-over-messaging-security…

freedom.press/training/locking-down-signal/

You don’t have to take Signal’s word for it, because it’s been audited. The EFF, who are VERY privacy minded, and do extensive research into this type of thing, recommends Signal because it’s known to be secure.

dessalines@lemmy.ml on 29 Aug 19:39 collapse

Does the EFF have access to signal’s server? Where they store all the phone numbers and messages for its users?

perestroika@lemm.ee on 29 Aug 16:39 next collapse

As a happy user of Signal (no bugs or incidents from my viewpoint), I regardless chime in to say a word for decentralization. :)

Signal is centralized:

  • there is a single Signal implementation, with a single developing entity
  • you have to install its mobile version before you may run the desktop version

There exist protocols like Tox which go a step beyond Signal and offer more freedom -> have multiple clients from diverse makers (some of them unstable), don’t have centralized registration, and don’t rely on servers to distribute messages - only to distribute contact information.

In the grand comparison table of protocols (not clients), Tox is among the few lines that’s all green (Signal has one red square).

possiblylinux127@lemmy.zip on 29 Aug 18:11 collapse

Tox isn’t the most secure or private. I would go Simplex Chat

x00za@lemmy.dbzer0.com on 30 Aug 01:00 collapse

Session seems really good.

(Except their crypto token bullcrap)

possiblylinux127@lemmy.zip on 30 Aug 01:23 collapse

Not anymore. They have made hostile changes are are screwing over there early adopters. It also lacks forward secrecy

EngineerGaming@feddit.nl on 30 Aug 21:32 collapse

And effectively cannot be selfhosted.

dessalines@lemmy.ml on 29 Aug 19:44 next collapse

This is the same Meredith Whittaker doing interviews with US defense-department aligned sites like LawFare.

Why are all these big tech sites like wired so interested in pushing signal anyway?

yogthos@lemmy.ml on 30 Aug 00:04 next collapse

I find it intriguing that the people will scrutinize messaging platforms such as Telegram, and explain in detail how one should not entrust their messages’ encryption keys to these services. Yet, these same people seem unable to comprehend the concerns regarding Signal server having access to phone numbers of its users. The fact that these people are able to perceive potential vulnerabilities in one platform while remaining oblivious to similar concerns on another highlights that their arguments are more ideological than rational.

dessalines@lemmy.ml on 30 Aug 00:17 collapse

For sure. I’m convinced signal is supported mainly for the same reason’s apple products are: it’s got a shiny user interface and it’s simple to use. That let’s them overlook all the privacy dangers behind the curtain.

A gigantic US-based service based on phone-number(meaning real identity) identifiers.

yogthos@lemmy.ml on 30 Aug 00:46 collapse

Exactly, it takes a lot of credulity to believe that the US government would just altruistically develop and fund a messaging platform that genuinely respects privacy. I recall somebody was talking about how collecting metadata is basically equivalent to having a private investigator follow you around, and I think that’s a great analogy. People tend to fixate on the content of the conversations, but the reality is that knowing who talks to whom is just as valuable.

doubtingtammy@lemmy.ml on 30 Aug 16:04 collapse

Do you think they’re lying to authorities when they get a search warrant? signal.org/bigbrother/santa-clara-county/ That would be quite a big deal, and someone will be going to jail if you’re right.

All they have is your phone number, the date the account was created, and the last time it connected to the service. Yes, that represents a vulnerability, but you;re just casting aspersions that the whole thing is compromised.

Maybe there is some super secret NSA back door that Signal engineers aren’t even aware of. But it’s at least pretty clear that the local fascist authorities aren’t getting that info even with a warrant.

yogthos@lemmy.ml on 30 Aug 16:16 collapse

I think that the operations of US government are very opaque, and it’s perfectly possible that Signal has to work with authorities like the NSA, while they don’t have to cooperate with other authorities. However, even in case they currently don’t cooperate that can’t be used as a guarantee that this will continue to be the case going forward.

The key point here is that if data is leaked it has to be assumed that it is used maliciously, privacy assessments cannot be trust based. And the motivations of the government funding and promoting Signal do matter in the calculus.

rottingleaf@lemmy.world on 30 Aug 10:42 collapse

Maybe the US government (or even “deep state” or something) has realized that making everyone use insecure devices for easier surveillance is as smart as forbidding fire exits so that people would be easier to arrest.

I haven’t heard too many bad things about Signal.

Various dictatorships want to simply read correspondence because the social graphs producing actual value and keeping stability in our world, and also protecting their embezzled value stored abroad, are all abroad too, and they won’t hurt these. Some politicians in the west want to invade privacy for the same reason - what they embezzle is stored in ways unaffected by insecure communications in their own countries.

But if you are part of some establishment, even if not well-meaning, you are interested to protect the system from outright erosion, meaning secure communications.

Other than that, WhatsApp and FB Messenger are owned by Zuck and he’s become too big to tolerate, Telegram is an African brothel with no protection and plenty of diseases, and in general it’s all corporate around.

Let’s please also remember that there are people of various views and interests in every organization and force.

sumguyonline@lemmy.world on 29 Aug 21:23 next collapse

Signal is compleletly compromised through spell check on 99% of OEM smart devices. Spell check can see what your typing word by word, and signal uses it. Feds are 100% using spell check to view your private messages. And by feds I mean every government on earth with a computer.

dessalines@lemmy.ml on 30 Aug 00:20 next collapse

Spell check? If you mean smartphone keyboards, then yes, the non-foss ones are keyloggers. One of my side-projects is a privacy-oriented keyboard, but there are many out there that don’t require network calls to google or apple.

figaro@lemdro.id on 30 Aug 11:56 collapse

Nah dude the red squiggly lines are actually CIA backdoors

x00za@lemmy.dbzer0.com on 30 Aug 00:59 next collapse

Where’s my alu hat?

You’re saying that hunspell is compromised??? :O

Hunspell is a free spell checker and morphological analyzer library and command-line tool, licensed under LGPL/GPL/MPL tri-license. Hunspell is used by LibreOffice office suite, free browsers, like Mozilla Firefox and Google Chrome, and other tools and OSes, like Linux distributions and macOS. It is also a command-line tool for Linux, Unix-like and other OSes.

sunstoned@lemmus.org on 30 Aug 08:37 next collapse

<img alt="" src="https://lemmus.org/pictrs/image/7cf9eff9-0ec1-4518-8bf8-58d2c5081a1e.webp">

Is this some Network Allowed problem that I’m too Network Not Allowed to understand?

kureta@lemmy.ml on 30 Aug 10:23 collapse

Are you using a custom rom? I don’t have this option on my oneplus 9 pro. but I have something else.

<img alt="" src="https://lemmy.ml/pictrs/image/34d3c142-97c2-4af0-b7e8-1f6665eb7b93.jpeg">

sunstoned@lemmus.org on 30 Aug 14:31 collapse

GrapheneOS! I’ve been using it for a few years. Never going back.

EngineerGaming@feddit.nl on 30 Aug 21:25 collapse

The problem is actually further - it’s that they push people to use Signal on mobile.

In the official desktop client, there is no option to register (even though it would likely be not that hard to add a box accepting a verification code), they tell you to use it in the mobile app instead. All while far from all phones can have privacy-respecting OSes installed on them at all.

Yes, there are ways around (Signal-cli or an Android VM - and even then you have to use Molly since the official client requires you to scan a QR rather than following a link). But arbitrarily directing people to a platform that is harder to make private is nonetheless weird.

beSyl@slrpnk.net on 30 Aug 11:46 collapse

The thing I hate about signal is the UI. Everything looks way too big on my device. WhatsApp, for example, holds 2 more chats, and the messages themselves are tidier.

This may seem like it’s not a big deal, but UI is absolutely crucial on order to get people to actually use the app. I moved a few people to signal but they just hated the way it looks. “seems like an app for old people, font too big”. I can see that. They moved back to insta/WhatsApp.

I think some small and easy UI changes could make the app much better: just give us a “compact” mode.

ChairmanMeow@programming.dev on 30 Aug 13:06 collapse

Both WhatsApp and Signal show the same amount of chats to me (9 for both). WhatsApp does show a small sliver of a tenth chat, but it’s not really properly visible. There is a compact mode for the navigation bar in Signal, which helps a bit here.

From what I can see there’s slightly more whitespace between chats, and Signal uses the full height for the chat (eg same size as the picture), whereas WhatsApp uses whitespace above and below, pushing the name and message preview together.

In chats the sizes seem about the same to me, but Signal colouring messages might make it appear a bit more bloated perhaps? Not sure.

beSyl@slrpnk.net on 30 Aug 13:58 collapse

For me, I can see 7 chats on signal, 9 chats on WhatsApp. There are tons of wasted space on signal for me. It just looks bad.