• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    5 months ago

    Signal isn’t federated. Signal has centralized servers. Signal requires phone number identification to use it. Signal stores your encryption key on their servers… Relying on sgx enclaves to ‘protrct’ your encryption key.

    Signal can go down. Signal knows who you talk to, just by message timing. Signal knows how frequently you talk to someone. Signal can decrypt your traffic by attack their own sgx enclaves and extracting your encryption key.

    These are all possible threats and capabilities. You have to decide what tradeoff makes sense to you. Fwiw I still use signal.

    • BearOfaTime@lemm.ee
      cake
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      5 months ago

      I just read the post (you linked) by signal. Note the use of the word “plaintext”.

      we don’t have a plaintext record of your contacts, social graph, profile name, location, group memberships, groups titles, group avatars, group attributes, or who is messaging whom.

      Whenever someone qualifies a statement like this, without clarifying, it’s clear they’re trying to obfuscate something.

      I don’t need to dig into the technical details to know it’s not as secure as they like to present themselves.

      Thanks. I didn’t realize they were so disingenuous. This also explains why they stopped supporting SMS - it didn’t transit their servers (they’d have to add code to capture SMS, which people would notice).

      They now seem like a honeypot.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        5 months ago

        They are very much not. Anyone who tells you this is a state influencer or someone who believed a state influencer.

        • jet@hackertalks.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          Saying something has the capabilities of a honeypot, is the correct thing to do when we’re assessing our threat model.

          Is it a honey pot? I don’t know. It’s unknowable. We have to acknowledge the the actual capabilities of the software as written and the data flows and the organizational realities.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 months ago

        Secure within the context of a certain threat model.

        The French government does not endorse signal for government communication as an example

        And I would highly suspect the Russian government would not use signal either.

        I cite both of these as examples of threat models that can’t ignore some of the potential capability of the signal.