I just read the post (you linked) by signal. Note the use of the word “plaintext”.
we don’t have a plaintext record of your contacts, social graph, profile name, location, group memberships, groups titles, group avatars, group attributes, or who is messaging whom.
Whenever someone qualifies a statement like this, without clarifying, it’s clear they’re trying to obfuscate something.
I don’t need to dig into the technical details to know it’s not as secure as they like to present themselves.
Thanks. I didn’t realize they were so disingenuous. This also explains why they stopped supporting SMS - it didn’t transit their servers (they’d have to add code to capture SMS, which people would notice).
Saying something has the capabilities of a honeypot, is the correct thing to do when we’re assessing our threat model.
Is it a honey pot? I don’t know. It’s unknowable. We have to acknowledge the the actual capabilities of the software as written and the data flows and the organizational realities.
I just read the post (you linked) by signal. Note the use of the word “plaintext”.
Whenever someone qualifies a statement like this, without clarifying, it’s clear they’re trying to obfuscate something.
I don’t need to dig into the technical details to know it’s not as secure as they like to present themselves.
Thanks. I didn’t realize they were so disingenuous. This also explains why they stopped supporting SMS - it didn’t transit their servers (they’d have to add code to capture SMS, which people would notice).
They now seem like a honeypot.
They are very much not. Anyone who tells you this is a state influencer or someone who believed a state influencer.
Saying something has the capabilities of a honeypot, is the correct thing to do when we’re assessing our threat model.
Is it a honey pot? I don’t know. It’s unknowable. We have to acknowledge the the actual capabilities of the software as written and the data flows and the organizational realities.