11 points

Signal’s hostility to third party clients is a huge red flag.

They also refuse to distance themselves from Google’s app store.

permalink
report
reply
-2 points

What? How is this a red flag? Having third party clients is not good for security.

permalink
report
parent
reply
7 points

Is there any merit to this comment?

permalink
report
parent
reply
19 points

When you use a client, you are relying on the client’s crypto implementation to be correct. This is only one part of it and there’s a lot more to it when it comes to hardening the program. Signal focuses on their desktop and mobile clients and they hire actual security professionals and cryptographers (unlike the charlatans in this thread) to implement it correctly.

Having third party clients would not definitively mean the client is bad, but it most likely would break the security model. Just take a look at Matrix’s clients.

permalink
report
parent
reply
11 points
*

Having third party clients is not good for security.

If the first party provider told you this, you should always second guess them.

Moreover, providing an option that informed users can choose doesn’t hurt security. This idea the user can’t be trusted to use the appropriate type of messaging if provided options needs to die.

permalink
report
parent
reply
1 point

Why do you think so? I see it as a strength in diversity and a great driving force for a proper server api

permalink
report
parent
reply
-3 points

Do you hate Signal or do you hate the west? There legitimate reasons to not like Signal but calling them hostile toward third party clients is untrue. Last time I checked Signal wasn’t proprietary.

permalink
report
parent
reply
7 points

They have demonstrated history of asking third party clients to not use the signal name, and not use the signal network. The client that currently exists that do this do it against the wishes of the signal foundation

permalink
report
parent
reply
11 points

They have demonstrated history of asking third party clients to not use the signal name, and not use the signal network.

The lead developer, nearly 10 years ago now, specifically asked LibreSignal to stop. A single event does not make a demonstrated history.

The client that currently exists that do this do it against the wishes of the signal foundation

If you have evidence to back this claim, I would like to see it so I can stop spreading misinformation.

permalink
report
parent
reply
50 points

That’s outdated information:

Go forth and contribute, fork, or create your own.

They also refuse to distance themselves from Google’s app store.

This link has existed forever at this point if we count in internet years: https://signal.org/android/apk/ - getting an app directly from the developer with no middleman is about as distant as you can get from Google’s app store.

permalink
report
parent
reply
9 points

Those clients exist despite Signal Foundation, not because they encourage community development. They are doing everything they can to discourage third party app development.

permalink
report
parent
reply
12 points

They are doing everything they can to discourage third party app development.

I’d say you’re moving the goalpost. Other than the hostility the founder showed towards LibreSignal nearly 10 years ago now, can you source any evidence to support your claim?

permalink
report
parent
reply
6 points

I wish they had Signal on F-droid but at the end of the day at least it is possible to use Molly Foss.

permalink
report
parent
reply
1 point

Signal actually has a rule on not using third party clients on its servers. These clients existing do not prove the point you intend.

permalink
report
parent
reply
1 point

can you post a link to this rule?

permalink
report
parent
reply
28 points
*

Yeah, I would like to use it from f-droid instead of google store or apk

permalink
report
parent
reply
23 points
*

https://molly.im/ Especially the FOSS version. Need to manually add the repository though.

permalink
report
parent
reply
2 points

Or use Accrescent

permalink
report
parent
reply
5 points

This is the way.

permalink
report
parent
reply
-7 points

Yeah, Signal is more than encrypted messaging it’s a metadata harvesting platform. It collects phone numbers of its users, which can be used to identify people making it a data collection tool that resides on a central server in the US. By cross-referencing these identities with data from other companies like Google or Meta, the government can create a comprehensive picture of people’s connections and affiliations.

This allows identifying people of interest and building detailed graphs of their relationships. Signal may seem like an innocuous messaging app on the surface, but it cold easily play a crucial role in government data collection efforts.

Also worth of note that it was originally funded by CIA cutout Open Technology Fund, part of Radio Free Asia. Its Chairwoman is Katherine Maher, who worked for NDI/NED: regime-change groups, and a member of Atlantic Council, WEF, US State Department Foreign Affairs Policy Board etc.

permalink
report
reply
2 points

This message is definitely giving all the vibes of a disinformation/misinformation attempt. There is no metadata to harvest from signal.

Here is an example of all the extent of data that signal has on any given user: https://signal.org/bigbrother/cd-california-grand-jury/

It involves phone number, account creation time and last connected time. That’s it. Nothing more.

The cross referencing of data is just nonsense. Google and meta already have your phone number. Adding signal info to it adds absolutely zero information to them. They have it all already. They know nothing of who you talk with, which groups you are part of.

The funding of Signal did involve public grants but that’s not anything bad. Many projects and nonprofits receive public money. It does not imply that there are backdoors or anything like that. And signal was purposefully designed so that no matter who owns and operates it, the messages stay hidden independently on the server infrastructure. They did the best possible to remove themselves from the chain of trust. Expert cryptographers and auditors trust signal. Don’t listen to this random ramble of an online stranger whose intentions are just to confuse you and make you doubt.

permalink
report
parent
reply
7 points

Signal’s hostility to 3rd party clients is a huge red flag.

permalink
report
parent
reply
5 points

Can you further explain? A red flag to open-source, federation and such, can’t disagree. But to privacy and security? I’m not convinced.

permalink
report
parent
reply
12 points
*

It’s fascinating that these kinds of trolls come out of the woodwork any time obvious problems with Signal are brought up.

Phone numbers very obvious are metadata. If you think that cross referencing data is nonsense then you have absolutely no clue what you’re talking about. It’s not about Google or Meta having your phone number, it’s about having a graph of people doing encrypted communication with each other over Signal. The graph of contacts is what’s valuable.

Don’t listen to this random ramble of an online stranger whose intentions are just to confuse you and make you doubt.

What you absolutely shouldn’t listen to are trolls who tell you to just trust that Signal is not abusing the data it’s collecting about you. The first rule of security is that it can’t be faith based.

permalink
report
parent
reply
-4 points

What are you talking about? you get a phone number from signal, and what will you be able to derive from it? there is no graph. signal does not hold any “relationships” information.

permalink
report
parent
reply
-7 points

Its the tankies.

Honestly if they can recommend something better I’m all for it but I haven’t heard anything.

permalink
report
parent
reply
1 point
*

Take a look here for some alternatives:

https://dessalines.github.io/essays/why_not_signal.html#good-alternatives

  • Matrix
  • XMPP
  • Briar
  • SimpleX

Also just because there are no alternatives doesn’t mean your default position should be we just have to trust whatever exists now because it’s good enough. Or that we can’t criticize it ruthlessly, distrust it. Call it out and as a result of that build perhaps the desire for something better, a fix as it were.

The evidence and history clearly points towards Signal being very suspicious and likely in bed with the feds. This is not conspiracy thinking. Conspiracy thinking is thinking that the country/empire that gave away old German engima machines whose code they’d cracked to developing countries without telling them they’d cracked it in the late 40s/early 50s, that went on to establish a crypto company just to subvert its encryption. That’s done everything Snowden revealed has in fact changed suddenly for the first time in half a century for no particular reason and not to its own benefit. That’s fanciful thinking. That’s a leap of logic away from the proven trends, the pattern of behavior, and indeed the incentivizes to continue using their dominant position to maintain dominance and power. They didn’t back down on the clipper chip because they just gave up and decided to let people have privacy and rights. They gave up on it because they found better ways of achieving the same results with plausible deniability.

Also why is everything “tankies” with you people. Privacy advocates point out the obvious and suddenly it’s a communist conspiracy. LOL

permalink
report
parent
reply
5 points

Yog is gettin downvoted by dotworld feds but as usual is undefeated in the comments.

permalink
report
parent
reply
4 points

😄

permalink
report
parent
reply
2 points

There is no metadata harvesting on Signal and the use of a phone number is so convenient and helped massively with adoption from the general unaware public.

I loved that it acted as a private and secure drop in replacement for SMS (particularly before they removed that integration) that does what I needed and does it very well and easily connects me with people that already have my number. This made sharing Signal very easy. The only data Signal has to even provide to the authorities is your registration date, phone number, and time of last connection. The absolute minimum. It’s fantastic. If you compare this to Whatsapp which has everything but the exact content of your messages, it’s not even a contest.

For myself on Signal and everyone else I’ve known that that uses Whatsapp or Insta or whatever, the extra absolute anonymity of also removing phone numbers from the already small equation just isn’t needed or worth it, otherwise you wouldn’t be using Signal, let alone fucking Facebook.

permalink
report
parent
reply
6 points

You can believe whatever you want of course, but the reality is that Signal collects phone numbers on registration and these can be used in many ways. The fact that you chose to trust Signal to be a good actor is your prerogative, but it’s based purely on your faith which is not how privacy or security works.

permalink
report
parent
reply
-2 points
Deleted by creator
permalink
report
parent
reply
5 points

So no Tor either bc started by US Naval Research Lab?

permalink
report
parent
reply
5 points

If Tor leaks data about you then yes you should also be concerned about that.

permalink
report
parent
reply
-1 points
*

That has nothing to do with the team behind it. Also it is the best tool right now even if it isn’t perfect. You just need to be aware of its limitations. (For the love of god turn off JavaScript)

I hate to break it to you but the internet itself was created by the US.

permalink
report
parent
reply
1 point

Wait until you here about DARPA

permalink
report
parent
reply
6 points

It collects phone numbers of its users, which can be used to identify people making it a data collection tool that resides on a central server in the US. By cross-referencing these identities with data from other companies like Google or Meta, the government can create a comprehensive picture of people’s connections and affiliations.

That’s fuck up. I always found bad to have the phone number as requirement but that’s make a lot of sense.

permalink
report
parent
reply
6 points

Indeed, the fact that the phone number is a requirement is a huge red flag for any platform that claims to care about privacy.

permalink
report
parent
reply
0 points

Phone numbers are no longer required iirc

permalink
report
parent
reply
3 points

Phone numbers are no longer required iirc

Phone numbers are still required to register and maintain an account. Only difference now is you can choose to hide it from other users and give people a ‘username’ to look you up with instead.

permalink
report
parent
reply
4 points

I use the Molly-FOSS fork, do you know if that removes the metadata collection? I know it doesn’t use any Google Play Services and it comes with its own notification bubble though.

permalink
report
parent
reply
2 points

Signal does not collect metadata.

https://signal.org/blog/sealed-sender/

permalink
report
parent
reply
9 points

that amounts to trust me bro since nobody actually knows what the server does with the data

permalink
report
parent
reply
5 points
*

I’m not very tech-savvy, and that article looks very nice, but it’s kind of old and it’s true that they haven’t been as transparent (and frequently audited) as other services and they still require a phone number to set up an account, even if you can switch to only using a username later. Also, they removed encrypted database, and Molly brings that back which is the main reason I use it. Another thing I don’t like about Signal is how ferociously they’ve tried to shut down forks in the past, and how they don’t say that you need Google Play Services for it to work properly. Sadly it’s the only “privacy-conscious” service I’ve managed to make most of my family and friends use, after trying for years.

permalink
report
parent
reply
-1 points

They have your phone number and time stamps. Nothing more nothing less. Also chances are that isn’t being used to create a massive social graph or whatever the Lemmy.ml users are going on about.

For most people it doesn’t matter. Signal has the benefit of being widely adopted and being easy to use. Simplex Chat is another alternative although it isn’t as well funded or as well known.

permalink
report
parent
reply
5 points

It doesn’t because you’re still talking to the same server.

permalink
report
parent
reply
3 points

I see. Thanks.

permalink
report
parent
reply
4 points

Cross referenced you on the sister thread.

People there positing that this is no correct. Granted their info appears to be signal “disclosed” to the feds as part of a court proceed what it collects, which is only apparently when you connect to the server.

Doesnt answer the issue if they could collect your call logs though

permalink
report
parent
reply
12 points

My reply from the other thread. People who claim this isn’t true aren’t being honest. The phone number is the key metadata. Meanwhile, nobody outside the people who are actually operating the server knows what it’s doing and what data it retains. Faith based approach to privacy is fundamentally wrong. Any data that the protocol leaks has to be assumed to be available to adversaries.

Furthermore, companies can’t disclose if they are sharing data under warrant. This is why the whole concept of warrant canary exists. Last I checked Signal does not have one.

https://en.wikipedia.org/wiki/Warrant_canary

permalink
report
parent
reply
9 points

phone number isn’t just any metadata; it is the anchoring data around which the rest of metadata is collected, and it is also connected to govt/corporate verified real identity.

why would anyone even claim to offer privacy around such an anchor ?

permalink
report
parent
reply
12 points

JWZ seven years ago: Signal

When you install Signal, it asks for access to your contacts, and says very proudly, “we don’t upload your contacts, it all stays on your phone.”

And then it spams all of your contacts who have Signal installed, without asking your first.

And it shares your phone number with everyone in your contacts who has Signal installed.

And then when you scream ARE YOU FUCKING KIDDING ME and delete your account and purge the app, guess what? All those people running Signal still have your phone number displayed for them right there in plain text. Deleting your account does not delete the information that the app shared without your permission.

So yeah. Real nice “privacy” app you’ve got there.

Update, 2018: Subsequently.

permalink
report
parent
reply
6 points

This is really interesting. It brings two questions to mind.

  1. Don’t all messaging apps use phone number as a primary metadata value?

  2. Are you suggesting that Signal could either not use this metadata or not collect it and yet they choose to collect it and can therefore lose it to exfiltration or warrant?

permalink
report
parent
reply
11 points
*

Yeah, Signal is more than encrypted messaging it’s a metadata harvesting platform. It collects phone numbers of its users, which can be used to identify people making it a data collection tool that resides on a central server in the US. By cross-referencing these identities with data from other companies like Google or Meta, the government can create a comprehensive picture of people’s connections and affiliations.

This allows identifying people of interest and building detailed graphs of their relationships. Signal may seem like an innocuous messaging app on the surface, but it cold easily play a crucial role in government data collection efforts.

Strictly speaking, the social graph harvesting portion would be under the Google umbrella, as, IIRC, Signal relies on Google Play Services for delivering messages to recipients. Signal’s sealed sender and “allow sealed sender from anyone” options go part way to addressing this problem, but last I checked, neither of those options are enabled by default.

However, sealed sender on its own isn’t helpful for preventing build-up of social graphs. Under normal circumstances, Google Play Services knows the IP address of the sending and receiving device, regardless of whether or not sealed sender is enabled. And we already know, thanks to Snowden, that the feds have been vacuuming up all of Google’s data for over a decade now. Under normal circumstances, Google/the feds/the NSA can make very educated guesses about who is talking to who.

In order to avoid a build-up of social graphs, you need both the sealed sender feature and an anonymity overlay network, to make the IP addresses gathered not be tied back to the endpoints. You can do this. There is the Orbot app for Android which you can install, and have it route Signal app traffic through the Tor network, meaning that Google Play Services will see a sealed sender envelope emanating from the Tor Network, and have no (easy) way of linking that envelope back to a particular sender device.

Under this regime, the most Google/the feds/the NSA can accumulate is that different users receive messages from unknown people at particular times (and if you’re willing to sacrifice low latency with something like the I2P network, then even the particular times go away). If Signal were to go all in on having client-side spam protection, then that too would add a layer of plausible deniability to recipients; any particular message received could well be spam. Hell, spam practically becomes a feature of the network at that point, muddying the social graph waters further.

That Signal has

  1. Not made sealed sender and “allow sealed sender from anyone” the default, and
  2. Not incorporated anonymizing overlay routing via tor (or some other network like I2P) into the app itself, and
  3. Is still in operation in the heart of the U.S. empire

tells me that the Feds/the NSA are content with the current status quo. They get to know the vast, vast majority of who is talking (privately) to who, in practically real time, along with copious details on the endpoint devices, should they deem tailored access operations/TAO a necessary addition to their surveillance to fully compromise the endpoints and get message info as well as metadata. And the handful of people that jump through the hoops of

  1. Enabling sealed sender
  2. Enabling “allow sealed sender from anyone”
  3. Routing app traffic over an anonymizing overlay network (and ideally having their recipients also do so)

can instead be marked for more intensive human intelligence operations as needed.

Finally, the requirement of a phone number makes the Fed’s/the NSA’s job much easier for getting an initial “fix” on recipients that they catch via attempts to surveil the anonymizing overlay network (as we know the NSA tries to). If they get even one envelope, they know which phone company to go knocking on to get info on where that number is, who it belongs to, etc.

This too can be subverted by getting burner SIMs, but that is a difficult task. A task that could be obviated if Signal instead allowed anonymous sign-ups to its network.

That Signal has pushed back hard on every attempt to remove the need for a phone number tells me that they have already been told by the Feds/the NSA that that is a red line, and that, should they drop that requirement, Signal’s days of being a cushy non-profit for petite bourgeois San Francisco cypherpunks would quickly come to an end.

permalink
report
parent
reply
-1 points

Law enforcement doesn’t request data frequently enough in order to build a social graph. Also they probably don’t need to as Google and Apple likely have your contacts.

Saying that it is somehow a tool for mass surveillance is frankly wrong. It has its issues but it also balances ease of use. It is the most successful secure messager out there. (WhatsApp doesn’t count)

Sure it has problems. I personally don’t understand there refusal to be on F-droid. However, phone numbers are great for ease of use and help prevent spam. You need to give your personal information to get a phone number. Signal also has very nice video calls which no other messager can seem to replicate.

permalink
report
parent
reply
4 points

Law enforcement doesn’t request data frequently enough in order to build a social graph. Also they probably don’t need to as Google and Apple likely have your contacts.

They don’t need to request data. They have first-class access to the data themselves. Snowden informed us of this over a decade ago.

Saying that it is somehow a tool for mass surveillance is frankly wrong.

Signal per se is not the mass surveillance tool. Its dependence on Google is the mass surveillance tool.

However, phone numbers are great for ease of use and help prevent spam.

And there’s nothing wrong with allowing that ease-of-use flow for users that don’t need anonymity. The problem is disallowing anonymous users.

permalink
report
parent
reply
7 points

Incidentally, this explains why Signal insists that the app has to be installed through the Play store as opposed to f-droid.

permalink
report
parent
reply
5 points

Strictly speaking, you can download it directly from their website, but IIRC, the build will still default to trying to use Google Play Services, and only fall back to a different service if Google Play Services is not on the device. Signal really, really wants to give Google insight into who is messaging who.

permalink
report
parent
reply
4 points
*

Anyone who has any experience with centralized databases, would be able to tell you how useless sealed sender is. With message recipients and timestamps, it’d be trivial to discover who the senders are.

Also, signal has always had a cozy relationship with the US (radio free asia was it’s initial funder) . After yasha levine posted an article critical of signal a few years back, RFA even tried to do damage control at a privacy conference on signal s behalf:

Libby Liu, president of Radio Free Asia stated:

Our primary interest is to make sure the extended OTF network and the Internet Freedom community are not spooked by the [Yasha Levine’s] article (no pun intended). Fortunately all the major players in the community are together in Valencia this week - and report out from there indicates they remain comfortable with OTF/RFA.

These are high-up US government employees trying to further spread signal.

You can read more about this here.

permalink
report
parent
reply
2 points

A really excellent writeup!

permalink
report
parent
reply
-5 points
*

0% chance that the feds don’t have Signal backdoors, otherwise Wired wouldn’t be promoting it. fyi everyone Proton is CIA. It’s modern cryptoAG.

permalink
report
reply
4 points

Centralized service with servers in the US, requires a phone number to create an account, and tech bros like it. “0% chance” 100% confirmed.

permalink
report
parent
reply
5 points

Well, I disagree about Signal. Proton however, I agree is extremely shady and should be avoided at all costs.

permalink
report
parent
reply
10 points

That’s pretty strong and I’ve never seen or heard anything like it before. If it’s true I’m betting the rest of Lemmy would like some details, too.

permalink
report
parent
reply
1 point

No support for Monero despite it being requested on uservoice 6 years ago. A Bitcoin wallet (seriously?) which is easily traceable. Important email metadata is also not zero access encrypted (i.e., subject headers, from/to headers) which leaks a substantial amount of information even if the body is encrypted. Not to mention they had clearnet redirects from their onion service a while back, something a lot of honeypots usually do.

Even if it’s not a honeypot, you’re sure as hell not getting any privacy with Proton. That’s for sure.

permalink
report
parent
reply
13 points

https://community.signalusers.org/t/overview-of-third-party-security-audits/13243

https://freedom.press/newsletter/crossfire-over-messaging-security/

https://freedom.press/training/locking-down-signal/

You don’t have to take Signal’s word for it, because it’s been audited. The EFF, who are VERY privacy minded, and do extensive research into this type of thing, recommends Signal because it’s known to be secure.

permalink
report
parent
reply
5 points

Does the EFF have access to signal’s server? Where they store all the phone numbers and messages for its users?

permalink
report
parent
reply
8 points

Isn’t Signal at least partially funded by the agency?

permalink
report
reply
-2 points

What part of non-profit and open-source do you not understand?

Review the source, build it yourself, be happy. It uses well-known assymetric encryption algorithms. Not much your agency could really do here even if they harvest all the traffic from the server.

permalink
report
parent
reply
4 points

Was my fucking question about the integrity of the algorithms they use, or was it about who’s been funding the product? Because a quick web search will show you that they did in fact fund it at one point.

permalink
report
parent
reply
8 points

And so what? You could be an oil dictatorship prince and donate a billion to Signal. It’s not going to compromise it in any way that is not directly auditable.

So, your fuckin question is misguided. You’re “only asking questions” while implying intent.

permalink
report
parent
reply
10 points

No, they found some billionaires to do it 😉

permalink
report
parent
reply
7 points

Signal is compleletly compromised through spell check on 99% of OEM smart devices. Spell check can see what your typing word by word, and signal uses it. Feds are 100% using spell check to view your private messages. And by feds I mean every government on earth with a computer.

permalink
report
reply
2 points

The problem is actually further - it’s that they push people to use Signal on mobile.

In the official desktop client, there is no option to register (even though it would likely be not that hard to add a box accepting a verification code), they tell you to use it in the mobile app instead. All while far from all phones can have privacy-respecting OSes installed on them at all.

Yes, there are ways around (Signal-cli or an Android VM - and even then you have to use Molly since the official client requires you to scan a QR rather than following a link). But arbitrarily directing people to a platform that is harder to make private is nonetheless weird.

permalink
report
parent
reply
23 points

Spell check? If you mean smartphone keyboards, then yes, the non-foss ones are keyloggers. One of my side-projects is a privacy-oriented keyboard, but there are many out there that don’t require network calls to google or apple.

permalink
report
parent
reply
5 points

Nah dude the red squiggly lines are actually CIA backdoors

permalink
report
parent
reply
10 points

Where’s my alu hat?

You’re saying that hunspell is compromised??? :O

Hunspell is a free spell checker and morphological analyzer library and command-line tool, licensed under LGPL/GPL/MPL tri-license. Hunspell is used by LibreOffice office suite, free browsers, like Mozilla Firefox and Google Chrome, and other tools and OSes, like Linux distributions and macOS. It is also a command-line tool for Linux, Unix-like and other OSes.

permalink
report
parent
reply
17 points

Is this some Network Allowed problem that I’m too Network Not Allowed to understand?

permalink
report
parent
reply
6 points

Are you using a custom rom? I don’t have this option on my oneplus 9 pro. but I have something else.

permalink
report
parent
reply
10 points

GrapheneOS! I’ve been using it for a few years. Never going back.

permalink
report
parent
reply

Privacy

!privacy@lemmy.ml

Create post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

Community stats

  • 7.4K

    Monthly active users

  • 2.8K

    Posts

  • 75K

    Comments