Skip to main content


Sheesh, the US is sure getting scary. Well, it's a good thing it would be impossible to trace Signal to someone via metadata like a phone number, right?


Even State Department-funded Human Rights Watch admits that authorities combine legal and illegal methods to obtain convictions: text.hrw.org/report/2018/01/09…

Combining dragnet surveillance with device hacking is intended in the design of both tools. Hence, State Department-funded Signal dupes you into handing over your identity as part of the population-centric mapping. In custody, your phone will be hacked when it is taken away if it's important.

xcancel.com/hannahcrileyy/stat…

This entry was edited (1 week ago)
in reply to DJ Putler

What evidence do you have that Signal collects anything? Traffic logs from the app or something?
in reply to rezz

Phone numbers havent been required for at least like a year or so
in reply to TwiddleTwaddle

Hm now I wonder what to do about that, as they have had my number for a while now.
in reply to TwiddleTwaddle

Do they let you sign up purely with username and password? Or do they make you use insecure email?
in reply to Natanael

Signal doesn't need to, you need to trust the whole chain. You'll need to trust AWS, you need to trust Intel SGX, etc
in reply to wildbus8979

At that point you can rely on nothing but Tor or I2P

Nothing else hides metadata better than Signal, without involving large networks of independent nodes that participate in Sybil resistant routing. The only thing that gets close is threshold schemes where you still need multiple independent entities running servers.

This entry was edited (1 week ago)
in reply to Natanael

You can check if a number is registered with Signal just by having Signal and starting a chat with that number
in reply to akilou

They changed that. You can make yourself undiscoverable by just the number now
in reply to DJ Putler

We're supposed to take privacy advice from someone posting on X?
in reply to akilou

Surprised that they didn't link straight to Telegram.
in reply to Hominine

  1. How does it feel to be on my nuts? 2. I get Telegram channels through RSS and let you work out the rest. I will if I want to.
in reply to akilou

Lol this looks like the regular X app to you does it?
in reply to DJ Putler

More anti-signal propaganda? Who is claiming it can’t be associated to a user. The messages are private, not anonymous.
in reply to theherk

It does use deniable encryption, but that stops working as a defense the second they take your phone and copy all logs from your device.

And large group chats relies on how well you can vet participants more than it relies on encryption itself, and if they're too large they may as well not be encrypted.

This entry was edited (1 week ago)
in reply to Natanael

Orgs in my town have seen this first-hand. People are out here learning secure comm practices the hard way.
in reply to DJ Putler

This is total alarmist misinformation. The "evidence of terrorism" was not "using Signal" or "carrying a first aid kit", it was taking part in an armed assault on an immigration facility where a dozen people set off fireworks and shot a police officer with an AR-15.

The prosecution used the presence of the first aid kit they carried during their armed assault, along with actual messages (not metadata) from a Signal chat to make the case that the attackers planned on using violence.

There are a lot of problems with this case, IMO the most dangerous part here is that adds legitimacy the (false) idea that "antifa" is an organization that exists. Something the Trump administration has been struggling to prove. This X post takes small details out of context.

  1. Don't trust anything ever posted to X. Especially something that discourages the use of private messaging apps.
  2. I highly recommend everyone report this this post to your admins and strongly recommend all instance admins ban/warn accounts like OP. If we want the fediverse to catch on it needs to be more factual, not knee jer.
This entry was edited (1 week ago)
in reply to James R Kirk

it was taking part in an armed assault on an immigration facility where a dozen people set off fireworks and shot a police officer with an AR-15.


based

in reply to Skullgrid

Whoever they think did it They didn’t do it we were bowling together at that time
in reply to James R Kirk

Thing is that there are actual privacy respecting messaging apps like SimpleX Chat. Signal isn't one of them. It's run by people associated with US intelligence, it's hosted on a single server based in the US, and it actively harvests phone numbers. It's incredible that people look at this and still claim it's a private messaging app.
in reply to James R Kirk

in reply to DJ Putler

It's alarmist to say that a jury decided using Signal is evidence of terrorism
in reply to mfed1122

Do you think they won't do the same to my favorite apps?

CIA-funded outlet The Intercept here points out the CIA considers Signal software for terrorists and later recommended "highly-targeted individuals" use it (these are both endorsements to different audiences). Since e2ee software is viewed as a threat, how should we take the US govt singling out Signal for endorsement like this? Is the CIA being nice and helpful? web.archive.org/theintercept.c…

This entry was edited (1 week ago)
in reply to DJ Putler

The jury didn't say using Signal was evidence of terrorist activity, though. That's why it's alarmist to say the jury said that - because they didn't. At least, not to my knowledge?
in reply to James R Kirk

along with actual messages (not metadata) from a Signal chat to make the case that the attackers planned on using violence


How did they get the actual messages? Signal chats and groups are supposed to be encrypted. I'm curious.

in reply to 0_o7

Most likely had someone in the group chat (opsec issue) or captured a phone and made the owner open it.

xkcd.com/538/

This entry was edited (1 week ago)
in reply to DJ Putler

in reply to davel

yeah that makes the whole thing even more sketch, I love how he never replies to the EFF link too
This entry was edited (1 week ago)
in reply to DJ Putler

Some people are very protective of Signal.
- Reason: Disinformation
- Reason: privacy rule #3: "Try to keep things on topic"
- Reason: Misinfo, alarmism
- Reason: This is harmful disinformation

Why not Signal?

in reply to choco_crispies

The essay being linked to was posted (authored?) by dessalines from lemmy.ml

You may have missed the sarcasm.

This entry was edited (1 week ago)
in reply to DJ Putler

In custody, your phone will be hacked when it is taken away if it's important.


Unless I turned off the USB port...

in reply to Collatz_problem [comrade/them]

If you have info about someone getting a graphene phone to turn the USB back on, please share as I'd like to read about it.

I don't think saying the state can torture us for info is a phone security issue per se. Especially since the only way to avoid imperial state violence is to shut up and do nothing and hope they don't come for you anyway

in reply to gnuthing [they/them]

I wouldn't bet my life on GrapheneOS in person despite being a fan of the project due to wanting to treat my phone as a computer

*actually forgot to mention they charged the duress password guy with destruction of evidence this isn't speculative at all lmao

This entry was edited (1 week ago)
in reply to DJ Putler

personally, my bet is that they don't have anyone qualified enough to pull off an exploit like that (on me).

the problem with my bet: what we've seen is that they won't care, and accuse individuals of terrorism based off the color of their clothes.

in reply to f3nyx

I just refuse to believe Google doesn't have some kind of hardware backdoor, or that Motorola won't once that is up and running.
in reply to DJ Putler

hardware vulnerabilities undoubtedly exist, whether intentional or not. its simply the nature of designing these complex semiconductors.

that said, if one company intentionally creates a backdoor, won't they all? what phone do you buy at that point?

any startup or small phone company may not have intentional backdoors, but I can guarantee their hardware security on all other levels pales to what apple and google can accomplish. I think the question then becomes are you more worried about google having a backdoor, or about third party compromises?

im not a fan of our choices, there is no silver bullet.

in reply to f3nyx

It’s about knowing that any phone can have a backdoor and being careful on how you use it. Don’t bring your phone to a protest.
in reply to DJ Putler

Yeah tails does have graphene beat, but a lot of folks see a phone as a necessity. Graphene is best if you're gonna have a phone. It can turn off the USB port where it can't even be charged without being off. It can reboot itself if not unlocked frequently enough, putting the phone back into a BFU state.

Now it's possible that there's some exploit a state knows that is not public, but the software they generally use does not work on graphene as long as you are not running a pre-2022 version of graphene. Someone else mentioned rubber-hose cryptanalysis, but like if I'm getting beat for my unlock, then what do I care about getting charged with destruction of evidence?

in reply to DJ Putler

I really don't get the big "use signal" push at this point in time because even if it's private and the encryption is solid, it's a fucking American company. It's so easy for letter agencies to get information on their users from them, don't you realize that they can't refuse to give out your number if they ask for it and that once they have that your identity and location are immediately and thoroughly compromised? If you are subject to US jurisdiction and could be seen in any way as opposing its government, I really don't think you should be using it.
in reply to floquant

Because its one of the only popular secure methods of communication thats app based.
in reply to floquant

All giving out your number provides is that you have ever used Signal.

They're saying ever using a private chat service is terrorism. That's not really on Signal.

in reply to rumba

All your phone number provides is that you have ever used signal? Not what tower you're connected to and therefore approximate realtime location? Your full identity via your telco? Social graph and history of your calls and texts?

I'm not saying it's their fault or that they are volunteering any information, but that's how it is for any US-based corporation (doesn't matter if it's a nonprofit, any legal entity that can be subpoenaed)

in reply to floquant

The government already has access to every phone number in existence. They can already track every phone to figure out who attended a protest or whatever. Filtering down to "all phone numbers who've ever connected to Signal" doesn't exactly narrow anything down. They don't have any metadata about who you were chatting with.
in reply to xthexder

The government already has access to every phone number in existence


They used to publish them in big books, even

in reply to xthexder

government already has access to every phone number in existence


that's precisely why you should not trust services that require it as private. phone number = identification.

plus apparently your government considers you a terrorist if you do.

This entry was edited (1 week ago)
in reply to floquant

If the only data surfacable from Signal is the phone number, not the crypto conversation, they didn't source you on signal and get your number, they got your number through other means and used it to prove you use signal.

They can't see the conversation to contents to supoena the number to id.

in reply to floquant

This is fundamentally not how Signal works, but you are generally correct in that a phone number has been shown to provide a lot of context for a person (or a device, at least). But Signal (the app) only uses a phone number for initial verification of an account. You have a lot of options to break that association with you - use a landline and get a call verification code, use a VoIP number (assuming you trust the provider), use a burner SIM, etc.

Once you have an account, you can choose to identify yourself on the network solely via username so the registration number is not presented to other users. The Signal protocol itself is well-audited and generally secure.

If your issue is with Signal the American company, use an open source fork like Molly with your own UnifiedPush instance. Then you're only trusting them with transport of your encrypted messages, which again have shown to be secure at least in public audits.

in reply to jabberwock

it all does not matter when most people register with their primary phone number that is already tied to their name
in reply to WhyJiffie

I still don't get it. What is bad about signing up with your phone number? All readable Info that governments can force out of Signal is. "Yep this guy uses Signal, signed up last year" so nothing is lost (except if they use that as a sign you are a terrorist, but then they just wanted to monitor you anyway in the first place)
in reply to Paulemeister

except if they use that as a sign you are a terrorist, but then they just wanted to monitor you anyway in the first place


exactly. what is the question?

also its not "monitor me" and "monitor you", but "monitor whoever is using the service" more closely, and as it seems, retaliate against them.

in reply to WhyJiffie

The question is: What privacy do I loose by signing up to Signal with a phone number instead of hypothetically a username.

If you are being monitored, they know your phone number. With that they know you are using Signal, but nothing more. Messaging through Signal is safe.

If you are not being monitored, nobody knows you are using Signal. Messaging through Signal is safe

in reply to Paulemeister

The question is: What privacy do I loose by signing up to Signal with a phone number instead of hypothetically a username.


if you could sign up with a username, your account couldn't be linked to a real world identity. also the government wouldn't have a phone number to send state malware to (unlike signal the telephony system is full of security vulnerabilities)

If you are being monitored, they know your phone number.


if you personally are monitored then yes they know your phone number. but here it's the other way around. you became a person of interest because you use signal.

If you are not being monitored, nobody knows you are using Signal.


no. everybody who has the power to issue data requests to signal, and also has access to a database binding phone numbers to identities, knows that you are using signal.

in reply to WhyJiffie

Ah ok now I get what you mean. Hashing for phone numbers is ineffective so it's a two way lookup. Is the population using Signal small enough that this doesn't just equate to surveiling everybody?
in reply to jabberwock

I was putting my kid on Signal to join the family chat, he didn't have service, so we just used wifi. I don't know for sure that this hasn't changed, but when I tried, they refused a google voice account and also refused an sms api acct. I dug into it some more and it appears you have to install it on a phone with cellular service, it needs to read your phone's ID.

I tried deactivating my phone, activating his acct on my phone with Google Voip, then moving it to his tablet. It would work for about a week then stop.

I dug through a bunch of reddit and group threads on it, you simply could not activate it without a real SMS and a cellular link with all the ID's.

We eventually got him an apple watch with service, and it allowed that SMS in concert with my phone. Then I installed on his tablet and put my phone back to me. Once in a blue moon, it'll make him reverify with SMS from the watch, but it works and doesn't require my phone with service anymore.

It might just be something about google's voip which a lot places refuse, but it also refused twillio.

in reply to floquant

i'm convinced the big push for signal is a CIA op. not that it's necessarily signal's fault, it could be and it could not, but setting signal as the defacto private alternative is weird.

better than whatsapp at least i guess, but that's a low ass bar to clear.

This entry was edited (1 week ago)
in reply to ☂️-

We know it's an op, RFA does damage control for signal:

Libby Liu, president of Radio Free Asia stated:

Our primary interest is to make sure the extended OTF network and the Internet Freedom community are not spooked by the [Yasha Levine’s critical] article (no pun intended). Fortunately all the major players in the community are together in Valencia this week - and report out from there indicates they remain comfortable with OTF/RFA.

in reply to floquant

Because the other options most people are aware of are by and large even worse? Would you prefer people were sending this shit over Facebook messenger?
in reply to DJ Putler

They will come for all colors one by one until disliking the government is illegal.
This entry was edited (1 week ago)
in reply to DJ Putler

Non whites know they make up shit all the time to put people in prison, nothing new here for the shit hole country
in reply to DJ Putler

Privacy is proof of terrorism. The state, and it's corporate allies, need to have access to your innermost thoughts, the things about you even you don't know, for national security reasons. This is totally normal and not something to resist. Vote republican.
in reply to DJ Putler

The places tyrants can't see into is where the threats come from.
in reply to DJ Putler

The Prairieland case was an important case for the capitalist state of US Imperialism. It was a litmus test, a threat, to all people who dare criticize and challenge its rule within the belly of the beast. Just like the Iran war, which is about control over the region, and beating back any neo-colonial governments who don’t fall in line with the wishes of US Imperialism….this is the US government waging similar class war at home.
in reply to DJ Putler

Everyone should just wear all blue or some other colour
in reply to DJ Putler

Helping an old grandma up, is cause enough for execution by ICE on the spot.