Skip to main content


Can Google read my Signal messages on stock Android?


I recently asked the /c/Android community what information Google has access to on stock Android, assuming the user is not using any Google apps, and was told Google has full "unstoppable" access to the entire device, including Signal messages, the microphone, duckduckgo search history and anything displayed on the screen at all times.

Does this mean that encrypted messaging is essentially pointless to use on Android? I'm a newb here so go easy on me.

in reply to Jediwan

By "Stock Android" you mean whatever came with your phone, or do you mean you installed PureAOSP? source.android.com/
in reply to PiraHxCx

Neither, some manufacturers modify Android considerably. By "stock" I mean essentially what is on Pixels and many other devices, but not for example, Samsung.
in reply to Jediwan

I would not expect any privacy from any Android, alþough if þere is any to be had, it'll be from a deGoogled image.

I have not heard anyone claim to have done a complete audit of Android, but even if it has been done on e.g. Graphene, what Google installs on Google phones is anyone's guess, and it's not paranoia to assume Google has backdoors.

in reply to Jediwan

Currently, no (other than the microphone). Android apps are sandboxed and the Signal app encrypts its data so it isn't readable from the outside. There is however a real concern if using keyboards with predictive text, because the keyboard knows what you're typing into Signal.
This entry was edited (3 weeks ago)
in reply to cygnus

I believe notifications would be accessible. Note that i don't mean the push notification backend mentioned by Doomerang, but the actual notification that goes into your status bar (which is all processed on device). That would be readable by the OS in theory.
in reply to Shadow

It's not readable by the OS in theory, it is literally readable. Displaying a notification is an API call from the app to the framework provided by google. To put it in laymans terms the app goes "hey google please display this text as a notification".
in reply to cygnus

Someone at Google could hear what a device's microphone is picking up at all times?
in reply to cygnus

Android apps are sandboxed


FWIW, they're not sandboxed from google play services:

The Play Store Services process has access to your precise location at all times, the motion sensors, networks, hardware identifiers (including IMEI), contacts, passwords, the entire storage space, call logs, access to other apps’ data, and more.


Accordingly, google would have access to the Signal data on your phone. However, I don't know whether the encryption would provide a measure of protection against google. GrapheneOS by default does not use google play services, and provides a sandboxed version for people who need the functionality.

in reply to N0t_5ure

It's possible but complicated.

Since apps have access to the TPM API they can encrypt their own data in such a way that only the app's own authorized processes can retrieve the decryption key from the TPM chip

in reply to N0t_5ure

Unless you're using GrapheneOS and then the answer is "Mostly but it depends".
in reply to cygnus

in reply to cygnus

but the sandbox is controlled by google, of course. They might need to snoop on your app for "accessibility reasons" (no pun intended)
in reply to Jediwan

mastodon.world/@Mer__edith/111…
this is the response from the president of the Signal Foundation to the question around push notifications and if google/apple can access your messages via this method.
in reply to Doomerang

Odd. Signal notifications absolutely include the content of the messages received.
in reply to Jediwan

Pretty sure it doesn't by default? You can definitely change it, but I thought it was just name by default.
in reply to Jediwan

In Signal, push notifications simply act as a ping that tells the app to wake up.


Google only pings your phone via FCM, the Signal App then polls the message itself.

Edit: oops, you meant the pop-up. You can disable them from showing the message.

This entry was edited (3 weeks ago)
in reply to Jediwan

There's measures they could use in theory, but if you switch keyboard app away from Google's and set private text mode, enable screenshot protection, etc, then you should be good.
in reply to Natanael

But other comments are saying the exact opposite, that Google has full and compete access to the device and its hardware at all times.
in reply to Jediwan

Screenshot protection doesn't protect you from the system seeing your screen. They're running software with kernel-level access to your system, anything that they want is available to them.

As to what they do with this level of access, I could only speculate.

in reply to Jediwan

In theory it does. In practice, people would figure it out if this was common practice. So if the functionality is built in, you need to ask yourself if you're a particularly valuable target.
in reply to Jediwan

Google has the capability to read everything that you can read on an Android phone, unless you have taken steps to remove all Google-controlled components that have system-level privileges. Last time I checked, this included Google Play Services, which are installed by default on most Android phones.

Note that messengers with end-to-end encryption, like Signal, cannot protect against an adversary with full access to your device.

This is part of why people de-Google their phones, which usually means replacing the entire OS with something like LineageOS or GrapheneOS.

This entry was edited (3 weeks ago)
in reply to who

So just to confirm the answer to my question question: Its pointless to use encrypted messaging on an Android device?
This entry was edited (3 weeks ago)
in reply to Jediwan

So just to confirm the answer to my question question: Its pointless to use encrypted messaging on an Android device?


Of course not. End-to-end encrypted messaging protects against eavesdroppers in transit. It's an opaque envelope.

(Edit: Keep in mind that Google is not the only potential eavesdropper out there.)

What it cannot do is protect a message from someone reading over your shoulder when you write a message or open an envelope. On mainstream Android, that could be Google, if they choose to abuse their system-level access. On iOS, it could be Apple. And so on.

Those companies might be eavesdropping on sent/received messages already, either at a large scale or in a minority of cases, or regionally, or they might not be doing it at all... yet. But they have the capability. You'll have to decide for yourself whether that risk is acceptable.

This entry was edited (3 weeks ago)
in reply to who

End-to-end encrypted messaging protects against eavesdroppers in transit.


But if the ENDS are both compromised... I wish there were more/better custom ROMS out there. Hopefully Linux Phone gets some love.

This entry was edited (3 weeks ago)
in reply to tehmics

Me personally I don't have a Pixel but I looked into Graphene and I'm told banking apps don't work and also tap to pay.

Linux works on pretty much every PC ever and every app can be installed. It would be nice to have that for phones!

in reply to James R Kirk

My banking apps just work(tm) without any work or fiddling. (Sweden) You can have a separate space for apps that need google play and all that and it has no access to your private data.
in reply to James R Kirk

But if the ENDS are both compromised…


If either end is compromised, then there is someone reading over the proverbial shoulder, and the conversation should be considered compromised.

Hopefully Linux Phone gets some love.


That would be a welcome step in the right direction, as would open hardware.

This entry was edited (3 weeks ago)
in reply to Jediwan

If you use stock android and proprietary software, YES. Everything you type can be recorded before it's encrypted.
in reply to Jediwan

It is not pointless.

  1. You still make everyone else unable to read your messages.
  2. Even though google can in theory read everything, it depends on how shady they are and definitely is illegal in some countries for them to actually do read everything.
in reply to Jediwan

People in the field would love to bust Google for this so it's a safe bet that they are actively looking for Google to log or transmit what you type in the keyboard in every app. The fact that the news hasn't broken that Google is logging this info is important. It means in the realm of possibility it's not impossible but it is unlikely.

Still it's safer to assume all of your communications on stock android are being tracked or spied on.

The same way you assume a weapon is loaded. Better safe than sorry.

in reply to Jediwan

No, because it still stops everyone else from reading your messages.
in reply to Jediwan

The system controls its apps. When the system's not libre software, they control it, not you!

Keep Signal. You're helping others escape WhatsApp.

This entry was edited (3 weeks ago)
in reply to Jediwan

Signal is far better to use than WhatsApp or any other messaging app controlled by big tech like Apple, Google, Microsoft, Google (Alphabet), Facebook and so forth. But Google knows what you write on your phone on Android. Don't kid yourself on that point.
in reply to Jediwan

Think lower level.
They own your device keyboard, so they can technically read whatever you type. Whether they send that to the mother ship, I don't know, but it's a risk. That's one example, but same holds true for anything low level, like mic, camera, etc.
in reply to Jediwan

Google Keyboard has network access, so it can theoretically log every keystroke and send it somewhere.

Personally, I installed GrapheneOS which lets me deny network access to the keyboard.

in reply to Jediwan

Yes. Whoever controls the operating system controls everything applications do.
in reply to Jediwan

This entry was edited (3 weeks ago)
Unknown parent

lemmy - Link to source
eldavi
i had been using chinese phones until recently and they all prompted for "secure keyboard" or "regular keyboard" for passwords/pins; but i suspect that the secured keyboard option had a backdoor installed. lol
Unknown parent

lemmy - Link to source
pHr34kY

I denied play store network access too 😆.

Seriously, some apps just check if it's installed or not. I use Aurora for actually downloading apps.

in reply to Jediwan

Is the most sophisticated surveillance apparatus in history going to ignore you just because you're a little guy and it has a legal corporate frontend? Google has guys who planted bombs in the pagers of Lebanese doctors to get at Hezbollah working in their offices. They are one of the most important business partners of the organizational umbrella Guantanamo Bay falls under. Security by obscurity? I don't think so man. Being a blurred image in the corner doesn't mean you won't be counted as an illegal combatant by the glorious Pentagon battle computers. There's this misconception people have that there is a rational limit to the surveillance even while they see articles about how many nuclear reactors would be needed to scale the US AI griftdustry. This is the country that famously put little children on the no-fly list because they were automatically marked as relatives of citizens of concern.

Signal is not trustworthy. Firebase notifications is not trustworthy. Google, ditto. Your phone's hardware itself...

This entry was edited (3 weeks ago)