Greetings!

A friend of mine wants to be more secure and private in light of recent events in the USA.

They originally told me they were going to use telegram, in which I explained how Telegram is considered compromised, and Signal is far more secure to use.

But they want more detailed explanations then what I provided verbally. Please help me explain things better to them! ✨

I am going to forward this thread to them, so they can see all your responses! And if you can, please cite!

Thank you! ✨

    • The Hobbyist@lemmy.zip
      link
      fedilink
      arrow-up
      4
      ·
      9 hours ago

      and requires phone numbers (meaning your real identity in the US).

      This gets shared a lot as a major concern for all services requiring a phone number. It is definitely true that by definition, a phone number is linked to a person’s identity, but in the case of signal, no other information can be derived from it. When the US government requests data for that phone number from Signal, like they occasionally do, the only information Signal provides them with is whether they do have a signal account and when they registered it last and when they last signed in. How is that truly problematic? For all other services which require a phone number, you would have much more information which is where it is truly problematic, say social graph, text messages, media, locations, devices etc. But none of that is accessible by Signal. So literally the only thing signal can say is whether the person has an account, that’s about it. What’s the big deal about it? Clearly the US government already has your phone number because they need it to make the request for Signal, but they gain absolutely no other information.

      • Aria@lemmygrad.ml
        link
        fedilink
        arrow-up
        3
        arrow-down
        1
        ·
        8 hours ago

        Your data is routed through Signal servers to establish connections. Signal absolutely can does provide social graphs, message frequency, message times, message size. There’s also nothing stopping them from pushing a snooping build to one user when that user is targeted by the NSA. The specific user would need to check all updates against verified hashes. And if they’re on iOS then that’s not even an option, since the official iOS build hash already doesn’t match the repo.

        • The Hobbyist@lemmy.zip
          link
          fedilink
          arrow-up
          1
          ·
          8 hours ago

          Signal absolutely can does provide social graphs, message frequency, message times, message size.

          Do you have anything to back this up?

            • The Hobbyist@lemmy.zip
              link
              fedilink
              arrow-up
              1
              ·
              2 hours ago

              They have to know who the message needs to go to, granted. But they don’t have to know who the message comes from, hence why the sealed sender technique works. The recipient verifies the message via the keys that are exchanged if they have been communicating with that correspondent before or else it is a new message request.

              So I don’t see how they can build social graphs if they don’t know who the sender if all messages are, they can only plot recipients which is not enough.

              • Dessalines@lemmy.ml
                link
                fedilink
                arrow-up
                1
                ·
                2 hours ago

                But they don’t have to know who the message comes from, hence why the sealed sender technique works.

                Anyone who’s worked with centralized databases can tell you that even if they did add something like that, with message timestamps, it’d be trivial to find the real sender of a message. You have no proof that they even use that, because the server is centralized, and closed source. Again, if their response is “just trust us”, then its not secure.

                • The Hobbyist@lemmy.zip
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  1 hour ago

                  From what I understand, sealed sender is implemented on the client side. And that’s what’s in the github repo.

          • Aria@lemmygrad.ml
            link
            fedilink
            arrow-up
            1
            ·
            8 hours ago

            Your link lists all the things they don’t share. The only reasonable reading is that anything not explicitly mentioned is shared. It’s information they have, and they’re legally required to share what they have, also mentioned in your link in the documents underneath their comment.

            • The Hobbyist@lemmy.zip
              link
              fedilink
              arrow-up
              1
              ·
              5 hours ago

              If you open the latest instance, from August 2024, you will find a California government request, for a number of phone numbers.

              The second paragraph of that very page says:

              Once again, Signal doesn’t have access to your messages; your calls; your chat list; your files and attachments; your stories; your groups; your contacts; your stickers; your profile name or avatar; your reactions; or even the animated GIFs you search for – and it’s impossible to turn over any data that we never had access to in the first place.

              They respond to the request with the following information:

              1. The responsive information that Signal possessed was:

              a. REDACTED: Most Recent Registration: 2023-01-31 T19:42:10 UTC; Most Recent Login: 2023-01-31 T00:00:00 UTC.

              b. REDACTED: Most Recent Registration: 2022-06-01 T16:30:01UTC; Most Recent Login: 2022-12-12 T00:00:00 UTC.

              c. REDACTED: Most Recent Registration 2021-12-02T03:42:09 UTC; Most Recent Login: 2022-12-28 T00:00:00 UTC.

              The redacted values are the phone numbers.

              That is the full extent of their reply. No other information is provided, to the government request.

              • Dessalines@lemmy.ml
                link
                fedilink
                arrow-up
                1
                ·
                2 hours ago

                California does not issue NSLs, the US federal government does. And those come with gag orders that means you will go to federal prison if you tell anyone that you’ve been asked to spy on your users.

                • The Hobbyist@lemmy.zip
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  2 hours ago

                  Are you implying that Signal is withholding information from the Californian Government? And only providing the full extent of their data to the government?

                  This comes back to the earlier point that there is no proof Signal even has more data than they have shared.

                  • Dessalines@lemmy.ml
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    2 hours ago

                    If you don’t know what an NSL is, then you definitely shouldn’t be speaking about privacy.

              • Aria@lemmygrad.ml
                link
                fedilink
                arrow-up
                2
                ·
                5 hours ago

                We can’t verify that. They have a vested interest in lying, and occasionally are barred from disclosing government requests. However, using this as evidence, as I suggested in my previous comment, we can use it to make informed guesses as to what data they can share. They can’t share the content of the message or calls – This is believable and assumed. But they don’t mention anything surrounding the message, such as whom they sent it to (and it is them who receives and sends the messages), when, how big it was, etc. They say they don’t have access to your contact book – This is also very likely true. But that isn’t the same as not being able to provide a social graph, since they know everyone you’ve spoken to, even if they don’t know what you’ve saved about those people on your device. They also don’t mention anything about the connection they might collect that isn’t directly relevant to providing the service, like device info.

                Think about the feasibility of interacting with feds in the manner they imply. No extra communication to explain that they can’t provide info they don’t have? Even though they feel the need to communicate that to their customers. Of course this isn’t the extent of the communication, or they’d be in jail. But they’re comfortable spinning narratives. Consider their whole business is dependant on how they react to these requests. Do you think it’s likely their communication of how they handled it is half-truths?

    • Lawn_and_disorder [he/him]@hexbear.net
      link
      fedilink
      arrow-up
      1
      ·
      9 hours ago

      Reding the link now " The reason the US government hasn’t tried to block or hinder Signal, is because it’s satisfied with the amount of information Signal can provide to it." Well the metadata of who is contacting who can be acquired by other means. CIA also like to have secure tools. Just like you can argue the CIA connection in the TOR case . It doesn’t mean backdoors and so on.

      Centralisation argument sure, but that issue will always be there at some level, even for matrix.

      Phonenumber discovarability argument is no longer correct as it is possible to use signal and not disclosing it to contacts, but yes still to signal.

      I have a signal account with a fake number so that is an option as well, if even more work than matrix process.

    • flux@lemmy.world
      link
      fedilink
      arrow-up
      15
      ·
      19 hours ago

      So if I understand it Signal has your phone number but only logs sign up date and last activity date. So yes they can say this person has Signal and last used it on date X. Other than that no information.

      Matrix doesn’t require a phone number but has no standard on logging activity so it’s up to the server admin what they log, and they could retain ip address, what users are talking in what, rooms, etc. and E2EE is not required.

      I think both have different approaches. I’m just trying to understand. On one hand you have centralized system that has a standard to minimize logs or decentralized system that must be configured to use E2EE and to remove logs.

      • Dessalines@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        2 hours ago

        They have your phone number (meaning your full identity, and even current address), and as the primary identifier, it means they have message timestamps and social graphs.

        Its impossible to verify what code their server is running. Or that they delete their logs, because they say they do? You should never rely on someone saying “just trust us”. Truly secure systems have much harder verifiability tests to pass.

    • 9tr6gyp3@lemmy.world
      link
      fedilink
      arrow-up
      17
      arrow-down
      3
      ·
      20 hours ago

      This entire article is guessing at hypothetical backdoors. Its like saying that AES is backdoored because the US government chose it as the standard defacto symmetrical encryption.

      There is no proof that Signal has done anything nefarious at all.

      • Dessalines@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        2 hours ago

        There was also no proof that a ton of US companies were spying on their users, until the global surveillance disclosures. Crypto AG ran a honeypot that spied on communications between world leaders for > 40 years until it got exposed.

        • 9tr6gyp3@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          2 hours ago

          Right but Signal has been audited by various security firms throughout its lifetime, and each time they generally report back that this messenger has encryption locked down properly.

      • juli@lemmy.world
        link
        fedilink
        arrow-up
        4
        arrow-down
        1
        ·
        14 hours ago

        This entire article is guessing at hypothetical backdoors. Its like saying that AES is backdoored because the US government chose it as the standard defacto symmetrical encryption.

        There is no proof that Signal has done anything nefarious at all.

        As an outsider, I mean isn’t that the same for news coverage for chinese/russian backdoors, but everyone believes it without any proof.

        Why is US company being a US honeypot a big surprise, and its government recommending it not a big red flag? but it is when China recommends wechat? Can’t we be critical and suspicious of both authoritarian countries?

        Do you have access to Signal servers to verify your claims by any chance? Afaik their servers are running modified codebase, and third party apps cannot use them. So how do you claim anything that goes behind closed doors at all? Genuinel curious.

        • patatahooligan@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          8 hours ago

          Do you have access to Signal servers to verify your claims by any chance?

          That’s not how it works. The signal protocol is designed in a way that the server can’t have access to your message contents if the client encrypts them properly. You’re supposed to assume the server might be compromised at any time. The parts you actually need to verify for safe communication are:

          • the code running on your device
          • the public key of your intended recipient
    • Clocks [They/Them]@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      12
      ·
      edit-2
      22 hours ago

      Thank you for your post!

      I want you to know your effort and knowledge is appreciated, this will help future readers make better decisions.✨

      But the situation stands that my friend and their friends are not as technologically literate as we are, and I would rather have them on something easy and secured than unsecured at all, especially from my experience with getting communities to use such decentralized platforms you mentioned.

      • Dessalines@lemmy.ml
        link
        fedilink
        arrow-up
        10
        arrow-down
        11
        ·
        22 hours ago

        Matrix is no more difficult to sign up on than signal, and they don’t forward your information to the US government.

        • toastal@lemmy.ml
          link
          fedilink
          arrow-up
          6
          ·
          15 hours ago

          Matrix is centralized around Matrix.org or servers they run tho. Since the protocol is a big data/metadata sync by design & medium–large-sized servers are expensive to run, almost all of metadata is with Matrix.org—of which was originally funded my Israeli intelligence & I wouldn’t be surprised if they were getting data out of it to this day.

        • Clocks [They/Them]@lemmy.mlOP
          link
          fedilink
          English
          arrow-up
          19
          ·
          edit-2
          22 hours ago

          I am not uneducated in this matter, I run Matrix instances and have dabbled in development of tools around it.

          Perhaps our experience is different, but I have had great difficulty in helping groups on the ground to use Matrix.

          Regardless of our agreement that Matrix is better than Signal, it should not cloud our judgement in at least reducing the harm that is Telegram.

          In the future we can keep joining hands to work towards a better future, but for now I hope you can understand my perspective and choice.

    • Snot Flickerman@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      1
      ·
      edit-2
      22 hours ago

      SimpleX is taking a lot of venture capital money which makes it just slightly suspect, imho. Those guys usually want a return of some kind on their investment. I simply don’t trust the motives of technocrats like Jack Dorsey.

      The Matrix Foundation, on the other hand, seems a lot more democratic in governance and stewardship of the protocol.

      • HotCoffee@lemm.ee
        link
        fedilink
        arrow-up
        6
        arrow-down
        1
        ·
        22 hours ago

        Good projects require money. And SimpleX is still way better than Signal and Telegram, so imo it’s worth supporting and using

    • Valmond@lemmy.world
      link
      fedilink
      arrow-up
      8
      ·
      22 hours ago

      As you say yourself (cryptocraphic nerd here):

      Signal’s E2EE protocol means that, most likely, message content between persons is secure.

      So a shame there are no free servers, are the server soft not open source, only the signal app itself?

      • Dessalines@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        2 hours ago

        The server is supposedly open source, but they did anger the open source community a few years back, by going a whole year without posting any code updates. Either way that’s not reliable, because signal isn’t self-hostable, so you have no idea what code the server is running. Never rely on someone saying “just trust us.”