I don’t know if I’m opening a can of worms here, and I’m still trying to backtrack a lot of history where I was tuning everything out. I keep seeing random swipes at Signal (or the representatives (?)), and I was wondering whether they are founded or just lies.Is it another situation like Lemmy where we just “take the technology and move on”? Thanks!

  • @[email protected]
    link
    fedilink
    English
    19
    edit-2
    1 month ago

    Signal is great, you should use it.

    Current problems with signal

    1. it’s centralized
    2. your encryption key is stored in the cloud
    3. It’s not federated

    Details

    1. Means it’s vulnerable to government pressure, it’s not wrench proof

    2. means you can’t really trust it for sensitive things, like if you were running the french government communication systems it would be foolish to use signal. Signal uses the power of Intel SGX enclaves to keep your private key safe, so your trusting Intel not to sign something bad, your trusting sgx to not have exploits, etc.

    3. Means it’s a walled garden, and not open to self hosting.

    Signal is the best main stream e2e out there, but it’s not the last one we will ever see, something will replace it

    • @kitnaht
      link
      32
      edit-2
      1 month ago

      Your encryption key is stored ON-DEVICE. Not in “the cloud”.

      In fact, they just had a big hullabalu about the encryption key being stored in plain-text on their desktop client, which they’ve now resolved.

      They now use https://www.electronjs.org/docs/latest/api/safe-storage on the desktop client.

        • @kitnaht
          link
          201 month ago

          https://github.com/signalapp/SecureValueRecovery2

          The method has changed since that blog post.

          So you are correct about it being stored in the cloud - they also seem to take much better care of it there, but when it’s on someone elses server, your point stands - they can SAY they do anything. There’s no way to actually test that. So thanks for the correction.

        • @Valmond
          link
          21 month ago

          What the hell, that makes it completely useless?

          • @[email protected]
            link
            fedilink
            English
            2
            edit-2
            1 month ago

            Yup, it was really big news and everyone was up in arms when they introduced SVR.

            You can “opt out” in the settings, your key is still stored in the cloud but with a random BIP32 encoding or somesuch, still not a great practice, and whoever you talk to probably didn’t opt out.

            Signal is better then non e2e messengers, but its not the best architecture we could have. If your ok with Intel, and the Signal foundation being in a position to handover your keys to a TLA who then would have the capability to decrypt your messages - then its fine. So sexting is fine, probably prevents business intelligence, but if I was negotiating a MX US trade deal, I wouldn’t use signal to talk about my strategy.

            If your running a government communication system, 1,2,3 (But especially point 2) - mean you can’t use signal.

            • @Valmond
              link
              21 month ago

              What the hell.

              Thanks for the info!

    • @lemmylommy
      link
      101 month ago

      There is not „your encryption key“ because there is not only one.

      The cloud backup (protected by the pin) includes the contact list, NOT your messages. Those are encrypted on device with a key that is on device and can not be recovered by anyone from the cloud.

      • @[email protected]
        link
        fedilink
        English
        31 month ago

        There is not „your encryption key“ because there is not only one.

        It’s close enough, its the master key from which all other keys can be derived.

        https://signal.org/blog/secure-value-recovery/

        If someone loses their phone, the stretched_key, auth_key, and c1 variables can be regenerated at any time on the client as long as the user remembers their chosen passphrase.

    • @patatahooligan
      link
      21 month ago

      Your encryption key can be stored encrypted in the cloud. This isn’t a fundamentally bad thing, but they should allow better protection than the short pins they allowed last time I checked.