For open source messengers, you can check whether they actually encrypt your messages and whether the server has access to your encryption keys but what about WhatsApp? Since it’s not open source, you can’t be sure that the encryption keys aren’t sent to the server, right? Has there been a case where a government was able to access WhatsApp chats without reading them from the phone itself?

  • Possibly linux
    link
    fedilink
    English
    61 year ago

    Signal hasn’t been compromised. It has been reviewed and is continuing to be reviewed by tons of researchers and security personnel.

    Its also important to note that its used internally by goverment organizations in the US so it has to be at least reasonably secure.

    Don’t believe propaganda you read online.

    • Lung
      link
      11 year ago

      Well, in my comment I describe quite a number of methods. It doesn’t matter how secure or reviewed signal is, if the feds have a keylogger at the OS or compiler level. It’s really unbelievable how much code is involved in day to day security

      • @[email protected]OP
        link
        fedilink
        21 year ago

        The keylogger and operating system (if you’re using Android) is open source as well. They can’t just put a keylogger in there.

        • Lung
          link
          01 year ago

          Nah, the OS has proprietary overlays that vendors put in there. And it’s not like you’re reviewing and compiling your own software - you’re dependent on your provider to be honest with the software they actually installed. But factually you have no idea if the android phone you purchased has been modified. And Android itself is so huge that backdoors can be sneaky. We have already caught several instances of attempted backdoors in Linux - but there’s always the fear we didn’t find them all

          If this all sounds way too paranoid, then review Snowden leaks