- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
Wow I didn’t realize that Signal is run on Amazon’s servers and that they contract with the CIA. This article has some interesting points to mitigate the privacy concerns of this real popular service: https://simplifiedprivacy.com/signal-messenger-guide-to-avoid-privacy-mistakes/
Signal takes steps to reduce the amount of metadata visible, like sealed sender which makes it so that Signal doesn’t know who sent a message. Even your payment information for donations is separated from your identity so that they know you are a donor, but not how you donated.
It desn’t matter if Signal were hosted on Putin’s personal servers. Its security is in its protocol, it’s not trust based.
That would be true if it was implemting forward secrecy.
The problem is that signal knows exactly who you know. I would use simplex chat or session
If that was the case then how come the FBI subpoenaed signal for that information and didn’t get it
They did though. Individuals who are on the contact lists of on on individual can get investigated
The contact list built into your phone? Because that isn’t encrypted of course they would get it
Last time I checked signal had phone numbers in there servers.
It does use PFS. Signal’s protocol is based on the double ratchet algorithm.
Thanks for the reply but please check the article:
Sealed Sender is Flawed
Signal has a flawed system called “Sealed Sender”, which encrypts the metadata of who sent the message inside the encrypted packets. However, cybersecurity researchers from the University of Colorado Boulder, Boston University, George Washington University, and U.S. Naval Academy, found that Sealed Sender could be compromised by a malicious cloud host in as few as 5 messages to reveal who is communicating with who. In this paper published by NDSS, headed by Ian Martiny, these researchers found that Signal’s “read receipts”, which lets the sender know that the receiver got the message can be used as an attack vector to analyze traffic because it sends data packets right back to the sender. Therefore, our recommendation to increase metadata protection is turn off read receipts, which can be toggled in the security settings.
Source used: Improving Signal’s Sealed Sender Ian Martiny∗, Gabriel Kaptchuk†, Adam Aviv‡, Dan Roche§, Eric Wustrow∗ ∗, {ian.martiny, ewust}@colorado.edu †Boston University, [email protected] ‡George Washington University, [email protected] §U.S. Naval Avademy, [email protected]
https://www.ndss-symposium.org/ndss-paper/improving-signals-sealed-sender/ & Paper PDF: https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-4_24180_paper.pdf
deleted by creator
deleted by creator
And they do name squatting in session oxen names.
I’m on the fence, they do create content… The super energetic, breathless, bombastic, tone with no nuance that steam rolls over lots of considerations to make conclusions I don’t agree with, doesn’t sit well with me. But thats just me… so just I blocked their last account just to let bygones be bygones, but they made a new account to post this video so it showed up in my feed.
What conclusions do you disagree with?
We already discussed at length your session video, i’m not going to review your other videos. Like i said, let bygones be bygones, its just you made a new account to post the new video so my block didn’t work.
Yes Session trades forward secrecy away in return for uncensored identity. These are pros/cons of different approaches and we provide educational material on a variety of software
What facts are you disputing on the site?
As long the encryption and everything else they do is as good as independant audits say they are, none of this matters, does it.
The only thing they know about any user is when the account was created, and when it was last online. That’s all they’re able to hand to law enforcement
Thanks for the reply but please check the article:
Sealed Sender is Flawed
Signal has a flawed system called “Sealed Sender”, which encrypts the metadata of who sent the message inside the encrypted packets. However, cybersecurity researchers from the University of Colorado Boulder, Boston University, George Washington University, and U.S. Naval Academy, found that Sealed Sender could be compromised by a malicious cloud host in as few as 5 messages to reveal who is communicating with who. In this paper published by NDSS, headed by Ian Martiny, these researchers found that Signal’s “read receipts”, which lets the sender know that the receiver got the message can be used as an attack vector to analyze traffic because it sends data packets right back to the sender. Therefore, our recommendation to increase metadata protection is turn off read receipts, which can be toggled in the security settings.
Source used: Improving Signal’s Sealed Sender Ian Martiny∗, Gabriel Kaptchuk†, Adam Aviv‡, Dan Roche§, Eric Wustrow∗ ∗, {ian.martiny, ewust}@colorado.edu †Boston University, [email protected] ‡George Washington University, [email protected] §U.S. Naval Avademy, [email protected]
https://www.ndss-symposium.org/ndss-paper/improving-signals-sealed-sender/ & Paper PDF: https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-4_24180_paper.pdf
Pretty obvious contents, strange premise and even fud’ier title…
It’s not that obvious if millions of people do it. anyone can type criticism, you are not adding value
To be fair - your videos are pretty strong in the FUD department.
So… Yes, Amazon has a contract with the CIA. They have for well over a decade now. In fact, I happened to work in AWS when that program first began.
It’s called GovCloud and it’s just a physically separated, hardened version of AWS. It’s separate hardware to meet US govt requirements for handling data and the networks are not accessible from the public internet. Otherwise, it’s just standard AWS stuff. The Men in Black want to use S3 too.
Anyway, yes, the CIA (like JPL and NASA and a bunch of non-scary orgs) makes use of GovCloud. That’s not evidence that they’re spying on Signal messages. And even if they are, they wouldn’t have needed to set up a very public contract with Amazon. They’d just make a backroom deal and you and I would never hear about it. E.g. Even if signal switched to Azure is no guarantee.
Finally… If you’re in the US, it’s not the CIA you need to be worried about anyway. CIA is focused on foreign threats. The NSA is the group that spies on US citizens. And they have a massive data capture facility in Utah. They’ve got taps all over the backbone internet hardware in the USA. If anybody’s watching your signal metadata, it’s them. …and they don’t need Amazon’s help to do it.
eh, its better than discord and it was hard to convince people to use signal, even as convenient as it is.
Just use Matrix/Element or Session or Briar or Jami or Threema lol
No, use SimpleX.
Damn it I knew I was forgetting one
Matrix but please do not use their identity server. Please.
Yup, pretty obvious. Your friends that stick to apple are the worst annoyance. Android and even Windows can be hacked a lot
Maybe we can’t make it secure… https://dessalines.github.io/essays/why_not_signal.html
CIA Funding CIA → RFA → OTF → Signal. While this article by Yasha Levine gets into the details, it is no secret that the original funder of Open Whisper Systems (the previous name for signal’s development team), was the Open Technology Fund: itself publicly listed as a subsidiary of Radio Free Asia, a US state-run organization whose main goal (along with the other “Radio Free” incarnations such as Radio Free Europe, or Free Cuba Radio) is regime change for those Asian governments who don’t align with the US’s foreign policy interests.
deleted by creator
deleted by creator