I don’t know if I’m opening a can of worms here, and I’m still trying to backtrack a lot of history where I was tuning everything out. I keep seeing random swipes at Signal (or the representatives (?)), and I was wondering whether they are founded or just lies.Is it another situation like Lemmy where we just “take the technology and move on”? Thanks!

  • Matombo@feddit.org
    link
    fedilink
    arrow-up
    7
    ·
    14 hours ago

    my problem with signal is that they have a hard requirement to use a phone number for signup and that they don’t want to do anything about federation or messenger intercompatibility.

    Their resoning is that they only trust themself to keep the meta data safe and so need you. Leaves a little bit of a sour tast in my mouth that they don’t even give their users the option to opt into federation.

    • teolan@lemmy.world
      link
      fedilink
      arrow-up
      12
      ·
      edit-2
      11 hours ago

      they don’t want to do anything about federation or messenger intercompatibility.

      Their reasoning is that they only trust themself to keep the meta data safe and so need you.

      That’s not their reasoning. Their reasoning is that it’s much harder to evolve the protocol in a decentralized context than a centralized one. It’s not that they only trust themselves with your metadata, it’s that they can improve the protocol much faster in order to get rid of most metadata.

      They have been able to deploy a ton of protocol updates with regards to minimizing the amount of metadata anyone has access to (including them), while other decentralized alternatives have essentially been stuck in limbo for a while:

      • Secure Value recovery
      • Groups V2
      • Sealed sender
      • Usernames
      • Post quantum resistance

      On the other hand, Matrix, XMPP and email are very leaky with regards to metadata. I’m not going into email because that’s pretty documented, but here it is for matrix:

      • Message reactions are not encrypted
      • Group membership are not encrypted (which lead to attacks)
      • Profile pic and Name are public (visible by everyone even people with whom you don’t have any contact)
    • teolan@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      11 hours ago

      This comparison makes some questionnable choices. It puts the presence of a web client as green, when actually this breaks the thread model of end-to-end encryption.

  • WolfLink@sh.itjust.works
    link
    fedilink
    arrow-up
    64
    ·
    2 days ago

    Signal is an open-source privacy-focused end-to-end encrypted texting platform (so competing with SMS, WhatsApp, iMessage, Telegram, and similar). It’s developed by a donation-funded non-profit organization.

    Signal is quite good compared to the competition, but it faces a lot of scrutiny because they make big promises about privacy and security so the people who care will really get into the details on that. Also IIRC there was a period when one of their competitors was trying to slander them more or less.

    In general there’s nothing wrong with Signal and it’s quite a good option. If you really care about the privacy details you can always host your own instance (but that would require you to convince your friends to use your instance … it’s not federated).

  • Hey signal is better than most of the mainstream bs. I use it myself and I’m confident that the messages themselves are secure. However, it had issues.

    Since we cannot verify the software they run on the server is the software that is open source then we must assume it is not.

    We know for a majority of cases a phone number = a real identity. Signal implements sealed sender but since signal is a centralised point they can correlate the sealed sender extraordinarily easily. We must therefore assume signal knows when and who is communicating (We can verify they don’t know what is being said) this therefore means signal could theoretically have a full social graph of real identities for every singe user.

    This is of course after we remember signal received funding from BBG which is an organisation funded by the us government purely for the purpose of promoting american propaganda.

    Also I believe they used to have federation but all evidence of this seems to have been wiped from the internet.

    Signal can either adapt and prove themselves with more than a “trust me bro” or they can die. Just cos they are better than the alternatives does not mean we should not demand better.

    • teolan@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      11 hours ago

      Since we cannot verify the software they run on the server is the software that is open source then we must assume it is not.

      But that’s like, the case for pretty much every messenger out there, outside of self-hosting, which will not be done by 99.99% of the general population.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      14
      ·
      2 days ago

      great explanation!

      we must assume it is not.

      100% - Security is about capabilities, not intentions!

    • einkorn@feddit.org
      link
      fedilink
      arrow-up
      7
      ·
      2 days ago

      Also I believe they used to have federation but all evidence of this seems to have been wiped from the internet.

      They never had.

      The talk about federation originated when the EU demanded interoperability from gatekeeper software i.e. Whatsapp. Signal said on day one they wouldn’t do from their end because it would mean lowering security.

    • zergtoshi@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      2
      ·
      2 days ago

      If they encrypt meta data like they say they do (https://signal.org/blog/signal-is-expensive/), it should be very hard to use meta data the way you explained.
      Whether they do can be looked up here (https://github.com/signalapp) by those who know what to look for.
      As Signal uses reproducible builds (https://signal.org/blog/reproducible-android/), itcan be verified that the builds are made from the public source code.
      They make offering a secure and trustable app a lot better (by being verifyable) than other messengers.

      • The point is we cannot trust they run the software they claim to run. Identifying a sender despite sealed sender is trivial if u have a centralised server.

        Say I am the signal server and all the clients run the known/provable secure clients that are used. I as the signal server an subject to wiretap and gag orders so I can be obligated to run software that is not the published server software and into tell anyone. As a server I by definition have everyone’s IP address. A message with signal protocol has a sealed sender and a known identity recipient. As the signal server I can see when u send a message and from what IP and to which identity and what ip that identity is. I can then simply associate IPs and identities.

        I trust the app I cannot trust the server. A reproducible build does not prove anything about the server it only proves the client.

        • zergtoshi@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          2 days ago

          Sure. If you want full control, you need to run your own server.
          Matrix crosses my mind.
          But using that is a different animal than installing an app from a store.
          As far as security when communicating conveniently on mobile phone goes, Signal does a pretty good job. But you’re right that it’s important to realize what’s possible and what’s not possible.

            • zeca@lemmy.eco.br
              link
              fedilink
              arrow-up
              2
              ·
              1 day ago

              If we have a federated messager that some people self host, would that actually be more secure? i dont know much about how federation works, but i imagine that an intelligence agency could make an instance that would federate to the others, listen to the metadata of the exchanges in the network and rebuild a social graph like a centralized server could. Is this a non-issue?

              • Its actually less of an issue with federation. The way most federation works is that messages are only exchanged with servers that have a relevant party, ie if I’m on instance a and ur on instance b then our messages are only exchanged between instance a and b instance c would have no idea about any of it.

                Its even better than that because with sealed sender the recipient server will know that u have received a message and from what instance but not which user on the instance.

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    10
    ·
    edit-2
    2 days ago

    Signal is great, you should use it.

    Current problems with signal

    1. it’s centralized
    2. your encryption key is stored in the cloud
    3. It’s not federated

    Details

    1. Means it’s vulnerable to government pressure, it’s not wrench proof

    2. means you can’t really trust it for sensitive things, like if you were running the french government communication systems it would be foolish to use signal. Signal uses the power of Intel SGX enclaves to keep your private key safe, so your trusting Intel not to sign something bad, your trusting sgx to not have exploits, etc.

    3. Means it’s a walled garden, and not open to self hosting.

    Signal is the best main stream e2e out there, but it’s not the last one we will ever see, something will replace it

    • patatahooligan@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      10 hours ago

      Your encryption key can be stored encrypted in the cloud. This isn’t a fundamentally bad thing, but they should allow better protection than the short pins they allowed last time I checked.

          • jet@hackertalks.com
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            15 hours ago

            Yup, it was really big news and everyone was up in arms when they introduced SVR.

            You can “opt out” in the settings, your key is still stored in the cloud but with a random BIP32 encoding or somesuch, still not a great practice, and whoever you talk to probably didn’t opt out.

            Signal is better then non e2e messengers, but its not the best architecture we could have. If your ok with Intel, and the Signal foundation being in a position to handover your keys to a TLA who then would have the capability to decrypt your messages - then its fine. So sexting is fine, probably prevents business intelligence, but if I was negotiating a MX US trade deal, I wouldn’t use signal to talk about my strategy.

            If your running a government communication system, 1,2,3 (But especially point 2) - mean you can’t use signal.

        • kitnaht@lemmy.world
          link
          fedilink
          arrow-up
          20
          ·
          2 days ago

          https://github.com/signalapp/SecureValueRecovery2

          The method has changed since that blog post.

          So you are correct about it being stored in the cloud - they also seem to take much better care of it there, but when it’s on someone elses server, your point stands - they can SAY they do anything. There’s no way to actually test that. So thanks for the correction.

    • lemmylommy@lemmy.world
      link
      fedilink
      arrow-up
      8
      ·
      2 days ago

      There is not „your encryption key“ because there is not only one.

      The cloud backup (protected by the pin) includes the contact list, NOT your messages. Those are encrypted on device with a key that is on device and can not be recovered by anyone from the cloud.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 days ago

        There is not „your encryption key“ because there is not only one.

        It’s close enough, its the master key from which all other keys can be derived.

        https://signal.org/blog/secure-value-recovery/

        If someone loses their phone, the stretched_key, auth_key, and c1 variables can be regenerated at any time on the client as long as the user remembers their chosen passphrase.

  • False@lemmy.world
    link
    fedilink
    arrow-up
    14
    arrow-down
    1
    ·
    2 days ago

    It’s mostly minor shit, it’s better than the alternatives unless you self-host (which has a boatload of other issues).

  • Hawke@lemmy.world
    link
    fedilink
    arrow-up
    11
    ·
    2 days ago

    The thing is I have yet to see any reasonable alternatives.

    Threema is the closest but it’s not free-of-charge, so a non-starter for most of my friends.

    The others are controlled by Russia (telegram) or Meta. What else even is viable?

    • Jeena@piefed.jeena.net
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      2 days ago

      I’m trying to move my family to Matrix with a self hosted server. It’s not easy though because of bugs in it.

  • corsicanguppy@lemmy.ca
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    4
    ·
    edit-2
    2 days ago
    • it wants a phone number
    • it’s not GETTING a phone number
    • it no longer exists as an option