this post was submitted on 09 Jan 2025
84 points (98.8% liked)

Privacy

32722 readers
1011 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] yogthos@lemmy.ml 11 points 5 days ago (90 children)

I don't really have any special hate for Telegram myself, and I never saw it as a secure communication platform. I have more problem with Signal because people treat it like it's paragon of privacy and security.

[–] Corgana@startrek.website 5 points 5 days ago (86 children)

I'd be curious to hear your criticisms of Signal! While I haven't seen anyone describing it as a "paragon of privacy and security" I do think it is a highly accessible SMS replacement that is also open source, end-to-end encrypted, and operated by a nonprofit.

[–] dessalines@lemmy.ml 10 points 5 days ago (64 children)

I wrote a longer one here: https://dessalines.github.io/essays/why_not_signal.html

The short version is, that it's a centralized, US hosted service. All of those are subject to National Security Letters, and so are inherently compromised. Even if we accept that the message content is secure, then signal's reliance on phone numbers (and in the US, a phone number is connected to your real identity and even current address), means that the US government has social connection graphs: everyone who uses signal, who they talk to, and when.

[–] LodeMike@lemmy.today -3 points 5 days ago (1 children)
[–] davel@lemmy.ml 5 points 5 days ago (1 children)

You have provided literally nothing to back up your assertion.

[–] LodeMike@lemmy.today -2 points 5 days ago (2 children)

Signal does not know who talks to whom. It's kind of the main thing about the double ratchet.

[–] yogthos@lemmy.ml 1 points 5 days ago (2 children)

You sign up to use Signal using your phone number which is a personally identifying piece of information. Signal clients send messages to the server that routes the messages to their destination. It is not a p2p system where clients talk directly to each other. Therefore, the server must know both the sending and receiving accounts for the messages it routes, and it has the phone numbers associated with this accounts. All these things together make it trivial for the server to know which phone numbers talk to each other.

[–] pupbiru@aussie.zone 1 points 4 days ago (1 children)

that’s all not necessarily true

for starters: https://signal.org/blog/sealed-sender/

but also perhaps more academically because signal (i believe) doesn’t do this, so it’s more a comment on the information that the server “must know”

signal uses the double ratchet protocol to derive shared keys between users already. if we extend this a little further to exchange a separate shared identifier for use in retrieving conversaiton data, and a place to store that data the the only information that the server gets is a couple of initialisation messages, and the rest is entirely opaque - there’s no way to know (other than tracing e2e messages based on IP address, and there are mitigations for that too) who is communicating with who, at what rate, etc

there are other ways to validate things like rate limits, etc that don’t involve identity directly, or at least don’t trust any single party with all data

[–] yogthos@lemmy.ml 2 points 4 days ago

If you're arguing that it is possible to build a system that uses a server for routing while keeping clients anonymous, then that is the case. However, what we're talking about here is whether a malicious actor would be able to intentionally harvest metadata about the users. And my point was that since only the people operating the Signal server know what it's actually doing, it becomes a trust based system. You have to trust that Whisper Systems is a good actor and they're not harvesting your information.

[–] LodeMike@lemmy.today 0 points 4 days ago (1 children)

JFC are all you .ml folks this ignorant??

[–] yogthos@lemmy.ml 3 points 4 days ago

What an amazing counterpoint you've mustered.

[–] davel@lemmy.ml 0 points 5 days ago (1 children)

Unless you compiled the app yourself from source code that you understand, you don’t really know what the app might be saying to Signal’s servers. Almost everyone just trusts that the pre-compiled app supplied by Apple or Google aren’t compromised. But we know from history that Big Tech and the military-intelligence-industrial complex are in bed with each other.

[–] LodeMike@lemmy.today -1 points 5 days ago (1 children)

Okay. You tell me what the double ratchet is, since you're so smart.

[–] davel@lemmy.ml 2 points 5 days ago (1 children)

The double ratchet algo is irrelevant if the app is doing something else altogether.

[–] LodeMike@lemmy.today -1 points 5 days ago (1 children)

Compiling the app is irrelevant if I don't read the source.

[–] yogthos@lemmy.ml 1 points 5 days ago (1 children)

That's nonsense, because many different people read the source and audit open source software. While it's certainly possible to sneak malicious code in, the trust doesn't depend on each single individual auditing it. It's a collective effort.

[–] pupbiru@aussie.zone 1 points 5 days ago (1 children)

okay, but reproducible builds solve the rest of that problem

https://signal.org/blog/reproducible-android/

[–] yogthos@lemmy.ml 2 points 5 days ago

Yeah, now that they finally have reproducible builds, at least you can trust that the client is doing what it says it's doing.

load more comments (62 replies)
load more comments (83 replies)
load more comments (86 replies)