Greetings!

A friend of mine wants to be more secure and private in light of recent events in the USA.

They originally told me they were going to use telegram, in which I explained how Telegram is considered compromised, and Signal is far more secure to use.

But they want more detailed explanations then what I provided verbally. Please help me explain things better to them! ✨

I am going to forward this thread to them, so they can see all your responses! And if you can, please cite!

Thank you! ✨

  • The Hobbyist@lemmy.zip
    link
    fedilink
    arrow-up
    1
    ·
    13 hours ago

    Signal absolutely can does provide social graphs, message frequency, message times, message size.

    Do you have anything to back this up?

      • The Hobbyist@lemmy.zip
        link
        fedilink
        arrow-up
        1
        ·
        7 hours ago

        They have to know who the message needs to go to, granted. But they don’t have to know who the message comes from, hence why the sealed sender technique works. The recipient verifies the message via the keys that are exchanged if they have been communicating with that correspondent before or else it is a new message request.

        So I don’t see how they can build social graphs if they don’t know who the sender if all messages are, they can only plot recipients which is not enough.

        • Dessalines@lemmy.ml
          link
          fedilink
          arrow-up
          1
          ·
          7 hours ago

          But they don’t have to know who the message comes from, hence why the sealed sender technique works.

          Anyone who’s worked with centralized databases can tell you that even if they did add something like that, with message timestamps, it’d be trivial to find the real sender of a message. You have no proof that they even use that, because the server is centralized, and closed source. Again, if their response is “just trust us”, then its not secure.

          • The Hobbyist@lemmy.zip
            link
            fedilink
            arrow-up
            1
            ·
            6 hours ago

            From what I understand, sealed sender is implemented on the client side. And that’s what’s in the github repo.

    • Aria@lemmygrad.ml
      link
      fedilink
      arrow-up
      2
      ·
      13 hours ago

      Your link lists all the things they don’t share. The only reasonable reading is that anything not explicitly mentioned is shared. It’s information they have, and they’re legally required to share what they have, also mentioned in your link in the documents underneath their comment.

      • The Hobbyist@lemmy.zip
        link
        fedilink
        arrow-up
        1
        ·
        11 hours ago

        If you open the latest instance, from August 2024, you will find a California government request, for a number of phone numbers.

        The second paragraph of that very page says:

        Once again, Signal doesn’t have access to your messages; your calls; your chat list; your files and attachments; your stories; your groups; your contacts; your stickers; your profile name or avatar; your reactions; or even the animated GIFs you search for – and it’s impossible to turn over any data that we never had access to in the first place.

        They respond to the request with the following information:

        1. The responsive information that Signal possessed was:

        a. REDACTED: Most Recent Registration: 2023-01-31 T19:42:10 UTC; Most Recent Login: 2023-01-31 T00:00:00 UTC.

        b. REDACTED: Most Recent Registration: 2022-06-01 T16:30:01UTC; Most Recent Login: 2022-12-12 T00:00:00 UTC.

        c. REDACTED: Most Recent Registration 2021-12-02T03:42:09 UTC; Most Recent Login: 2022-12-28 T00:00:00 UTC.

        The redacted values are the phone numbers.

        That is the full extent of their reply. No other information is provided, to the government request.

        • Dessalines@lemmy.ml
          link
          fedilink
          arrow-up
          1
          ·
          8 hours ago

          California does not issue NSLs, the US federal government does. And those come with gag orders that means you will go to federal prison if you tell anyone that you’ve been asked to spy on your users.

          • The Hobbyist@lemmy.zip
            link
            fedilink
            arrow-up
            2
            ·
            7 hours ago

            Are you implying that Signal is withholding information from the Californian Government? And only providing the full extent of their data to the government?

            This comes back to the earlier point that there is no proof Signal even has more data than they have shared.

            • Dessalines@lemmy.ml
              link
              fedilink
              arrow-up
              1
              ·
              7 hours ago

              If you don’t know what an NSL is, then you definitely shouldn’t be speaking about privacy.

              • The Hobbyist@lemmy.zip
                link
                fedilink
                arrow-up
                1
                ·
                6 hours ago

                It’s unfortunate that you react like this. I don’t claim to be an expert, never have. I’ve only been asking for evidence, but all we get to are assumptions and they all seem to stem from the fact that allegedly the CIA has indirectly funded Signal (I’m not disputing nor validating it).

                The concern is valid, and it has caused a lot of distrust in many companies due to the Snowden leaks, but that distrust is founded in the leaks. But so far there is no evidence that Signal is part of any of it. And given the continued endorsement by security experts, I’m inclined in trusting them.

        • Aria@lemmygrad.ml
          link
          fedilink
          arrow-up
          2
          ·
          10 hours ago

          We can’t verify that. They have a vested interest in lying, and occasionally are barred from disclosing government requests. However, using this as evidence, as I suggested in my previous comment, we can use it to make informed guesses as to what data they can share. They can’t share the content of the message or calls – This is believable and assumed. But they don’t mention anything surrounding the message, such as whom they sent it to (and it is them who receives and sends the messages), when, how big it was, etc. They say they don’t have access to your contact book – This is also very likely true. But that isn’t the same as not being able to provide a social graph, since they know everyone you’ve spoken to, even if they don’t know what you’ve saved about those people on your device. They also don’t mention anything about the connection they might collect that isn’t directly relevant to providing the service, like device info.

          Think about the feasibility of interacting with feds in the manner they imply. No extra communication to explain that they can’t provide info they don’t have? Even though they feel the need to communicate that to their customers. Of course this isn’t the extent of the communication, or they’d be in jail. But they’re comfortable spinning narratives. Consider their whole business is dependant on how they react to these requests. Do you think it’s likely their communication of how they handled it is half-truths?