Telegram Hands U.S. Authorities Data on Thousands of Users - eviltoast
  • Dessalines@lemmy.ml
    link
    fedilink
    arrow-up
    16
    arrow-down
    2
    ·
    14 hours ago

    I wrote a longer one here: https://dessalines.github.io/essays/why_not_signal.html

    The short version is, that it’s a centralized, US hosted service. All of those are subject to National Security Letters, and so are inherently compromised. Even if we accept that the message content is secure, then signal’s reliance on phone numbers (and in the US, a phone number is connected to your real identity and even current address), means that the US government has social connection graphs: everyone who uses signal, who they talk to, and when.

    • livestreamedcollapse@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      11 hours ago

      Building on this, I’d be curious to hear your thoughts on GrapheneOS as a whole. The OS recently bundled a new app “store”/repository, "Accrescent”, along with the usual basic apps like a calculator & camera. On Accrescent, the hardened fork of Signal, Molly, is offered on there. I’ve alsoheard one of the Graphene devs has voiced some chuddy politics.

      I’ve still installed & use Molly to chat with my closest friends who I was able to get off of big tech platforms previously used for our group chats, but I have been aware of the RFA/Signal connection for several years (your blog post really ties it together) & I do try to remind these friends about it. Really we just use Signal to shitpost and organize hangouts, so I’m not yet locking myself in a bunker over using it for those purposes, but all this has got me considering building a server & hosting a different secure chat service on it.

      I learned about possible Unit 8200 connections with the Matrix protocol within the past year or two, but don’t recall exactly what that entails. I haven’t heard much about Briar, but it being android only would make it a harder sell for getting people to switch over to it, so I suppose that leaves simpleX to proselytize.

      • Dessalines@lemmy.ml
        link
        fedilink
        arrow-up
        7
        ·
        8 hours ago

        I don’t know enough about grapeneOS to comment on it.

        Any signal app forks still have to use signals main servers, so they still got your phone number and identity.

        Matrix was originally funded by an Israeli company until it spun off, but unlike signal, it’s entirely open source, self-hostable, and can be run in a private manner. Phone numbers and identifiers are not required, so even if you connect to a malicious server, the most they get is your matrix id, and things you’ve explicitly leaked about your identity.

        The most we could say is that specific servers are compromised, but its also possible to host it outside a five-eyes country, unlike signal.

      • Davel@lemmy.ml
        link
        fedilink
        English
        arrow-up
        7
        ·
        10 hours ago

        You have provided literally nothing to back up your assertion.

        • Kairos@lemmy.today
          link
          fedilink
          arrow-up
          1
          arrow-down
          4
          ·
          9 hours ago

          Signal does not know who talks to whom. It’s kind of the main thing about the double ratchet.

          • Davel@lemmy.ml
            link
            fedilink
            English
            arrow-up
            5
            arrow-down
            2
            ·
            8 hours ago

            Unless you compiled the app yourself from source code that you understand, you don’t really know what the app might be saying to Signal’s servers. Almost everyone just trusts that the pre-compiled app supplied by Apple or Google aren’t compromised. But we know from history that Big Tech and the military-intelligence-industrial complex are in bed with each other.

              • Davel@lemmy.ml
                link
                fedilink
                English
                arrow-up
                4
                arrow-down
                1
                ·
                7 hours ago

                The double ratchet algo is irrelevant if the app is doing something else altogether.

                  • ☆ Yσɠƚԋσʂ ☆@lemmy.mlOP
                    link
                    fedilink
                    arrow-up
                    4
                    arrow-down
                    3
                    ·
                    7 hours ago

                    That’s nonsense, because many different people read the source and audit open source software. While it’s certainly possible to sneak malicious code in, the trust doesn’t depend on each single individual auditing it. It’s a collective effort.