Nowadays, a majority of apps require you to sign up with your email or even worse your phone number. If you have a phone number attached to your name, meaning you went to a cell service/phone provider, and you gave them your ID, then no matter what app you use, no matter how private it says it is, it is not private. There is NO exception to this. Your identity is instantly tied to that account.

Signal is not private. I recommend Simplex or another peer to peer onion messaging app. They don’t require email or phone number. So as long as you protect your IP you are anonymous

  • irmadlad@lemmy.world
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    1
    ·
    2 days ago

    So, late to the party. Me Skuzi. This comment is more targeted towards your responses to user comments, but I would extend that to your entire thesis. So I decided to make an entirely new comment.

    Honest questions/comments to follow:

    Yes, the US govt can ‘compel’ a organization such as Signal to allow them to monitor/intercept encrypted messages, The government can even ‘compel’ a citizen to disclose their encryption key. The cost of non compliance varies from contempt of court to short term incarceration. United States v. Fricosu et al.

    However, Signal would only shrug and hand them metadata. Even Signal can’t decipher your messages. There are other services unrelated to Signal that operate thusly, such as VPNs, that absolutely do not keep logs and run in RAM only. Some of those VPNs have been raided and servers confiscated by multiple governments with nothing to show for their efforts. If I recall correctly mega.nz and other storage facilities operate along the same lines.

    As to the requirement for a phone number, yes they do require a phone number. However, unless they’ve changed something recently, you can use a free or paid for, burner phone number for verification. The caveat is that if you ever have to recover your account or future verification, you may or may not have access to that number if you used a free service. So, that might be a consideration.

    Also, some free services might not work while others will. If signing up for a paid account, burnerapp.com for instance, will allow you to sign up via their website, however you can’t use a VPN. WiFi can be acquired at any coffee shop. If you prefer more private methods of payment for these services, there are those that accept crypto.

    So, there are ‘options.’ You just might have to jump through a few hoops to get there.

    Secondly, Signal is open source, no? The whole shebang including the protocol is open source. Where might ‘they’ be putting the backdoor to intercept encrypted messages? I can tell you this, the day the world finds out that the US govt has successfully cracked strong encryption ciphers, is the day you are going to see a lot of movement on this planet. From billion dollar corporations, private entities, governments, and even ne’er-do-wells on Signal.

    I’m no ‘fanboy’, tho there is a lot to be a fan of. I’m not getting any kickbacks, compensation, or monetary advancements. If I need to be schooled, please do share.

    Signal does plan to add a paid for service as well as their free service.

    • corvus@lemmy.ml
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      edit-2
      2 days ago

      Signal would only shrug and hand them metadata

      So at the very least by using Signal the government can know everyone you communicated with, at what time and where. And still is considered a private messenger. Amazing.

      • irmadlad@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        2 days ago

        As clients upgrade, messages will automatically be delivered using sealed sender whenever possible. Users can enable an optional status icon that will be displayed in the detailed information view for a message to indicate when this happens. These protocol changes are an incremental step, and we are continuing to work on improvements to Signal’s metadata resistance. In particular, additional resistance to traffic correlation via timing attacks and IP addresses are areas of ongoing development. https://signal.org/blog/sealed-sender

        In reading about the Sealed Sender protocol, as I understand, it redacts whom you’ve contacted. However, the metadata does include timestamps. I have no dog in this hunt as 99% of my messages are whispered into someone’s ear. Still, one must implicitly trust the receiver of such whispered messages. I honestly don’t care what app you use. Those choices are ultimately yours and yours alone and hopefully dependent on who you entrust with your data. This is just an interesting dissection of Signal and privacy/anonymity for the muse.

        In the end, we all trust some entity whether it be your ISP who has your bank account info and residential address and can tell when you’re downloading 150 gigs of Linux distros overnight even with a VPN, a bank with every last transaction you authorize, the time/date, or government to which we pay income taxes who has pretty much all the info they would need to show up at your doorstep. If your threat model precludes all the above, I would recommend whispering and disconnecting from society. I honestly do not see any other way.

      • irmadlad@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        2 days ago

        Well, I’m not trying to convince you of anything, however, you can convince me if you’d like. Do you have some substantiating evidence or documentation for such claims? I am aware of improvements to AES256 down through the years, and I am aware of side channel and timing attacks. Not to be discounted, but those are largely theoretical attacks. In addition, most modern computers have mitigated the possibilities of such attacks with hardware instructions for AES to protect against timing-related side-channel attacks.

        The NSA reviewed all the AES finalists, including Rijndael, and reported that all of them were secure enough for U.S. Government non-classified data. However, in June 2003, the U.S. Government announced that AES could be used to protect classified information. Now you could conspiriaze that in 2003, the govt played dumb and said that AES was good enough for classified information when they knew they could blow through it like weak toilet paper, but then again, we (America) are not the only country on the planet despite what some people think, and I am quite certain that other governments have made certain their encryption techniques are 99.999% secure for classified documentation and data.

        • hereforawhile@lemmy.ml
          link
          fedilink
          arrow-up
          1
          arrow-down
          4
          ·
          2 days ago

          You make good points and I can’t provide any documentation. But the documentation won’t exist. It would be the closest guarded secret of all time. NSA only holds the upper hand if everyone thinks it’s secure. If the secret was out that that they could crack it no one would use it and the advantage is lost.