“Telegram is not a private messenger. There’s nothing private about it. It’s the opposite. It’s a cloud messenger where every message you’ve ever sent or received is in plain text in a database that Telegram the organization controls and has access to it”
“It’s like a Russian oligarch starting an unencrypted version of WhatsApp, a pixel for pixel clone of WhatsApp. That should be kind of a difficult brand to operate. Somehow, they’ve done a really amazing job of convincing the whole world that this is an encrypted messaging app and that the founder is some kind of Russian dissident, even though he goes there once a month, the whole team lives in Russia, and their families are there.”
" What happened in France is they just chose not to respond to the subpoena. So that’s in violation of the law. And, he gets arrested in France, right? And everyone’s like, oh, France. But I think the key point is they have the data, like they can respond to the subpoenas where as Signal, for instance, doesn’t have access to the data and couldn’t respond to that same request. To me it’s very obvious that Russia would’ve had a much less polite version of that conversation with Pavel Durov and the telegram team before this moment"
That’s absurd coming from the founder of a FOSS messaging app who actively decided not to let Signal federate and rejected any other open source Signal client. Not only that, even now you can’t truly use Signal’s new “username” feature. If any of the recipients have your number stored in their phonebook, irrespective of whether you know them or not, the username goes for a toss. This was/is the problem with Telegram’s username feature. Signal knew this and still decided to go ahead with it. Not to mention never doing anything about completely removing the phone number from the account after its creation. This has been, by design, a privacy and hence safety threat, and even after the username feature was implemented, this not getting implemented is very concerning.
I’m sorry your free messaging app isn’t perfect. /s
And I always assumed that nicknames was just as much to prevent screenshots from becoming a liability.
you can’t truly use Signal’s new “username” feature. If any of the recipients have your number stored in their phonebook, irrespective of whether you know them or not, the username goes for a toss.
Hm. I haven’t interacted with a new Signal user in a while… but I do see in settings two knobs: “who can see my phone number” and “who can find me with my phone number”. Both of these settings can be set to “nobody”.
I’m guessing if I set “who can find me with my phone number” to “nobody”, then even if someone has my phone number in their contacts, they wouldn’t know I’m a Signal user?
Don’t forget not allowing you to sync historical messages between your phone and PC. Apparently somehow that’s just too complicated.
Its not about being complicated, its about dumping the whole chat history with just a few seconds of physical acceas to the device.
LEA has used this method with messangers like Whatsapp for years to quicly exfiltrade the data from a victims phone to other software.
There’s a pin. Just require the pin.
What are you talking about?
I literally installed Signal on my Linux laptop yesterday and it automatically downloaded all my messages from my phone.
Last time I did that, it would only sync new messages
Why is this interview happening inside a sauna?
She likes putting guests on the hot seat.
If you watch the video - its explained starting at 1:13, Moxie built it himself: https://www.youtube.com/watch?v=cPRi7mAGp7I
That’s fucking awesome
Moxie might not be right on every issue and might even be a part-time fed but his bona fides are impeccable
Dude is an OG from WAY back, used to frequent EFnet in the 90s and was already “elite” then.
Right? If they’re just chatting this should be happening in a jacuzzi with nice glasses of milk 🍼 👍
Why is this interview happening inside a sauna?
It’s his personal sauna. He built it himself.
Why did he invite the hot reporter chick to his sauna? would be the follow-up question…
It’s a sauna on a boat. She’s out in the middle of nowhere with some dude she barely knows. You know, she looks around and what does she see? Nothin’ but open ocean.
it’s the D.E.N.N.I.S. system working
That explains that awkward interaction in the interview. It’s like an interview happening in the Black Lodge.
If I had a personal sauna, I’d invite everyone. But I’m not from puritan central (USA) so that might be a foreign concept to some readers.
You answered yourself.
for the thumbnail :)
Somehow all these years I thought that Marlinspike is either Swedish or Finnish, so the sauna would be on brand.
Why not? I thought it was een interesting choice ;-P
To me, that is just clickbait.
Like in a sauna you should be completely exposed or something
They say the trick to public speaking is to picture the audience naked, but I actually prefer to do my interviews in a sauna so the audience pictures me naked.
What
Why don’t we all just truly go FOSS and use matrix?
Matrix results in way more meta data and through federation those meta data could be stored jn way more places.
Besides their main developer (element messenger) are cop / military boot lickers.
Those are some examples for why you might not use it, but depending on you use case you might still prefer it over signal.
Because it’s not p2p.
Dude for the first 15s I thought this is porn
its the sauna
How I hate that saunas are associated with porn and sex. It’s not supposed to be sexual and more importantly it’s an awful, just terrible place to have sex
I don’t know man, those benches are nice for a variety of positions. Plus, you are already naked…
Just trust me on this one, 80C+ room just isn’t the place for that sort of exercise. And it’s not like your heart rate isn’t up already lol. It’s a terrible experience
Slow down, big daddy! You can be gentle at it sometimes.
I want you to actually try sauna sex and report back to me, if you don’t believe me. But don’t say I didn’t warn you lol
you are gonna feel way too gross in the sauna to wanna have sex
Raising money for Signal with OnlyFans
It’s also important to continue educating people about the fact that Signal is incredibly problematic as well, but not in the way most people think.
The issue with Signal is that your phone number is metadata. And people who think metadata is “just” data or that cross-referencing is some kind of sci-fi nonsense, are fundamentally misunderstanding how modern surveillance works.
By requiring phone numbers, Signal, despite its good encryption, inherently builds a social graph. The server operators, or anyone who gets that data, can see a map of who is talking to whom. The content is secure, but the connections are not.
Being able to map out who talks to whom is incredibly valuable. A three-letter agency can take the map of connections and overlay it with all the other data they vacuum up from other sources, such as location data, purchase histories, social media activity. If you become a “person of interest” for any reason, they instantly have your entire social circle mapped out.
Worse, the act of seeking out encrypted communication is itself a red flag. It’s a perfect filter: “Show me everyone paranoid enough to use crypto.” You’re basically raising your hand.
So, in a twisted way, Signal being a tool for private conversations, makes it a perfect machine for mapping associations and identifying targets. The fact that Signal is operated centrally with the server located in the US, and it’s being developed by people with connections to US intelligence while being constantly pushed as the best solution for private communication should give everyone a pause.
The kicker is that thanks to gag orders, companies are legally forbidden from telling you if the feds come knocking for this data. So even if Signal’s intentions are pure, we’d never know how the data it collects is being used. The potential for abuse is baked right into the phone-number requirement.
Opinion: I think painting in Signal in such negative light is more harmful in the practical sense. Having fragmented messaging towards the public that does not care about many of these aspects just makes them a lot more hesitant to change, from my perspective.
We as a community should, in my opinion, pick a “good enough” solution for the majority of the people we interact with. That in itself is a market force to show interest and demand for private solutions. Most people I know don’t have the tools or knowledge or time to understand nuances and all they’ll hear are conflicting messages.
For us more technically inclined people: hell yeah, let’s figure out the ideal model and bring it up to maturity so others can join when it’s fleshed out. E.g. when lemmy came to my attention in the reddit 3rd party app fiasco, I was really confused on how to sign up and use it. And I’m no stranger to tech.
Edit: spelling
We as a community should, in my opinion, pick a “good enough” solution for the majority of the people we interact with.
I’d probably suggest Deltachat. It’s decentralized and has always on encryption, but is so incredibly simple and easy to onboard and use, and doesn’t require a phone number or even an email. It also works on all platforms with a single app.
and doesn’t require a phone number or even an email
wait, doesn’t it rely on the email system?
I would rather have signal possibly collect my social graph than google through gmail.
It uses a subset of the email protocol (which makes it very difficult for governments to block) but it no longer uses an an actual email address to function by default.
Even if someone did use a gmail exclusively for this (you can’t use it with an email account you use for normal emails too), everything would be entirely encrypted, and only the app itself would be able to decrypt it (google would not be able to decrypt the messages). But again, no normal user is going to use an actual email address.
You can read more about how it works in their FAQ. But the short version is once you pick a username, it just gives you a QR code or link to send to people, which connects you immediately in an encrypted chat room with no faffing around with emails.
There are plenty of good enough options like SimpleX Chat out there that don’t have this problem. The whole argument that people should just ignore the obvious issue with Signal is frankly weird.
Accept defects != ignore
My original comment that you replied to was explaining the defects. People are free to decide whether they want to accept them or not. Your comment is saying that it’s harmful to discuss these defects which implies that we should just ignore them.
I was talking about the “educating people” part. I interpreted as “let’s steer them away from Signal towards a better solution”. If it’s not the intent then my comment is irrelevant
Again, I think people should be aware that there are alternatives to Signal, and be able to make an informed decision on the trade offs that matter to them. My personal view is that there are absolutely better platforms than Signal, but if people understand the potential risks with Signal and use it because it’s convenient or their other contacts use it, etc., that’s entirely up to them. It’s just not what I would personally recommend if people want privacy.
Fair enough
You think we’re living in an ideal world, but we’re not. Most of our family and friends use WhatsApp and other big tech messaging apps. You make valid points, but they’re just a dream if messaging means people and if there aren’t people, it’s not messaging.
I appreciate the comment on the matter. This is good information to know and consider.
People should know that Signal is encrypted and private, but won’t make you a ghost.
That being said, the majority of people are not interested in privacy so getting them to use Signal over WhatsApp or SMS is a 99% win.
The question here is why not get people to switch to a better platform like SimpleX or even matrix with something like Element. I don’t find that Signal does anything better in practice.
And I’m not arguing not to.
But I tried to get everybody I know to contact me on signal or simplex. For a year. Only one person switched and they did so to signal. Because it was easier and more people were on it. I myself stopped using simplex because not enough people are using it that I know.
So where the rubber meets the road, if anybody wants to use signal I’m good with that because its good for 99% of all things.
If we (as privacy enthusiasts) want to promote the better apps, they need to be and appear less niche so they’re more acceptable.
Yeah, there are network effects at play here. Getting people to move off a platform is very difficult because they need their contacts to move to, and their contacts need theirs in turn. Some people are willing to use multiple messaging apps, but most don’t. I’d argue that’s why it’s important to promote alternatives to Signal. The more popular they become the easier it is to get people to move to them.
Apparently they don’t store contact info.
https://signal.org/blog/looking-back-as-the-world-moves-forward/
The problem is that you just have to trust them because only people who actually operate the server know what they do or do not store. Trust me bro, is not a viable security model. As a rule, you have to assume that any info an app collects, such as your phone number, can now be used in adversarial fashion against you.
And that is the problem with anything you don’t write yourself. And for anything you do write yourself: Are you smarter than the three-letter agencies?
There are plenty of chat services that aren’t centralized and hosted in the USA.
Sure… and my point is that you have to trust those services that aren’t hosted in the USA. It’s a choice you have to make. I’m not judging either way, just pointing out because what I responded to in the comment to which I replied was:
The problem is that you just have to trust them
Which is true of open source unless you read the code and can verify nothing nefarious exists; which is true if you use a service in a country you trust; which is true no matter what you’re doing.
Not all entities are deserving of the same level of trust - some are more trustworthy than others - but you are still making a decision to trust someone unless you write the code yourself or verify the code yourself.[1]
And had the capability and time to do so ↩︎
Which is true of open source unless you read the code and can verify nothing nefarious exists
Not at all. Not everyone needs to audit open source, only a few interested experts do. Most importantly, auditing is possible because its out in the open.
The just trust me model of signal means its impossible to audit, unless they give us their centralized database and server code.
If you are not auditing the source code, you are trusting those that are.
You don’t have to trust anybody when you run your own server, or you use a server that doesn’t collect information it has no business collecting.
You don’t have to trust anybody when you run your own server,
You have to trust the people that wrote the code.
or you use a server that doesn’t collect information it has no business collecting.
Again, you’re trusting the authors of the code.
Which is fine, but it’s a choice to trust them.
You have to trust the people that wrote the code.
There’s a big difference between having confidence in open source code that has been audited by many people, and knowing for a fact that the service collects specific information. In the former case, you can never be absolutely sure that the code is not malicious so there is always a risk, but in the latter case you know for a fact that the service is collecting inappropriate information and you have to trust that people operating the service are not using it in adversarial ways. These two scenarios are in no way equivalent.
Which is fine, but it’s a choice to trust them.
It’s a choice to trust the entire open source community around the project and all the security researchers who have been looking at the code.
Frankly, I have trouble believing that you don’t understand the difference here and are making your argument in good faith.
Frankly, I have trouble believing that you don’t understand the difference here and are making your argument in good faith.
Let’s back up to what I replied to in the first place:
You don’t have to trust anybody
I even took the time to quote that, because it’s important.
Of course there are different levels of trust. But what you said is flatly wrong and misinformation, if you want to get technical about it. Arguing in bad faith? I beg your fucking pardon, friend.
Just becuase it’s less likely to find nefarious code in open source doesn’t mean it doesn’t exist. There ahve been multiple cases of it found in open source code. Blindly trusting something because it’s open source or you host it on your own server is a very very false sense of security, especially in the context of the larger discussion, which came about in regard to what information is exposed by certain messaging clients.
It’s also a matter of the importance of what you’re doing.
I wrote a little CRUD app a while back to track me giving my cat medication. I sanitized inputs, but I left it open without a login on my server, just an obscure URL that didn’t get published anywhere. All you could do was click a button to indicate the cat had been medicated, or another button to delete the latest entry. That was plenty of security for that. If I was writing a banking app, I’d use a bit more.
So yes, in the same way as that, hosting something you use to chat with friends about whatever is one thing; trying to communicate secretly from a country where your comms might lead to being put to death is quite another. And in the latter case, it’s important to know that no matter what you use, unless you wrote it or read all the source code, you are trusting others with your life. Perhaps you feel comfortable doing that, but you should be aware of it.
So no, this is not a discussion in bad faith at all, it is valuable on multiple levels.
And the client, too.
Precisely.
And it’s worth repeating here - the level of trust needed is affected by the nature of what you might lose if that trust is broken. For non-important things, trusting a third-party company is probably fine. If you’re in a country and being found out might mean you get put to death, though, the stakes are a bit higher.
No need for that when self hosted open source projects exist
But again, you either read the source to confirm there’s nothing nefarious, or… you trust the programmers.
Which is not a problem, but it is a choice to trust. All I’m pointing out. :)
Well yeah everything is a choice when trust is the matter, but there is a difference between choosing a community project that can be audited by different transparent parties and choosing a private company on their own servers (even on source available projects)
Trust me bro
Yeah, this is the viable security model.
I’m not a developer, but if the client and server code is open (AGPLv3), you can definitely know what they do or store.
Except you have no idea what’s actually running on the server. Only people who operate it know.
Best alternative?
It really depends on your needs and what people you communicate with are willing to use. A few platforms that are notable in no particular order.
SimpleX Chat is probably the gold standard right now. It uses absolutely no user IDs such as phone numbers, no usernames, no random strings of text. Instead, it creates unique, pairwise decentralized message queues for every single contact you have. Because there is no global identity, there is no metadata connecting your conversations together.
Session is a popular Signal alternative. It doesn’t require a phone number and routes your messages through an onion-routed decentralized network that’s similar to Tor. Since your IP address is hidden and messages are bounced through multiple nodes, no single server ever knows who is talking to whom, stripping away metadata.
Jami is completely decentralized, open-source platform. It uses Distributed Hash Tables to connect users directly to one another without a central server. Notably, it supports high-quality voice and video calls.
heard SimpleX is really good, the only thing that bothers me is their vc funding model. It makes me feel a bit suspicious.
Yeah, I’m leery about anything where vcs are involved as well for obvious reasons. The tech itself does seem solid though, and it is open source. If it does start moving in a sketchy direction at least it could be forked at that point.
I really want simplexchat to evolve and get more features. If they ever make a lot of mod tools and the possibility to make giant servers with thousands with chatrooms like discord I could see it having mass appeal due to the ease of “signup”
yeah it definitely has some promise
Session is a security downgrade. It doesnt support forward secrecy which is hella important.
Session actually does implement a form of forward secrecy through the Session Protocol. https://getsession.org/blog/session-protocol-v2
It seems that forward secrecy is still in development from the blog you showed.
I still wouldnt use session for the reasons stated in this Soatok’s (a cryptographer) blogs. Even if they fix(ed) these problems, I have no trust for their security implementations. Why use session instead of something like Briar?
https://soatok.blog/2025/01/14/dont-use-session-signal-fork/ https://soatok.blog/2025/01/20/session-round-2/
I’m not advocating for using Session specifically, I just listed it as a viable alternative to Signal. Given that it’s forked from Signal presumably it’s an easier switch for people who like the general mechanics of Signal and its encryption system.
Understood.
I like your analysis, and would love your thoughts on matrix(assuming you have ofc)
People keep finding significant vulnerabilities in its cryptography and the Matrix team tries to deflect or create strawmans for why it isnt actually a vuln. Soatok found a vulnerability in 2024 by just browsing the source code for tiny bit of time, and again just two weeks ago after looking for a couple hours. In both cases, Matrix then responded to his vuln report with hostility, saying it wasnt actually a vulnerability. He is sitting on another vulnerability.
Having a cleartext mode is a security downgrade and no secure messenger should support cleartext. It only barely got functional forward secrecy recently. VoIP in most Matrix clients (and servers) still use Jitsi backend which isn’t E2EE, even with the release of the newer (secure) Element call protocol. Matrix leaks tons of metadata, such as usernames, room names, emoji reactions, generate URL embedded previews. Rooms arent encrypted by default. It is also a UX nightmare and often times you cant decrypt your messages.
Matrix is not secure. You’d be better off with XMPP and OMEMO which has its own problems and isn’t secure either. Sill better than Matrix.
“sitting on a vulnerability” does this mean he’s discovered another exploit but refuses to disclose it essentially?
It is a denial of service attack. He discloses all vulnerabilities ahead of time. The only reason he released the previous one so quickly is because the Matrix team said it “wasnt a real vulnerability”.
It’s better than Signal since you don’t have to disclose any personal info, but people have pointed out some issues with federation in it. Again, it’s one of those things that may or may not matter based on your use case.
That link seems dated (Nov. 2024). If anyone finds a more current critique, pls send. I also get auto-kicked from HLC simplex group, so I’m not sure what to think of them but commando’s matrix server was amazing befored abandoned
Probably Briar. Encrypted, P2P, and doesn’t require anything but a username and password to sign up. Pretty sure that username doesn’t need to be unique, it’s just what people will see you as in messages.
Downside is it’s only Android, so many people are left out.
sadly Briar has been stuck at the “cool idea” stage for years. Still no desktop app, still no iPhone app.
Still working android app.
If the username doesn’t have to be unique, couldn’t you impersonate people?
It doesn’t work like a centralized server for connecting contacts. You use a unique link per device to initiate the original connection with others at a distance or you can use QR codes in-person.
The link just tells briar where to route the messages and looks like:
briar://xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx (50 char alphanumeric key)
So there’s no way to impersonate someone directly. If you made two contacts and they use the same username, I suppose you could mistake them, but their contact connection keys will not be the same.
Hopefully that makes sense, if you look in the app or their site, it’s probably explained clearer.
signal is open source no?
There are forks that don’t require phone numbers.
Yes, but those are basically separate platforms like Session. Signal does not federate, and there’s only a single server in the US that requires your phone number to sign up.
Not effectively, since it’s centralized in the US and you have no idea what code the server is running.
Signal does claim to have their server code open, but they went a whole year one time without updating it, until they received some backlash for it.
you can never validate what code a server is running, so having FOSS server code is kinda a moot point: it can’t add anything useful to the privacy conversation
the only way you can guarantee privacy is with the client code, and they have repeatable builds so you can validate the code that’s encrypting the messages, and in that case it barely even matters if their server is streaming all the data they receive to some shady other place… especially with sealed sender
you can never validate what code a server is running
Most halfway-decent messaging services (unlike signal) are self-hostable. So yes with actual open source software, that’s very possible.
that comes down to a difference in philosophy i think… signal have detailed their reasoning for not making signals servers decentralised and self hostable, and i don’t disagree with some of them… i think everything is a trade-off, and decentralisation has scaling and usability issues
signal has done a pretty good job of creating a platform that’s much much better than alternatives in a package that’s consumable by the general public
i’m not sure that something that’s more like matrix, or xmpp, etc could do that
it might be theoretically and technically not quite as perfect, but its impact on increased privacy across the globe has been far larger because they’ve made some of those compromises
I can’t really trust anyone’s security philosophy when they market their service as “secure”, but then have it built on required phone numbers (linkable to your real identity), and a single centralized US-based server subject to national security letters.
Anyone who came up with this idea of security should be laughed out of the room.
I’m convinced signal’s entire support is similar to apple’s : they make vague untestable claims about security, whilst having a shiny and functional app.
There are so many self-hostable alternatives that have signal beat on both those, that make any reason for using it moot.
you can never validate what code a server is running
Really? if so how can we trust Lemmy?
you can’t, and shouldn’t… lemmy never claimed to be, nor has the architecture to enable it to be a private service. lemmy instances are run by arbitrary people on the internet, and some of them do run forked versions of the codebase (eg blahaj)… we have no way of verifying what’s running on the server
but interaction on lemmy doesn’t require trust. i don’t think anyone is expecting lemmy to be private
@dessalines@lemmy.ml I’m not a developer could you explain this?
The above poster is wrong. You can absolutely trust lemmy, because its open source and self hostable. You can build the project from source (like a cooking recipe), and run it yourself.
Isn’t it reproducible?
The server operators, or anyone who gets that data, can see a map of who is talking to whom.
!citation needed
I think their point is that signal knows the phone number associated to each account, and in lots of countries nowadays phone numbers are only obtained after identity verification.
sealed sender is supposed to hide the identity of the sender from signal servers, but it’s security is questionable as it’s based on blackbox hardware not even signal staff can audit.
Citation for what exactly? Go read up on how networking works, entire textbooks are available. The server has access to all the data the client sends it. How do you think you get paired with another person to chat, by magic?
What is not mentioned… there’s no privacy when the device itself is compromised. For instance, Android phones can read and phone home data from your notifications. In that case, any messenger app wouldn’t be private from Google’s eyes.
There’s a commonly used Russian metaphor “to not see the forest behind the trees”.
What you are calling a device is in fact a system. It’s a local system, that you are carrying in your hand, but it’s functioning due to a very complex global system which is not. That device in itself is like a 1960s’ town in complexity. In itself, but there’s also the global system.
And these are a result of quite a lot of people employed by various organizations with hierarchies and dependencies. And most of the power in those organizations doesn’t want you to have privacy and autonomy as much and when you want. If you want those, you should produce your own hardware and everything above it. Or build organizations interested in your full privacy and autonomy which will do that. It’s about structure, so just creating a few of them (a goal hardly reachable in itself) with manifests saying “we want to be good” won’t change anything.
So, if you were wondering why contemporaries of Stalin’s regime were reluctant to divorce it with Marxism and call it something else, - that’s similar to this. They really wanted to believe there’s a Marxist superpower, just like some people wanted to believe Google is a good corporation, and before that some people wanted to believe Apple is a counterculture corporation, and so on. And, at various moments in time and space, in various dimensions, sometimes these were. Just like in some ways the British Empire was really bringing civilization to the world.
The more life and diversity there is, the likelier we are to have good things. That doesn’t mean we’ll ever have full privacy, full autonomy, fully civilized, peaceful and honorable world, and so on. We won’t.
I think that metaphor is quite universal because it’s also used very commonly in English and Estonian at the very least.
It’s common in Russia. It’s common a lot of places, but it’s common in Russia
But yeah, I’ve used that and the inverse depending on the context plenty of time.
Well, that something common in Russia as a metaphor is also common in Estonia wouldn’t be a surprise, but in English seems a bit less common. Anyway, that wasn’t the point of my comment.
Remember how Telegram said they would stop providing Chinese authorities with user data during the Hong Kong protests. Implying that they were doing it at some stage.
Also remember how the FBI have said in several leaked documents they hate signal because the only data they get is when the user signed up and the last time they were online, nothing else.
Which app would you rather use?
how much data do the FBI get from telegram? do you think the russian owner (who got arrested in france for refusing to make changes demanded of him by glowing authorities) is very likely to give any of your info over to american 3 letter agencies?
I think it probably doesn’t matter what he wants, it only matters that the data exists at all. If the owner is not giving permission, that’s one thing. But I’m inclined to believe that those American 3-letter agencies aren’t the sort to ask permission.
All it takes is one disgruntled systems engineer who thinks they don’t get paid enough. An agency comes knocking with a sizable offer of cash, and they’ll get the backdoor they want.
I don’t understand his point about restoring your messages to a new phone. How does that prove it isn’t encrypted? Couldn’t Telegram store the encrypted data on their server, send the encrypted data back to you and then you automatically decrypt it because you have the key?
With my limited knowledge of cryptography, this is how I understand it:
The distinction to make is that the user’s password is not the encryption key - it only gives access to the key. So even if the user has the same password on a new device, there would be no way to decrypt the data without the original key.
In order to maintain full privacy, data has to be encrypted on device before sending it through any server (whether to another participant in a chat, or for backup). This means that the encryption key has to be on device.
If that key was copied over to a location not controlled by the user (e.g. Telegram server), then that location would have access to the key and can decrypt any data encrypted by that key. In the same vein, if a user loses their phone then that encryption key must be lost, so encrypted data cannot be decrypted on a new phone.
Which means that the only way that Telegram can provide the chats on a new phone (when the user has no access to the old phone) is if they have access to the encryption key and can provide it to the new phone.
From my experience with that: Telegram restored all unecrypted chats when I swapped phones without asking me for any passwort / key. I literally just confirmed my phone number and all my chats / groups / contacts appeared.
I assume you still had access to your old phone and could approve the transfer from it. If not, then your phone number is your password, which is even worse, in my opinion (it’s basically public information).
I got a one time password via SMS to confirm I am the one with access to this phone number.
Unlike Signal, Telegram is successful in getting people to move away from Meta’s Whatsapp.
Idk about that. Signal is the main alternative to WA in some parts of europe.
Telegram has approximately 1 billion global users. Signal only has around 100 million. Telegram is about 10x the size of Signal.
As much as I’d like to favor foss and federated messenger apps, telegram isn’t as much garbage as whatsapp:
1.The client is somewhat open source and have forks like Forkgram, Materialgram and unoffical clients like Telegrand.
2. Telegram isn’t E2EE by default but at least it doesn’t lie about it and have E2EE secret chat when nessesary, that means crucial chats stay on your device and the rest stay on their database recoverable and syncable across devices.
(Yes, whatsapp supposedly is E2EE but we can’t know for sure, it’s closed-source.)
3. You can use telegram as a cloud service with only 2GB per file limit, unlike whatsapp.
(There’s even a third-party app that utilise this as a cloud gallery.)
4. Even tho telegram has ads in large channels, telegram isn’t funded by a greedy big-corp and it doesn’t datamine you, ads are based on the channel’s topic.Yes, in terms of privacy, telegram isn’t the best option, Signal, Session, XMPP, Matrix, or SimpleX have better privacy features, less linkability and E2EE by default but telegram is very mainstream and got more publicity, making it the whatsapp alternative it advertises itself as-is.
Publicity doesn’t make a better messenger app, but for what it tries to do, it’s adoptable for simple users, doubles as cloud storage and is more secure than the garbage being whatsapp.Immigrating users to different apps is a headache on it’s own, but if they know of telegram and it’s not privacy invasive, that’s not bad.
Isn’t it possible to verify WhatsApp encryption with packet sniffing?
Yes, but how would you know Meta doesn’t have a copy of your encryption key (ex: when you sign up) and keeps a copy of your encrypted messages somewhere?
AFAIK your encryption key resides as whatsapp’s data folder but since whatsapp is closed-source you can’t guarantee that whatsapp gave the encryption key to Meta’s server at some point when it was created; (or it was created on their servers and sent to your device.)One would just assume the encryption key is made on your device and never sent to Meta and all the E2EE messages aren’t kept on Meta’s server after they are sent.
Again, Meta is a company that is profiting on targeted advetising and selling user data, how would whatsapp be a free service without any profit?
Also, Here’s someone who saw their whatsapp chat used for targeted ads on them in case you have doubt.
- I can’t find a link to this but I’m sure I’ve read an article about what happens when you “report” a message someone sent to you in WhatsApp. In this case some reviewer at Meta will look at your message and determine if it violated the rules. IIRC the article talked about them most likely being added to the chat but not visible.
- There’s a recent lawsuit that shows that Meta can view your messages through internal systems: https://proton.me/blog/whatsapp-encryption-lawsuit
- Meta’s AI assistant in WhatsApp leaves more questions about privacy. How closed-off is the data used in this AI from other parts of Meta’s services?
Again, as I said, whatsapp doesn’t feel like a genuine messenger app as much as an oversimplified garbage made for tracking users on the background for profiting.
Even the deal of “giving” Llama LLMs (Meta AI) to everyone feels sketchy and look abusive the way it is pushed to users.Likewise all of meta’s services, the only catch with whatsapp that it used to be good and it’s a well-spread application, that’s why they bought it instead of improving FB’s messenger, as meta want to benefit of it’s naive userbase who think whatsapp is “As fine as ever”;
To you, publicity is nothing important and it doesn’t make a good product, to meta however, publicity is “everything” and it shall be all-time high, they have more analytical data about their userbase and have a good idea of what they would do and what decision they would take.
Yeah don’t get me wrong, I despise meta and their facade pretending WhatsApp is private. Your example is evidence but not proof but it does not mean I doubt you because it really doesn’t surprise me. Gmail likes to pretend it’s secure and private too because data in transit is supposedly encrypted but they can still just read absolutely everything in your inbox themselves
Just…
Don’t let them deceive you;If you must use deceitful software like Gmail, Whatsapp, Discord, office or whatever, just try your best not to leak your personal data on them, and if you can hinder the tracking, do so.
If you can use other (preferably FOSS) software, do so, there’s plenty of solutions out there and most of them are free, and sometimes selfhost-able.
Google, Meta, Microsoft or whatever corp can lie about security or privacy all they want, but in the end, they only fool themself thinking their monetary practices aren’t obvious and they can fool everyone, trust is a hard thing to earn and they can’t earn it with fraud.
The product mostly show itself, and you have to go around it to know what’s it’s deal, if you prefer to not do so, you can search if any security researcher or analyst did investigate the product; For example Google claims Chrome browser is “safe” and “secure” dispute them giving so much trackable APIs for websites, and having a horrable default permissions, and don’t forget the “Manifest V3” transition just to remove ads (and trackers) blockers like uBlock Origin.
You don’t need solid proof to know what is what.And then you just type " Foss Chrome Alternatives" or “Private Browsers” on a search engine like DDG where you can find many articles to help you find one (like this) and you’d be done.
Forget about ““Others”” right now, your well-being matters the most.
I’m on dat Molly
I’ve been saying this for years. Telegram is a social media app.
They’ve done a really amazing job of convincing the world that this is an encrypted messaging app.
This is a play on people’s naivety. It is an encrypted messaging app in as much as regular messages are encrypted between the client and the server. It’s just that this achieves nothing for the user in terms of privacy unless you can both completely trust the provider (you shouldn’t) and be confident that the back-end can’t be compromised (you can’t).
They do also have “secret chats” that are apparently E2E encrypted, but you’d be mad at this point to give them the benefit of the doubt without at least looking at independent security audits of the client.
When you build a backdoor into your “encrypted messenger” its just a surveillance app
And WhatsApp is worse. It fails to include a libre software license text file. We do not control it. It is never secure.
It fails to include a libre software license text file.
I don’t think this really makes sense as the leading point. More like “It’s run by Meta and who knows what kind of backdoor they put in”
Yeah, it uses the signal protocol, but who’s to say they don’t have a secret member of every conversation.
I think WhatsApps biggest risk is the metadata. They know every group you are in and who else is in that group. They know when messages are sent and to who. They know where you are at all times, and probably have access to your libraries as well if you didn’t specifically restrict that. It’s a huge trove of data, which one would assume is freely shared with governments on request.
I have a credible source that says they’re scanning media being sent. They have a CSAM or related department. No idea how that works but I heard it exists. Can’t find anything about it on the internet however to confirm
I wouldn’t say it’s worse. It technically claims to have end-to-end encryption while telegram doesn’t. I wouldn’t trust it at all because it’s from Meta, but I don’t see how you can say the one at least claiming to have encryption is worse than the one that just flat out doesn’t have it.
End to end encryption is worth nothing when WhatsApp have access to the encryption key. And the fact that all photos you see on WhatsApp are saved on your phone without encryption means that it’s only encrypted when it’s sent, nowhere else.
I also have very suspicious examples of advertising linked to WhatsApp conversations.
Exactly. Meta is fine with What’sApp having E2EE, because they can still spy at the endpoints
Yes, it’s not good. We’re talking about if it is worse than telegram though. Not if it’s simply good or not.
I thought I was pretty fucking clear on that in my original comment?
From my perspective, I’d rather have an enemy of country to have my personal data. It’s far harder to use for them than for my country.
Lying is worse and you already said you don’t trust it at all.
Worse with an asterisk. For making contents encrypted - no, anything else - yes
It’s not.
Not = content not encrypted, or not worse





















