• 20 Posts
  • 292 Comments
Joined 6 years ago
cake
Cake day: April 17th, 2019

help-circle
  • Signal’s server is open-source

    Prove it, give me ssh access to their centralized server so I can verify that they’re running the code they’ve published. Otherwise this is a “just trust me” claim.

    Also, I don’t think Signal can get your name without a government to look it up.

    There are 10 websites that publicly publish phone number and identity info, right now. Not even a government, but a random stranger can convert your phone number to your real identity.


  • what information is provided to an entity about whom.

    “Content” and “Context”

    Why is only message text considered “information / content / context” here. Signal has your real name and address via phone numbers, and has every other real person you talked to, and when. Why is “message text” considered context, but social networking graphs aren’t?

    All these definitions are highly subjective, and the above one clearly considers social networking graphs to not be “content”. Basically they’ve re-defined privacy in a way that excludes highly sensitive information like everyone you talk to, and when.


  • thanks to end to end encryption. You can evaluate the protocol yourself with your own eyes, except clearly you cannot read, but modulo that.

    This means nothing when you have no idea what code the server is running, they even went a whole year without publishing their server code updates, until they got a lot of backlash over it. Real security doesn’t require a “just trust us” claim.

    Also, metadata is content. Even if they don’t have the message text, Signal still has the real identities of everyone you talked to, and when. With that you can build social network graphs, which are far easier to harvest and more useful anyway than trying to read through message content and determine meaning.


  • Signal is not open source, its a centralized US service, and you have no idea what their server is running. They even went a full year without publishing server code updates at one point, until it caused enough of a backlash that they started doing it again. But publishing that is no guarantee of anything, because you have no access to their server.

    mathematically impossible for Signal to gain access to your sensitive information (except for your phone number, obviously).

    A phone number in most countries, including the US, means your real name and address.







  • He does not know what I do, other than observe that I ride a John Deer around in the fields and corn comes up shortly there after. Riding a John Deer in a field is observable by all public passers by.

    So because he knows only a limited amount, that’s the distinction between private and anonymous?

    Signal is not your neighbor. Signal’s DB stores phone numbers and knows who you are, and who you talked to, and when. Are the people you talk to considered “public”, to a US-based corporation?


  • It was originally funded by amdocs, a US and Israeli company, but they have their own funding for many years now.

    Regardless, considering its entirely open source, buildable from source, self-hostable (and auditable), which is more than you can say for signal, where the back end is centralized, and hosted in a five-eyes country.

    Matrix requires no “just trust us” clause unlike signal, because you can run the software yourself, and verify that its not making calls to US or Israeli servers.




  • stores hashed phone numbers and first access / last access times and nothing else.

    Even if this weren’t false (otherwise they wouldn’t be able to connect to your existing contacts), that’s a “just trust us” claim. You give them your phone number, you should assume they have it and not “trust them” to hash it like its a password.

    And the client does store these things, but also lets users delete messages and contacts. Your message deletions can propagate as well.

    Not that its that important, but its yet another just trust us claim.