293
Signal boss warns app will exit Australia if forced to hand over users’ encrypted messages
(www.theaustralian.com.au)
A place to discuss Australia and important Australian issues.
If you're posting anything related to:
If you're posting Australian News (not opinion or discussion pieces) post it to Australian News
This community is run under the rules of aussie.zone. In addition to those rules:
Congratulations to @Tau@aussie.zone who had the most upvoted submission to our banner photo competition
Be sure to check out and subscribe to our related communities on aussie.zone:
https://aussie.zone/communities
Since Kbin doesn't show Lemmy Moderators, I'll list them here. Also note that Kbin does not distinguish moderator comments.
Additionally, we have our instance admins: @lodion@aussie.zone and @Nath@aussie.zone
Does Signal not have data?
@9tr6gyp3
There is NO back-door to Signal.
@signalapp is blind to all communications. (Including, probably, this toot! 🤪)
Signal itself does NOT know who has messaged whom, nor when, nor how (e.g. the IP address is NOT known.)
If Signal was subpoenaed to produce my records, they could produce:
I'm *fairly* sure that is all of it.
(Please let me know if I'm wrong.)
@sunzu2
I never claimed there was a backdoor...?
Your items 1, 2, 3 are data that Signal stores, as well as the encrypted blobs of our conversations.
Which means they have data, right?
@sunzu2
Nope and I was wrong.
@signalapp is only able to produce LESS information than I previously stated.
That's it. Nothing else.
Signal does NOT log users' IP addresses.
See this for more information:
https://signal.org/bigbrother/santaclara/
@maniacalmanicmania @9tr6gyp3 @signalapp
@sunzu2
To do the things you are suggesting that Signal could be forced to do, Signal would have to rewrite its entire codebase as well as the client apps.
Fortunately, Signal is open source, and such changes would be noticed.
As it stands, it doesn't matter what is demanded nor by whom as the only user data, including traffic analysis, that Signal can currently reveal is insignificant.
Signal simply cannot disclose data it itself cannot access.
Yes, decentralised services are preferable, but Signal has probably the easiest onboarding experience for the average user, especially those new to the concept of E2EE.
@maniacalmanicmania @9tr6gyp3 @signalapp
@sunzu2
Signal knows *when* a user wqs last connected, but not the IP address of that connection. The system has been specifically designed to minimise the meta data available for collection.
@maniacalmanicmania @9tr6gyp3 @signalapp
@sunzu2
Read the Affidavit produced here:
https://signal.org/bigbrother/santaclara/
Read Signal's complete source code here:
https://github.com/signalapp
Once you understand the code, you'll understand "what they can do" and what they cannot do.
When you've identified any flaw in the code that runs the Signal servers that would allow IP logging, let me know. I'll be glad to file the bug report on your behalf.
@maniacalmanicmania @9tr6gyp3 @signalapp
@sunzu2
"Under FISA order, signal would provide logs."
How would Signal do this? Logs of what?
Corresponding parties? Messages? They don't have them.
They'd have to rewrite their backend code to obtain them, and changes would also need to be made to the Signal client apps.
It would not matter if the FISA Court ordered that logs be produced in secret by Signal. Any such logs could not be obtained without significant changes to the way Signal works. Users would know.
Yes, Signal does have some shortcomings, but these are acceptable in most 'use cases' for most threat models.
Signal is best used as a private, E2EE alternative to SMS. Only a fool would use it for the *most sensitive* of communications. (Like, you know, discussing an impending military strike...)
We all know of the alternatives, including (but not limited to) SimpleX, Session, Briar, Element etc.
@maniacalmanicmania @9tr6gyp3 @signalapp