this post was submitted on 15 Apr 2024
51 points (100.0% liked)

Privacy

787 readers
18 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS
 

I'm thinking of the things listed on the Privacy Guides real-time communication section

https://www.privacyguides.org/en/real-time-communication/

top 50 comments
sorted by: hot top controversial new old
[–] kia@lemmy.ca 51 points 5 months ago (2 children)

The difficulty of any non-mainstream chat app is getting other people to use it. On that list, Signal is the most probable to be recognized by people who don't have a particular interest in privacy, so it's more likely to get more people to use it.

[–] AprilF00lz@lemmy.ml 5 points 5 months ago (1 children)

besides that, and besides the lack of forward secrecy on matrix and session already mentioned by privacy guides, do some of these alternatives have worse security, privacy, or ux than signal in some way?

[–] 486@kbin.social 1 points 5 months ago* (last edited 5 months ago)

Matrix also does have a pretty big problem with meta data. By default it stores a ton of meta data (at least the reference server implementation does) and I am not sure if this is even a solvable problem without redesigning the protocol. When opting for an alternative to Signal, XMPP is probably the better choice.

[–] AprilF00lz@lemmy.ml 3 points 5 months ago (1 children)

and how are they ordered in popularity?

load more comments (1 replies)
[–] hanrahan@slrpnk.net 22 points 5 months ago (1 children)

Why is Session always mentioned ? It's an Australian company, in a land with zero constitutional oversight I'd be more inclined to think its a honeypot then a privavy focused chat app. Anom springs to mind as an example.

[–] possiblylinux127@lemmy.zip 10 points 5 months ago* (last edited 5 months ago)

You should not trust any company or organization. What matters is the security and privacy or the app and service.

[–] jet@hackertalks.com 18 points 5 months ago (4 children)

Signal isn't federated. Signal has centralized servers. Signal requires phone number identification to use it. Signal stores your encryption key on their servers.... Relying on sgx enclaves to 'protrct' your encryption key.

Signal can go down. Signal knows who you talk to, just by message timing. Signal knows how frequently you talk to someone. Signal can decrypt your traffic by attack their own sgx enclaves and extracting your encryption key.

These are all possible threats and capabilities. You have to decide what tradeoff makes sense to you. Fwiw I still use signal.

[–] camilobotero@feddit.dk 9 points 5 months ago

Many assertions without any proof. Could you at least point out the sources for such statements?

[–] BearOfaTime@lemm.ee 7 points 5 months ago* (last edited 5 months ago) (1 children)

Read the post by signal. Note the use of the word "plaintext".

we don’t have a plaintext record of your contacts, social graph, profile name, location, group memberships, groups titles, group avatars, group attributes, or who is messaging whom.

Whenever someone qualifies a statement like this, without clarifying, it's clear they're trying to obfuscate something.

I don't need to dig into the technical details to know it's not as secure as they like to present themselves.

Thanks. I didn't realize they were so disingenuous. This also explains why they stopped supporting SMS - it didn't transit their servers (they'd have to add code to capture SMS, which people would notice).

They now seem like a honeypot.

[–] possiblylinux127@lemmy.zip 3 points 5 months ago* (last edited 5 months ago) (1 children)

They are very much not. Anyone who tells you this is a state influencer or someone who believed a state influencer.

[–] jet@hackertalks.com 3 points 5 months ago (1 children)

Saying something has the capabilities of a honeypot, is the correct thing to do when we're assessing our threat model.

Is it a honey pot? I don't know. It's unknowable. We have to acknowledge the the actual capabilities of the software as written and the data flows and the organizational realities.

[–] possiblylinux127@lemmy.zip 5 points 5 months ago (1 children)

My concern is people stay away from Signal in favor of unencrypted privacy nightmares. It happened with DDG a while back where I knew people who used Google because DDG had privacy issues. It sounds dumb but it is a true story.

[–] jet@hackertalks.com 3 points 5 months ago

Sure. I still encourage people to use signal. Most people don't have a threat model that makes the honey pot scenario a viable threat. In this thread we are talking about its downsides, which is healthy to do from time to time. Acknowledging capabilities is a good exercise.

[–] 7eter@feddit.de 7 points 5 months ago* (last edited 5 months ago) (1 children)

Signal stores your encryption key on their servers....

That would surprise me. What's your source for this?

[–] jet@hackertalks.com 3 points 5 months ago (2 children)
[–] ryannathans@aussie.zone 4 points 5 months ago (1 children)

master_key is never stored or sent to the SGX, only c2, the entropy bits. The user's password is still required to generate the key.

[–] jet@hackertalks.com 4 points 5 months ago* (last edited 5 months ago) (1 children)

Brute forcing 4-6 digit pins is trivial.

And even if the user set a actual password, it's still very trivial

https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/

[–] ryannathans@aussie.zone 2 points 5 months ago (1 children)

"Very trivial" if they set a proper password? Yet the source you provide says it's robustly secure

[–] jet@hackertalks.com 1 points 5 months ago

I can't find the phrase robustly secure in the last link:

https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/

Signal asks users to set a pin/password which needs to be periodically reentered. This discourages people from using high entropy passwords like BIP38.

[–] LWD@lemm.ee 3 points 5 months ago (1 children)

So my takeaways from this link and other critiques has been:

1.Signal doesn't upload your messages anywhere, but things like your contacts (e.g. people you know the usernane/identifier, but not phone number of) can get backed up online

One challenge has been that if we added support for something like usernames in Signal, those usernames wouldn’t get saved in your phone’s address book. Thus if you reinstalled Signal or got a new device, you would lose your entire social graph, because it’s not saved anywhere else.

2. You can disable this backup and fully avert this issue. (You'll lose registration lock if you do this.)

3. Short PINs should be considered breakable, and if you're on this subreddit you should probably use a relatively long password like BIP39 or some similar randomly assigned mnemonic.

If an attacker is able to dump the memory space of a running Signal SGX enclave, they’ll be able to expose secret seed values as well as user password hashes. With those values in hand, attackers can run a basic offline dictionary attack to recover the user’s backup keys and passphrase. The difficulty of completing this attack depends entirely on the strength of a user’s password. If it’s a BIP39 phrase, you’ll be fine. If it’s a 4-digit PIN, as strongly encouraged by the UI of the Signal app, you will not be.

4. SGX should probably also be considered breakable, although this does appear to be an effort to prevent data from leaking.

The various attacks against SGX are many and varied, but largely have a common cause: SGX is designed to provide virtualized execution of programs on a complex general-purpose processor, and said processors have a lot of weird and unexplored behavior. If an attacker can get the processor to misbehave, this will in turn undermine the security of SGX.

[–] jet@hackertalks.com 1 points 5 months ago (1 children)

One nit to pick, messages have to transit through the signal network. And they could be recorded during transit. Carnivore style

[–] LWD@lemm.ee 2 points 5 months ago

True, but that's more or less out of the scope of this thread. I could go on for way longer about centralized versus federated services...

[–] possiblylinux127@lemmy.zip 3 points 5 months ago (1 children)

Signal is still secure. If it wasn't it wouldn't be used in Military applications.

[–] jet@hackertalks.com 4 points 5 months ago (1 children)

Secure within the context of a certain threat model.

The French government does not endorse signal for government communication as an example

And I would highly suspect the Russian government would not use signal either.

I cite both of these as examples of threat models that can't ignore some of the potential capability of the signal.

[–] possiblylinux127@lemmy.zip 2 points 5 months ago

In the US government organizations are trying to protect themselves from each other and themselves. (Its messy)

Not to say that Signal is perfect (its not) but if the DoD recommends it and has guidance on how to harden it then it can't be to bad.

[–] Tempo@lemmy.ml 15 points 5 months ago (1 children)

What's your use case? Likeminded techie friends? Family members?

Signal works well as an alternative to the likes of Telegram and WhatsApp, even if it still requires a phone number and is centralised. Far easier to explain to the family instead of "oh well you can sign up on this website or this website or that website".

Granted, if you want to host a small Matrix server just for the family, then go for it.

[–] LucidBoi@lemmy.dbzer0.com 2 points 5 months ago* (last edited 5 months ago) (1 children)

It doesn't require a phone number anymore.

Edit: I was wrong. :p

[–] lemmyreader@lemmy.ml 14 points 5 months ago (2 children)

As far as I know Signal still requires a phone number to register an account. Since a while you can use usernames to connect with others instead of exchanging phone numbers.

[–] jrgd@lemm.ee 5 points 5 months ago

The username release is quite recent for those not participating in beta versions of Signal.

[–] LucidBoi@lemmy.dbzer0.com 3 points 5 months ago

Ohh, I wasn't aware that it was still necessary for registering.

[–] ambitiousslab@lemmy.ml 14 points 5 months ago (1 children)

I've had good fortune converting some family and friends to use XMPP.

People always mention fragmentation, and while there is some truth to it, it can be massively minimised by choosing blessed clients and servers for them to use.

In my case, I run my own server, and thoroughly test the clients (especially the onboarding flow) that I expect them to use, so that any question they have, I can help them out with quickly. Since we're all on identically configured servers, it minimises one whole class of incompatibilities.

There is still unfortunately a bit of a usability gap compared to Signal - particularly on the iOS clients. But they have come a long way and are consistently improving.

[–] jaypatelani@lemmy.ml 5 points 5 months ago

You can host Simplex server and clients

[–] CameronDev@programming.dev 14 points 5 months ago (2 children)

The major one that concerns me is who is behind them. Even if we trust that their encryption is not backdoored, there is a lot of information that can be gathered just from the frequency of messages and who they are between.

If it came out that a three letter agency was running one of these networks, it would not suprise me at all.

https://en.m.wikipedia.org/wiki/Operation_Trojan_Shield

[–] drwho 4 points 5 months ago (2 children)

The only fix for that is for nobody to communicate, ever.

load more comments (2 replies)
[–] possiblylinux127@lemmy.zip 4 points 5 months ago (5 children)

The US military uses Signal for communication

load more comments (5 replies)
[–] eugenia@lemmy.ml 12 points 5 months ago (1 children)

I'm using Matrix/element. I rather not give my phone number, you see, which is must-have for Signal. I have installed the app in my family's phones, and they were accepting, so all is well. I don't need to communicate through private messaging with anybody else, so who cares if others don't use matrix?

[–] Schlemmy@lemmy.ml 7 points 5 months ago (1 children)
[–] eugenia@lemmy.ml 15 points 5 months ago (5 children)

That's my point. The phone number IS STILL required to create an account at Signal!

[–] Schlemmy@lemmy.ml 2 points 5 months ago
load more comments (4 replies)
[–] jsomae@lemmy.ml 6 points 5 months ago* (last edited 5 months ago) (2 children)

Let's not forget that for those looking for alternatives, a key feature of signal is/was its SMS integration.

I use silence, a fork of signal.

  • upside: it can still send and receive SMS messages!
  • downside: nobody else uses it, so it only does SMS as a result.
[–] gibson@sopuli.xyz 8 points 5 months ago

For those who don't remember, not only could signal be used for SMS, it used to be able to do encrypted sms convos.

[–] tcit 6 points 5 months ago

Also it sadly hasn't been maintained for years

[–] 01011@monero.town 3 points 5 months ago* (last edited 5 months ago)

The need to wait for an SMS to register a new account and the potential for recaptcha loop (which I have experienced) is a serious downside to Signal. Something I never need worry about with xmpp, matrix or threema.

load more comments
view more: next ›