You are viewing a single thread.
View all comments View context
16 points

You seem to be highly misinformed what metadata is. A server for example will always have access to unencrypted IP addresses from the clients connecting to it, this is impossible to avoid unless you use a service like Tor that relays internet traffic, but that has very little to do with “encryption”.

permalink
report
parent
reply
2 points

According to signal facts all the have is your phone number and and the date you signed up for the service and the last day you connected to the server. IP address are not logged or stored the do t have access to it and signal has said this everytime the get a warrent for user data. So yes it is possible to have a secure service that doesn’t collect IP addresses but yes the do have some limited data so you are correct.

permalink
report
parent
reply
6 points
*

That is all they claim to store for later retrival*, which is not the same as what they would be able to capture in real-time and hand over to law-enforcement if forced to by a court (and they wouldn’t be able to tell you about it because of a gag-order).

*However this claim is contradicted by the source-code of their server (which they sometimes publish) which seems to store significantly more and of course this is assuming the code is indeed the same as the one they run on their servers, which is unclear.

Edit: and their servers run on AWS, so even if Signal itself doesn’t store the IP addresses, Amazon certainly could.

permalink
report
parent
reply
4 points

Very good and true point well said I agree with you on that good thing I am not important enough for it to be a issue lol or do anything illegal.

permalink
report
parent
reply
1 point

Another thing a server can easily access is the timestamp of messages. Even if that is somehow stored encrypted in the server, messages are sent in real time and the server can easily log those, so an e2e encryption chat service will at the very least have logs with IP and timestamps. This can’t really be avoided.

permalink
report
parent
reply
9 points

And even with Tor, if the person didn’t compartmentalize their conversations into different identities, they’d have the pseudonymous graph.

permalink
report
parent
reply

Privacy

!privacy@lemmy.ml

Create post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

much thanks to @gary_host_laptop for the logo design :)

Community stats

  • 7.1K

    Monthly active users

  • 3.2K

    Posts

  • 86K

    Comments