Users of the Signal messaging app got hit by a hacker attack. We analyze what happened and why the attack demonstrates that Signal is reliable.

You are viewing a single thread.
View all comments
1 point

so… a bunch of twilio employees had (and still have) exactly the capability that the attackers gained with this phishing attack. As do employees of Signal, Amazon, and various telecom companies, not to mention governments.

“Secure messenger” and “requires a telephone number” are not compatible concepts.

permalink
report
reply
-3 points
*
Removed by mod
permalink
report
parent
reply
0 points
*

Signal’s “sealed sender” metadata protection is a farce.

Their use of phone number identifiers is a gift to police and other violent adversaries around the world, including those that amazon doesn’t cooperate with. When one person’s phone gets seized or otherwise compromised, that adversary gets a list of the phone numbers - aka strong selectors in intelligence lingo - of all of the victim’s contacts.

Signal’s initial growth was funded with millions of USD from the US government, ostensibly for use by dissidents in places like China and Iran. The former requires ID to obtain a phone number, and the latter requires fingerprints. Even people who support the US’s soft power efforts to aid dissidents in those countries should be disturbed by the promotion of the use of phone numbers for “secure communication” in those contexts.

permalink
report
parent
reply
-3 points
*
Removed by mod
permalink
report
parent
reply

Security

!security@lemmy.ml

Create post

Confidentiality Integrity Availability

Community stats

  • 55

    Monthly active users

  • 199

    Posts

  • 340

    Comments

Community moderators