• plinky [he/him]@hexbear.net
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    7 days ago

    What exactly outbound signal message looks like to isp? if it’s a burst to central server with known ip, social metadata is absolutely trivial to extract, if it’s peer2peer (which seems exceedingly unlikely with phones constantly swapping ip), only then you have to do time correlation attacks and likely non-trivial to solve and easy to obfuscate. (p2p meshes also dodge direct inference of social connectivity, but i don’t think signal functions that way)

    Not that they would compromise keyboard-encryption backdoor if it exists over something so trivial, but one shouldn’t just trust something on the say-so

    • Forbo@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      7 days ago

      https://signal.org/blog/sealed-sender/

      The original claim was about phone numbers disclosing social graphs, but now we’re getting into network traffic analysis for a global passive adversary and a compromised device?

      If you’re worried about traffic analysis use a mixnet like Nym. If you don’t trust your device, then get a device you trust.

      • plinky [he/him]@hexbear.net
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        6 days ago

        No, it’s two claims: before signal servers and on your isp provider side sits nsa sniffing device (likelihood 99%), which trivially can reconstruct social graph without specifically designed obfuscations on server side (something like nym, exactly, but for signal servers themselves, with random delays and obfuscatory traffic).

        Second claim is all messages are encrypted doesn’t exclude possibility of keyboard input->app internals middleman backdoor, likelihood of it existing unknown (hi, nsa), with pegasus infection 100% at least.

        Basically, you are fucked with state adversary, and shouldn’t use phone for anything not serving to appear normal, and while signal can provide necessary tools to message each other, you should assume it to be transparent and appearing in some court if things go wrong. (But crucially transparent to very advanced adversary, not bumblefuck from local police, so it’s not a call to rely on messages which are so trivial to intercept with sim card duplication for 1k-5k bucks, and unencrypted for traffic interception)