infosec.space is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for info/cyber security-minded people. This instance blocks threads.net

Administered by:

Server stats:

50
active users

Public

Signal is open source, so our code is regularly scrutinized in addition to regular formal audits. We also constantly monitor security@signal.org for any new reports, and we act on them with quickness while also working to protect the people who rely on us from outside threats like phishing with warnings and safeguards.

This is why Signal remains the gold standard for private, secure communications. 5/

Public

@signalapp I disagree because your platform is , , and doesn't allow for , of all the Keys and you demand in the form of a which can be used.to track users down!

Quiet public

@kkarhan Signal is literally open-source, meaning its source code is public, not proprietary: github.com/signalapp. Signal does not hold any user's secret keys.

GitHubSignalSignal has 119 repositories available. Follow their code on GitHub.
Public

@pixelcode neither are there reproduceable builds nor is 's opensoirce'd nor is it possible to .

Quiet public

@kkarhan @taylan You could have simply clicked on the link to find out that Signal have published the source code of all their apps and of their server, instead of making false claims out of thin air.

There's literally an entire manual on reproducing builds: github.com/signalapp/Signal-An

Also, nothing and no one stops you from self-hosting the Signal server.

GitHubSignal-Android/reproducible-builds/README.md at main · signalapp/Signal-AndroidA private messenger for Android. Contribute to signalapp/Signal-Android development by creating an account on GitHub.
Quiet public

@kkarhan @taylan @signalapp

I did not claim Signal isn't centralised. I did not claim it's possible to verify which software runs on a foreign server.

Unlike you, I substantiated my statements by citing a source – namely a link pointing to Signal's collection of Git repos which contain the source code of their client & server software and a manual explaining how to reproduce Signal's builds, which you continue to ignore.

The one making claims without stating any sources at all are you.

@pixelcode @taylan @signalapp the , espechally without means to hide it's traffic via @torproject / makes it trivial to detect and track @signalapp / users.

  • Add to that the fact that Signal has = on them and the fact they are incorporated in the , thus subject to and it's not a matter if they snitch on users but how many thousands if not millions got subopena'd to this day.

And with no self-custody of keys it's trivial to the users if the devs get "motivated" under threat of spending the rest of theor lives in jail.

Public

@kkarhan @pixelcode

thus subject to Cloud Act

They literally don't store anything about you, other than the phone number you used to sign up, and the timestamp of the last login. They can't fulfill any kind of subpoena, because they simply don't have the data. This was proven in court:
signal.org/bigbrother/cd-calif

I don't know what your mission is, any why you're constantly spreading misinformation about a secure communications platform, trying to discourage people from using it, without naming alternatives.
It's pretty suspicious at the very least.

Signal MessengerGrand jury subpoena for Signal user data, Central District of California (again!)Signal still knows nothing about you, but inexplicably the government continues to ask.
Public

@Andromxda @pixelcode How can you claim something you can't evidence [infosec.exchange]?

It makes you look like one of those folks shilling [www.youtube.com] |s that ain't logless after all [web.archive.org]...

  • I don't believe in and can't (and won't) be able to evidence that they don't log shit.

At least they should be honest about things and not claim bs, cuz demanding a is just with extra steps like demanding any or other . Makes them look like chinese MMORPGs that demand ID card numbers for account signups, thus the ability to use their service anonymously...

Infosec ExchangeAndromxda 🇺🇦🇵🇸🇹🇼 (@Andromxda@infosec.exchange)@kkarhan@infosec.space @pixelcode@social.tchncs.de > thus subject to Cloud Act They literally don't store anything about you, other than the phone number you used to sign up, and the timestamp of the last login. They can't fulfill any kind of subpoena, because they simply don't have the data. This was proven in court: https://signal.org/bigbrother/cd-california-grand-jury/ I don't know what your mission is, any why you're constantly spreading misinformation about a secure communications platform, trying to discourage people from using it, without naming alternatives. It's pretty suspicious at the very least.
Public

@kkarhan

How can you claim something you can't evidence?

I literally included a link to the evidence. Here's the link again: signal.org/bigbrother/cd-calif
Signal got a judicial subpoena from the Central District of California. They were represented by the ACLU, and they responded with the only bits of data they had: the Unix timestamp of account creation, and the timestamp of the last connection.

It seems like you are simply ignoring the evidence (on purpose).

demanding a PhoneNumber

All big messenger apps collect phone numbers, in order to prevent spam. Unlike WhatsApp or iMessage though (I mean technically you can find iMessage contacts by Email address, but no one does that), you don't have to share your phone number with contacts, in order for them to be able to message you. User names exist for this exact purpose: signal.org/blog/phone-number-p

Signal MessengerGrand jury subpoena for Signal user data, Central District of California (again!)Signal still knows nothing about you, but inexplicably the government continues to ask.
Quiet public

@kkarhan @taylan

For every messenger there's the risk of someone finding out that you use that messenger (for example when you download the app without a proxy or when you rent a server for self-hosting). So what?

Nothing and no one stops you from voluntarily using Tor to connect to Signal (Orbot, InviZible, Advanced Privacy etc.). For those oppressed by authoritarian regimes, Signal offers easy-to-use censorship-circumvention proxy support built into the app.

support.signal.org/hc/en-us/ar

Quiet public

@kkarhan @taylan

Neither knowing your phone number nor the Cloud Act nor both in combination gives Signal the magical ability to “snoop” on your end-to-end encrypted chats or to circumvent Sealed Sender, if that's what you're trying to express with your PII argument. signal.org/blog/sealed-sender/

Long-term secret keys and session keys are generated and stored on the end-user's device and are never sent to the server. It's called end-to-end encryption for a reason. Wiretapping doesn't change that.

Signal MessengerTechnology preview: Sealed sender for SignalIn addition to the end-to-end encryption that protects every Signal message, the Signal service is designed to minimize the data that is retained about Signal users. By design, it does not store a record of your contacts, social graph, conversation list, location, user avatar, user profile name, ...
Public

@pixelcode @taylan Your nonchalant "So what?" [social.tchncs.de] gets people publicly murdered by the state in many juristictions...

  • Which is why there is no substitute to teaching proper ffs!

If things were so easy as in "JuSt UsE sIgNaL!" then @signalapp would be shut down.

If you do think so then you should really get some professional help, cuz you seem rather lost...

  • doesn't even bother to have an , much less to provide means to use their service without self-doxxing with a , which at best is pseudonymous and requires money to attain and maintain...

It's is an absolute nightmare and mist be deemed as criminally neglectful!

MastodonPixelcode 🇺🇦 (@pixelcode@social.tchncs.de)@kkarhan@infosec.space @taylan@feministwiki.org For every messenger there's the risk of someone finding out that you use that messenger (for example when you download the app without a proxy or when you rent a server for self-hosting). So what? Nothing and no one stops you from voluntarily using Tor to connect to Signal (Orbot, InviZible, Advanced Privacy etc.). For those oppressed by authoritarian regimes, Signal offers easy-to-use censorship-circumvention proxy support built into the app. https://support.signal.org/hc/en-us/articles/360056052052-Proxy-Support
Quiet public

@kkarhan

Who was murdered by the state only because they used a specific messaging app? Please provide a source.

Who says Signal would be shut down? Again, you just make up claims.

The fact that you use Signal is not confidential, and someone finding out that you do is not “doxxing”.

Tech literacy ≠ fabricating conspiracy theories

Public

@pixelcode I'm not gonna violate confidentiality just to win an argument on the internet.

  • I have helped people with a literal DoA bounty on their head escape a literal warzone and enshure their comms are clean and secure.

Mark my words: is a sting op and the day they get caught snitchin' you can apologize to me in person.