{"id":43221,"date":"2024-05-14T16:14:03","date_gmt":"2024-05-14T20:14:03","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=43221"},"modified":"2024-05-29T10:36:03","modified_gmt":"2024-05-29T14:36:03","slug":"criticism-of-signal","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2024\/05\/14\/criticism-of-signal\/","title":{"rendered":"Criticism of Signal"},"content":{"rendered":"<p><a href=\"https:\/\/www.bugeyedandshameless.com\/p\/chris-rufo-katherine-maher-signal\">Justin Ling<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.bugeyedandshameless.com\/p\/chris-rufo-katherine-maher-signal\">\n<p>Zimmermann was a hacker in the oldest sense of the word. In the preceding years, he had grown freaked out by a proposal, put forward by a still-not-young Joe Biden, to force internet companies to give the U.S. government access to their users&rsquo; communications.<\/p>\n<p>Zimmermann knew it was do-or-die time. Either the internet would be a free and open thing, or it would be subject to American meddling and surveillance.<\/p>\n<p>[&#8230;]<\/p>\n<p>When I first emailed Zimmermann, using an encrypted email client that traces its lineage to PGP, he called me back within an hour: &ldquo;Do you have Signal?&rdquo; We moved our conversation to the encrypted app, also a direct descendant of PGP, quickly thereafter.<\/p>\n<p>[&#8230;]<\/p>\n<p>So imagine my surprise when, this week, I came across a thinly-written essay arguing that Signal had &ldquo;a problem.&rdquo; It had, the essay argued, been compromised by the American intelligence state. Not from the outside, but from the inside.<\/p>\n<\/blockquote>\n<p>I&rsquo;ve always assumed that it is, because it&rsquo;s such an important target and the agencies are good at what they do. I haven&rsquo;t seen any solid evidence (which is what you&rsquo;d expect if the compromising were done well), but there have been scattered reports suggesting that conversations have been intercepted (though perhaps this was through the phone or the recipients). That said, it&rsquo;s probably better than the alternatives, and most of us are not government-level targets. As far as I know, Edward Snowden still recommends it.<\/p>\n\n<p><a href=\"https:\/\/www.theregister.com\/2024\/05\/14\/telegram_ceo_calls_out_rival\/\">Matthew Connatser<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.theregister.com\/2024\/05\/14\/telegram_ceo_calls_out_rival\/\"><p>Telegram CEO Pavel Durov issued a scathing criticism of Signal, alleging the messaging service is not secure and has ties to US intelligence agencies.<\/p><p>There is no evidence Signal is hooked into the US government as described by Durov.<\/p><p>[&#8230;]<\/p><p>&ldquo;The US government spent $3 million to build Signal&rsquo;s encryption, and today the exact same encryption is implemented in WhatsApp, Facebook Messenger, Google Messages and even Skype,&rdquo; the Telegram leader said. &ldquo;It looks almost as if big tech in the US is not allowed to build its own encryption protocols that would be independent of government interference.&rdquo;<\/p><p>The CEO also claims that users&rsquo; Signal messages have popped up in court cases or in the media, and implies that this has happened because the app&rsquo;s encryption isn&rsquo;t completely secure. However, Durov cites &ldquo;important people I&rsquo;ve spoken to&rdquo; and doesn&rsquo;t mention any specific instance of this happening.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/matthew_d_green\/status\/1789691417721282958\">Matthew Green<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=40341716\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/matthew_d_green\/status\/1789691417721282958\">\n<p>First things first, Signal Protocol, the cryptography behind Signal (also used in WhatsApp and several other messengers) is open source and has been intensively reviewed by cryptographers. When it comes to cryptography, this is pretty much the gold standard.<\/p>\n<p>[&#8230;]<\/p>\n<p>One concern with open source code is that even if you review the open code, you don&rsquo;t know that this code was used to build the app you download from the App Store. &ldquo;Reproducible builds&rdquo; let you build the code on your own computer and compare it to the downloaded code.<\/p>\n<p>Signal has these for Android, and it&rsquo;s a relatively simple process. Because Android is friendly to this. For various Apple-specific reasons this is shockingly hard to do on iOS. Mostly because apps are encrypted. (Apple should fix this.)<\/p>\n<p>I want to give Telegram credit because they&rsquo;ve tried to &ldquo;hack&rdquo; a solution for repro builds on iOS. But reading it shows how bad it is: you need a jailbroken (old) iPhone. And at the end you still can&rsquo;t verify the whole app. Some files stay encrypted.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/news.ycombinator.com\/item?id=26032711\">josephg<\/a> (2021):<\/p>\n<blockquote cite=\"https:\/\/news.ycombinator.com\/item?id=26032711\"><p>I spent a few hours trying to get a local build of signal-ios working a few weeks ago, in order to write a PR fix a bug with lost voice messages. The xcode project uses a plethora of device entitlements I&rsquo;m not allowed to have (since I don&rsquo;t have the proper signal signing key). Even after a couple hours of tweaking to get it building and deployed to my device, its currently crashing on startup because it can&rsquo;t access some special signal local device store.<\/p><p>You can certainly get your own build working (without notifications and other features). But personally I found it prohibitively difficult to do so.<\/p><\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/04\/01\/xz-backdoor\/\">xz Backdoor<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/01\/19\/signal-review\/\">Signal Review<\/a><\/li>\n<\/ul>\n\n<p id=\"criticism-of-signal-update-2024-05-15\">Update (2024-05-15): <a href=\"https:\/\/twitter.com\/kaepora\/status\/1789991606059208718\">Nadim Kobeissi<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/kaepora\/status\/1789991606059208718\"><p>Ways through which a complacent Board of Directors can harm Signal:<\/p><ul><li>Approve the roll-out of usernames while still keeping phone numbers mandatory, thereby avoiding the elimination of a core metadata element,<\/li><li>Roadblock the integration of anonymity tech, such as \n@nymproject<\/li><\/ul><p>It is possible to have trust issues towards Signal based on who \n@mer__edith\n appointed towards its board of directors (eg. Katherine Maher), while also agreeing that there is no evidence of &ldquo;undisclosed vulnerabilities&rdquo; in its source code.  Lots of effort to shift the discourse.<\/p><p>When Katherine Maher&rsquo;s appointment to the Signal board gained attention, Signal began pushing a narrative that Elon Musk is conspiring to push people from Signal to Telegram. But Elon hasn&rsquo;t mentioned Telegram once, and this seems like an attempt to divert the narrative.<\/p><\/blockquote>\n<p>I was surprised to see this, but I did some searches and it really doesn&rsquo;t seem like Musk has pushed Telegram at all, or even mentioned Twitter DMs much.<\/p>\n\n<p id=\"criticism-of-signal-update-2024-05-29\">Update (2024-05-29): <a href=\"https:\/\/techcrunch.com\/2024\/05\/24\/signals-meredith-whittaker-on-the-telegram-security-clash-and-the-edge-lords-at-openai\/\">Mike Butcher<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=40473130\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/techcrunch.com\/2024\/05\/24\/signals-meredith-whittaker-on-the-telegram-security-clash-and-the-edge-lords-at-openai\/\">\n<p>I sat down with the president of Signal at VivaTech in Paris to go over the wide range of serious, grown-up issues society is facing, from disinformation, to who controls AI, to the encroaching surveillance state. In the course of our conversation, we delved into Signal&rsquo;s interactions with Elon Musk and Telegram&rsquo;s Pavel Durov[&#8230;] Among other things, Whittaker is concerned about the concentration of power in the five main social media platforms, especially in a year when the world faces a large number of general elections, not least in the U.S., and Europe&rsquo;s reliance on U.S.-based, external tech giants.<\/p>\n<\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Justin Ling: Zimmermann was a hacker in the oldest sense of the word. In the preceding years, he had grown freaked out by a proposal, put forward by a still-not-young Joe Biden, to force internet companies to give the U.S. government access to their users&rsquo; communications. Zimmermann knew it was do-or-die time. Either the internet [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2024-05-14T20:14:06Z","apple_news_api_id":"5b4ef74c-eac6-4ae6-aefe-e728c6421c5f","apple_news_api_modified_at":"2024-05-29T14:36:07Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAg==","apple_news_api_share_url":"https:\/\/apple.news\/AW073TOrGSuau_ucoxkIcXw","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[91,2518,31,2321,26,705,991,355,1672,1677],"class_list":["post-43221","post","type-post","status-publish","format-standard","hentry","category-technology","tag-appstore","tag-entitlements","tag-ios","tag-ios-17","tag-iosapp","tag-nsa","tag-open-source-software","tag-privacy","tag-signal","tag-telegram"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/43221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=43221"}],"version-history":[{"count":4,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/43221\/revisions"}],"predecessor-version":[{"id":43422,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/43221\/revisions\/43422"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=43221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=43221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=43221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}