If that were the case, the sealed sender stuff would a complete lie, which would seem out of character for Signal.
Of course they know which client connects when to their server and sends messages to them.
Why ? The authentication can be done on the receiving side through cryptography. Why would it be required for the server to also authenticate the sender?
If that were the case, the sealed sender stuff would a complete lie, which would seem out of character for Signal.
It seems like your loyalty to signal isn’t based on any facts or history whatsoever. I go over the untrustworthy history of signal’s founders, but you’ve ignored all those points in your replies so far.
I go over the untrustworthy history of signal’s founders
The OTF also funds the following:
Briar, Tor, Wireguard, Delta Chat, Bind9, CGIProxy, CertBot, K-9 Mail, Tails, NoScript, QubesOS, The Guardian Project
You going to say that Briar is a good alternative despite receiving funding from the CIA just like Signal? How about QubesOS or NoScript. Are they also no longer trustworthy because they’re funded by the OTF?
That honestly does make me question those projects a bit more, and should put some more scrutiny on them. Radio free asia is not looking out for open source, they’re trying to get a jump on coopting projects, because no one else is funding open source.
I go over the untrustworthy history of signal’s founders, but you’ve ignored all those points in your replies so far.
Regarding your radio free asia funding story, Whisper Systems was founded in 2010 according to Wikipedia, while the funding from the open tech fund started in 2013.
There’s a lot of differences between Funding and FOunding. At that point it was already open sourced. It’s really far fetched to think that somehow, the US took control of it at that point.
You even ignore the point that Whisper System temporarily belonged to twitter, also a US company, which would have been a much simpler way for the US to seize control of the project than to go through some fund bla bla bla
Of course, I never said it was founded by radio free asia, just that it got its initial funding from them. The only thing thats up for debate there, is their continued involvement.
But based on them defending signal from critics as recently as a few years ago.
2ndly, open source doesn’t mean too much for centralized services that aren’t self hostable, and especially ones that delay their source code updates until the community wonders why there haven’t been any after a full year.
Whisper Systems was founded in 2010 according to Wikipedia, while the funding from the open tech fund started in 2013.
Interestingly, Singnal actually introduced its cryptographic protocol to the public only in 2013, when they got the funding (see even Wikipedia for that).
The app already had E2EE at that point, this only marks the release of the v2 of their protocol, which is now considered state of the art for asynchronous messaging.
If the only thing they have is an IP address it is much less info than the actual phone number of who sent the message. It can also be very easily prevented by using a VPN or the built-in anti censorship proxy.
they still also know when a specific client with a specific phone number connects to their network
I don’t think so. I didn’t really fully understood how sealed sender worked until now and only trusted Signal to implement it properly. I’m currently reading this which explains how it works and it seems to provide similar guaranties to what I assumed.
The server can only have the IP of the sender. There seem to be some issues, but it’s not as trivial as you seem to think it is. They may also have implemented the mitigations since.
deleted by creator
And how do they identify this client specifically instead of any other client?
deleted by creator
If that were the case, the sealed sender stuff would a complete lie, which would seem out of character for Signal.
Why ? The authentication can be done on the receiving side through cryptography. Why would it be required for the server to also authenticate the sender?
It seems like your loyalty to signal isn’t based on any facts or history whatsoever. I go over the untrustworthy history of signal’s founders, but you’ve ignored all those points in your replies so far.
The OTF also funds the following: Briar, Tor, Wireguard, Delta Chat, Bind9, CGIProxy, CertBot, K-9 Mail, Tails, NoScript, QubesOS, The Guardian Project
You going to say that Briar is a good alternative despite receiving funding from the CIA just like Signal? How about QubesOS or NoScript. Are they also no longer trustworthy because they’re funded by the OTF?
That honestly does make me question those projects a bit more, and should put some more scrutiny on them. Radio free asia is not looking out for open source, they’re trying to get a jump on coopting projects, because no one else is funding open source.
See this comment
Regarding your radio free asia funding story, Whisper Systems was founded in 2010 according to Wikipedia, while the funding from the open tech fund started in 2013. There’s a lot of differences between Funding and FOunding. At that point it was already open sourced. It’s really far fetched to think that somehow, the US took control of it at that point.
You even ignore the point that Whisper System temporarily belonged to twitter, also a US company, which would have been a much simpler way for the US to seize control of the project than to go through some fund bla bla bla
Of course, I never said it was founded by radio free asia, just that it got its initial funding from them. The only thing thats up for debate there, is their continued involvement.
But based on them defending signal from critics as recently as a few years ago.
2ndly, open source doesn’t mean too much for centralized services that aren’t self hostable, and especially ones that delay their source code updates until the community wonders why there haven’t been any after a full year.
In this comment you say founded. I can accept that it’s a typo.
Link?
There are forks that exists such as Session. Open Source is important
https://archive.is/Rz6Qa near the bottom.
The forks also aren’t federated, making them dead in the water imo.
Interestingly, Singnal actually introduced its cryptographic protocol to the public only in 2013, when they got the funding (see even Wikipedia for that).
The app already had E2EE at that point, this only marks the release of the v2 of their protocol, which is now considered state of the art for asynchronous messaging.
deleted by creator
If the only thing they have is an IP address it is much less info than the actual phone number of who sent the message. It can also be very easily prevented by using a VPN or the built-in anti censorship proxy.
deleted by creator
Not to point out the obvious, but if someone uses a burner phone to initially setup their signal account, that is another big layer of privacy
Burner phones which barely exist outside USA.
I don’t think so. I didn’t really fully understood how sealed sender worked until now and only trusted Signal to implement it properly. I’m currently reading this which explains how it works and it seems to provide similar guaranties to what I assumed. The server can only have the IP of the sender. There seem to be some issues, but it’s not as trivial as you seem to think it is. They may also have implemented the mitigations since.