- cross-posted to:
- [email protected]
blog.cryptographyengineering.com
- cross-posted to:
- [email protected]
Blog post by crypto professor Matthew Green, discussing what Telegram does (I wasn’t familiar with it) and criticizing its cryptography. He says Telegram by default is not end-to-end encrypted. It does have an end-to-end “secret chat” feature, but it’s a nuisance to activate and only works for two-person chats (not groups) where both people are online when the chat starts.
It still isn’t clear to me why Telegram’s founder was arrested. Green expresses some concern over that but doesn’t give any details that weren’t in the headlines.
I think you missed the point there. The value for the NSA is in knowing which phone numbers communicate with other phone numbers which is precisely the metadata that Signal leaks. This allows you to build networks of users who are doing private communication. Next, you can cross reference the phone numbers with the data from Google, Meta, etc. and then if you see that one of them is a person of interest, then you immediately know the other people they talk to who are now also of interest.
The fact that people keep trying to downplay this is truly phenomenal to me. Once again, Signal is an app that uses a central server based in the US, that almost certainly shares data with the government. Anybody who minimally cares about their privacy should be concerned about this.
Signal is not an app that’s private. Period. If you don’t understand this then you don’t understand what the term privacy means.
Even then, you’re jumping to the conclusion that
a) Signal sends this data to the NSA and b) Signal doesn’t protect phone numbers in somr way
Neither of these do I care about enough to keep entertaining this conversation. Goodbye.
Assuming that data that can be leaked is being leaked is the only sensible thing to do if you care about privacy. Clearly this is too difficult a concept for you to wrap your head around.
Thanks for at least being honest that you don’t actually care about privacy. Bye.
Removed by mod
Right, and it’s strange to me that such a fundamental rule is being ignored when it comes to Signal. All of a sudden people start making all kinds of excuses as to why it’s not a problem in this case.
Removed by mod
If the metadata is being leaked then you have to assume it’s being used in an adversarial way. Privacy can’t be trust based. Either the protocol is secure and it guarantees that your metadata is private, or you’re taking it on faith that people operating Signal servers are good actors and will never leak this data to anybody you wouldn’t want them to.
Also worth noting that thanks to US laws, Signal would not even be allowed to say they’re sharing data with the government even if they wanted to.
Removed by mod
As far as I know, nothing in the protocol prevents the server from connecting who is talking to whom. In fact, given that the phone number is how an account is identified, the server effectively has to do this in order to pass messages between people.