this post was submitted on 07 Oct 2022
25 points (100.0% liked)

Technology

34449 readers
473 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
 

Users of the Signal messaging app got hit by a hacker attack. We analyze what happened and why the attack demonstrates that Signal is reliable.

you are viewing a single comment's thread
view the rest of the comments
[–] linzilla@lemmy.ml 23 points 2 years ago* (last edited 2 years ago) (7 children)

Last October, Signal introduced closed-source server side code that cannot be audited. Not to mention Signal is running on Amazon servers. This year in January, the CEO stepped down from the company he founded. I believe it sends a very strong signal that Signal is not what it is portraying itself...

[–] jonesv@lemmy.ml 4 points 2 years ago (1 children)

What's that closed-source server side? What does it do? Source?

[–] Sandra@idiomdrottning.org 3 points 2 years ago (1 children)

Here is their own marketing explanation. I remember this, because coincidentally, this was one the first times I heard of Signal. Not a good first impression 💁🏻‍♀️

[–] jonesv@lemmy.ml 2 points 2 years ago (1 children)

The whole point of end-to-end encryption is that you don't have to trust their server: it cannot read your messages. Then for metadata, the question is about what metadata they are receiving at all (if they don't receive it, then you don't care if the server is proprietary) and what they do with it (e.g. for the private contact discovery, the idea is that you can verify that the code receiving your contact list is doing what it should (it's open source), and you can verify that this code is the one running in the secure enclave.

You don't need the whole server to be open source: only the important parts.

[–] Sandra@idiomdrottning.org 3 points 2 years ago

For the purposes of security and encryption, you're right, and that's not why it looked bad.

For someone coming from open protocols like email, XMPP, atom, and Fedi, it was not a good first impression to see their system grown ever more owned-by-them.

load more comments (5 replies)