this post was submitted on 08 Nov 2021
4 points (56.2% liked)

Privacy

33617 readers
840 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 3 years ago* (last edited 3 years ago) (2 children)

They're hiding the function (rules) that will trigger a captcha response in the client if they get enough reports that it's a spammer, after which the client will be unable to continue to send messages until the captcha is solved. That's it. The reason you can't check how they're doing it is because the spammers would just read it as instructions on how to avoid getting caught.

Communication/messaging, everything, is still E2EE. Nobody is getting anything out of this. If the FBI asks them to get user data, they will be unable to share anything with them. They don't need to warn users because they don't keep any data anyways - as can be seen by the multiple subpoenas they've fought to make public and continue to not provide any useful info.

[–] [email protected] 1 points 3 years ago (1 children)

unable to share anything with them

Except phone numbers, dates / times, contacts... pretty much everything except message content.

[–] [email protected] 0 points 3 years ago (1 children)

This is incorrect.

They store:

  • Your number
  • The date you first registered.
  • Last day (not time) a client last pinged their servers.

Signal's access to your contacts lets the client (not them):

determine whether the contacts in their address book are Signal users without revealing the contacts in their address book to the Signal service [0].

They've been developing/improving contact discovery since at least 2014 [1], I'd wager they know a thing or two about how to do it in a secure and scalable way. If you disagree or have evidence that proves otherwise, I'd love to be enlightened. The code is open [2], anyone is free to test it and publish their findings.

[0] https://signal.org/blog/private-contact-discovery/

[1] https://signal.org/blog/contact-discovery/

[2] https://github.com/signalapp/ContactDiscoveryService/