logoalt Hacker News

ddtayloryesterday at 5:56 PM8 repliesview on HN

I don't know signal very well but when I have spoken to others about it they mention that the phone number is the only metadata they will have access to.

This seems like a good example of that being enough metadata to be a big problem.


Replies

causalscienceyesterday at 8:12 PM

I've been hearing for years people say "Signal requires phone number therefore I don't use it", and I've been hearing them mocked for years.

Turns out they were right.

show 6 replies
charliebwritesyesterday at 8:15 PM

The steps to trouble:

- identify who owns the number

- compel that person to give unlocked phone

- government can read messages of _all_ people in group chat not just that person

Corollary:

Disappearing messages severely limits what can be read

show 4 replies
tptacekyesterday at 8:02 PM

Presumably this is data taken from interdicted phones of people in the groups, not, like, a traffic-analytic attack on Signal itself.

show 2 replies
spankaleeyesterday at 5:58 PM

I don't think it's much of a problem at all. Many of the protesters and observers are not hiding their identities, so finding their phone number isn't a problem. Even with content, coordinating legal activities isn't a problem either.

show 5 replies
UncleOxidantyesterday at 8:29 PM

Was starting to think about setting up a neighborhood Signal group, but now thinking that maybe something like Briar might be safer... only problem is that Briar only works on Android which is going to exclude a lot of iPhone users.

show 3 replies
tehjokertoday at 1:01 AM

I highly recommend this book. It goes into who funds these things.

https://www.amazon.com/Surveillance-Valley-Military-History-...

suriya-ganeshyesterday at 8:12 PM

but this is not a technical attack that returns the metadata.

much more closer to the $5 wrench attack

https://xkcd.com/538/