hhmx.de

· Föderation EN Di 08.04.2025 20:31:42

@Linux @delta Any significance of this is negated because Signal has very little data about users.

signal.org/bigbrother/

The cops have to provide a phone number, and in all cases Signal can only say "yes, this number was registered". They don't know the identity of the number owner, who they talk to, what they've said, where they're located etc. unlike WhatsApp, Telegram, Facebook Messenger etc.

Föderation · Di 08.04.2025 20:38:20

@Avitus@ioc.exchange @delta@chaos.social In the United States, you're responsible and potentially liable for content that transmit over your services. That is how the government in the past were able to shut down sites and services that eventually were overrun with illegal content, for example. Additionally, in the United States, you can receive a court order, ordering you not to reveal the government's involvement with your products or services. Also, how previous people who have used such products or services, still faced justice.

Now, none of this should worry you if you're not breaking the law. However, laws change, and unfortunately, so does freedom of speech. We have a government regime who is picking people off the streets and sending them to jails in other countries. That same government regime is threatening our allies, such as Canada and Greenland.

What you're saying and doing, right now, may be perfectly legal, right now. I am more concerned with the possible unknown tomorrows.

Föderation EN Di 08.04.2025 20:49:27

@Avitus @Linux sure signal is so far the best central messenger when it comes to handling privacy on potentially hostile infrastructure. However any seized phone can reveal phone numbers of group members. Collecting IP addresses are another attack vector. Cloudflare which serves encrypted blob files may be able to identify IP addresses of all signal group members who download an encrypted file. It's not data that the signal organization itself has access to but certainly an attack vector.