• @Bogasse@lemmy.ml
    link
    fedilink
    English
    31
    edit-2
    10 days ago

    On Signal you can verify user identify, and you should absolutely do it if were to discuss national security maters.

    This is not a hidden feature, I think it’s designed to prevent man in the middle attack. It also work against the “oops I accidentally added a journalist to my conversation no one should know of”, which is so dumb that no one saw this coming 😅

    • @Squizzy@lemmy.world
      link
      fedilink
      English
      89 days ago

      Dont use consumer apps for national security matters.

      There was a vulnerability identified in Signal last year that caused the British to discontinue its use. I dont trust the british government but I am wary of what they are wary of.

      • @sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        159 days ago

        vulnerability

        My understanding is this has less to do with Signal than phones themselves. Signal messages are decrypted and stored on the phone itself, so a successful attack on the phone would allow access to the messages.

        This is completely fine for personal use since the average person isn’t going to be a target, but for classified information, that’s unacceptable. This isn’t unique to any messenger, any app that stores data on the phone is open to it.

        • @Squizzy@lemmy.world
          link
          fedilink
          English
          29 days ago

          Yeah I was wondering what it could be myself, the notification text access was a thought. I didnt realise they were unencrypted on the phone. If I go to save a picture from a chat I am prompted with the this is going outside the sandbox dialogue.

          • @sugar_in_your_tea@sh.itjust.works
            link
            fedilink
            English
            39 days ago

            They do seem to have experimental support for local encryption, but I don’t think it’s quite the win people will assume it is, since an attacker could conceivably pull the key from memory when you access Signal. A regular user isn’t likely to be targeted by an attack that would retrieve the encrypted messages, and a state-level attacker can work around the encryption.

            It’s a hard problem to solve, and the best answer is to make sure you use hardened devices and ideally not discuss sensitive information on a handheld device in the first place.

      • @Bogasse@lemmy.ml
        link
        fedilink
        English
        29 days ago

        At least it was Americans talking on an american platform. I wouldn’t be surprised if we had french Europeans leaders having occasionally this kind of discussions on Microsoft Teams or some Google chat.

        • @Squizzy@lemmy.world
          link
          fedilink
          English
          19 days ago

          There was a case recently, related to Ukraine, of a general taking part in a secure video call on his hotel network and it being compromised.