by killjoywashere on 3/26/25, 3:48 PM with 106 comments
By Alex Horton and Missy Ryan
"the conversation that occurred over an unsecure, commercially available messaging platform."
My understanding has been that Signal is actually well out ahead of other platforms in terms of respecting user privacy, so this seems confusing to me. Has Signal failed an audit that I'm unaware of?
by crazygringo on 3/26/25, 4:01 PM
From this perspective, all phones are insecure. Classified government stuff isn't ever supposed to be on commercial smartphones in the first place.
The kind of security Signal provides is sufficient for people who aren't active targets of foreign states.
by xoa on 3/26/25, 4:09 PM
For small vetted group top secret conversations by a sophisticated organization, it makes more sense to have something where inviting anyone who hasn't already been brought into the magic circle with physical interaction is simply impossible. If technically unsophisticated users are important, ideally one would have fully vetted tech support who will be monitoring all participants and doing the verification work for them. All managed via central systems and heavily walled off with multiple layers from crossing between high and low sides. If they want to talk to the general public, they should use physically different devices. Worse scaling, far more friction, but that's OK for top levels of a big organization in the context of extremely sensitive information.
Signal is a tool and a decent one, but no tool is good for absolutely everything and trying to use a hammer as a saw isn't a defect in the hammer it's a problem with the user/organization trying to do something so foolish.
by modriano on 3/26/25, 4:25 PM
Spyware like Pegasus [0] has been able to use zero-click exploits to penetrate target phones and read messages as though they were the phone's owner.
The US has the best SigInt capacity in the world. The leaders of the US government know that phones are not secure against sophisticated adversaries and they know that we have very sophisticated adversaries. It's deeply troubling that so many of our leaders were so comfortable discussing Secret level plans in such a reckless and illegal way, and it's extremely likely that hostile adversaries have fly-on-the-wall level access to extremely sensitive US planning.
by burningion on 3/26/25, 4:05 PM
This is like that, except the government and the type of people on the list are even better targets for their personal devices. The government has strict rules about secrecy and communication for military operations, and strong punishments for not following these protocols, because they can lead to a loss of life.
This is a different sort of "unsecure". The platform itself may be "secure", but the device, being in public where someone could take a picture of military secrets, etc. isn't.
by LinuxBender on 3/26/25, 3:55 PM
by shmatt on 3/26/25, 4:09 PM
There are multiple public price lists for 0days, Crowdfense currently has iOS full Zero Click Full Chain listed as $5m-$7m
And thats a long way to say - thats correct, its insecure. For the price of $7m any adverse of the US (or friendly country, who cares) can read all these government messages (who knows how many more Signal groups exist without the Atlantic editor)
That would be the cheapest way to get US confidential information in the history of spy agencies. The NSA budget is $10B per year
The assumption of anyone should be - everything in my iPhone and Android phone can be read for $7m. The conversations im having in front of my iPhone can be recorded for $7m. Then the only question left is - is the information worth more than that
If the answer is yes, assume your phone is compromised and only talk near it / message using it, information you understand will become public
by nottorp on 3/26/25, 4:16 PM
Not something the average Jane needs to worry about, but people discussing military action should.
Edit: if Jane's phone gets hacked, they're going to swipe her credit cards and send messages to all her whatsapp contacts asking to borrow money urgently and here's a convenient Revolut link*. Not exfiltrate her Signal messages.
* whatsapp thing is for real, the latest scam making the news around where I am.
by input_sh on 3/26/25, 4:01 PM
by kurtoid on 3/26/25, 3:53 PM
by WithinReason on 3/26/25, 4:10 PM
by dymk on 3/26/25, 4:05 PM
by lmeyerov on 3/26/25, 4:35 PM
Audits of a signal deployment, vs signal software at some point in time, aren't just of the app, but also how it is installed, configured, patched, operated, monitored, etc. Likewise, it's the full system, like device, os, network.
This stuff is supposed to run managed, especially at the level of the VP and secdef. Ex: Are they running signal patched from this week or 6 months ago, so a network attacker can leverage a software exploit to work around the crypto. Ex: Was an attacking payload sent through one of the chats while one of the people talking to the VP's + secdef's device was in Russia?
With the unmonitored auto deletion, and on who knows what device/network, external + internal crimes audit trails are being intentionally, recklessly, and illegally deleted. Managed detection and response, and post-crime investigations, are hard when you can't see.
by barotalomey on 3/26/25, 4:00 PM
by nonfamous on 3/26/25, 4:01 PM
by openasocket on 3/26/25, 4:37 PM
by pavel_lishin on 3/26/25, 4:05 PM
by dismalaf on 3/26/25, 4:09 PM
That being said, the Signal non-profit entity is located in the US, so probably subject to the same risks as WhatsApp and Messenger; namely US courts compelling them to share data.
by CSMastermind on 3/26/25, 4:22 PM
by Jyaif on 3/26/25, 4:25 PM
And they could do all that without even knowing it, just by using a compromised toolchain.
Long story short, unless the SW (the app, the OS, the toolchains) and the HW have been audited, you have no idea what's going on.
by derbOac on 3/26/25, 7:06 PM
by bearjaws on 3/26/25, 4:02 PM
by mikequinlan on 3/26/25, 4:17 PM
An obvious attack on Signal is to get one of your people a job working there, or to bribe/blackmail and existing employee, and have them install a backdoor or other exploitable code (maybe a secret weakening of the encryption?).
by QuiEgo on 3/26/25, 7:31 PM
The cryptography of Signal is not the issue.
by nottorp on 3/27/25, 10:44 PM
Why do these oh-so-secure offerings allow any idiot to add you to a group chat without asking you if you approve?
by tmiku on 3/26/25, 4:11 PM
The gist is that there are potential threats that any end-to-end encryption cannot fully protect against. Signal is a good provider of that encryption, but there are other considerations to protect highly confidential data, and Signal often lures non-technical users into disregarding those.
by emorning3 on 3/26/25, 4:29 PM
And I would bet that there used to be people in the govt that could have told you why.
by analog31 on 3/26/25, 4:39 PM
by 1vuio0pswjnm7 on 3/26/25, 9:49 PM
Is Signal engaged in commerce. Is it a free service.
by chrisweekly on 3/26/25, 4:32 PM
by jeffbee on 3/26/25, 4:17 PM
by aorloff on 3/26/25, 4:07 PM
Presumably within Signal, there are plenty of weak points. And certainly Signal's ability to modify their app as they please doesn't fit within the OPSEC guidelines.
The question is: why would one of the most powerful militaries on the planet use a consumer app, regardless of its reputation ?
And the answer is: because the Trump administration is compromised.
by givemeethekeys on 3/26/25, 4:05 PM
What will reporters use moving forward? Facebook messenger? /s
by bananapub on 3/26/25, 4:02 PM
"unsecured" as in "not a secure comms system managed and approved by the NSA", which for the US government is normally considered a bad thing.
for normal people who don't want the NSA to be managing their comms then Signal is approximately the best possible choice, along with not being a fucking idiot while using it.
by Ros23 on 3/27/25, 12:21 AM
2) As for Gov officials - I understand they used Signal on 1) Government issued devices, without a doubt running NSA built OS; 2) preinstalled Signal App, without a doubt audited by NSA line by line; 3) tactical OP information which has very close expiry date.
3) That "journalist", IMO, is guilty of high treason. They must have immediately notified the group about their presence and they must have not publish any of the secrets they accidentally got privy to. And even more, from professional POV, the actions of journalist were deeply non-ethical. I dare say, un-American and definitely not something that any US Citizen can be expected to do.
4) The "deep state" is furious because they can't leak Signal chat messages. IMO, it's a good choice. They (Administration) just need to carefully audit the groups and distribution lists. That was a very bad call.
I personally will _continue_ using Signal, even with more confidence now.