zlacker

[parent] [thread] 30 comments
1. jwr+(OP)[view] [source] 2020-06-05 08:49:21
What really hurts Signal are two things:

* sub-par user experience: WhatsApp is just nicer and smoother, and people tend to like that

* very few people understand that Signal DOES NOT get your full contact list, while Facebook (through WhatsApp) does

Especially the second point is very relevant with the current situation — you do not necessarily want to expose your entire social graph to Facebook. But so few people understand this, and even fewer grasp that Signal can still work without doing the same thing.

replies(5): >>sekai+d4 >>outado+l4 >>est31+y4 >>Whompi+mj >>cvburg+Fv
2. sekai+d4[view] [source] 2020-06-05 09:40:12
>>jwr+(OP)
Telegram is a great alternative also, offers encrypted chat's also.
replies(2): >>outado+n4 >>partyb+b5
3. outado+l4[view] [source] 2020-06-05 09:41:18
>>jwr+(OP)
Honestly even if the UX is still behind WhatsApp, I have seen it improve continuously since I've started using it. Images (with annotations), videos (with some controls like trimming), gifs, sound recordings, stickers, emojis... it's great and honestly good enough for most imo. Especially compared to WhatsApp which isn't really on the bleeding edge of social features either.
◧◩
4. outado+n4[view] [source] [discussion] 2020-06-05 09:41:35
>>sekai+d4
Not encrypted by default afaik.
replies(2): >>partyb+W4 >>theshr+ld3
5. est31+y4[view] [source] 2020-06-05 09:44:03
>>jwr+(OP)
> Signal DOES NOT get your full contact list

The full contact list is uploaded to Signal servers by the phones. The only protection layer that users have is the questionable security of Intel's SGX.

It's still much better than what WhatsApp is doing, just not a black and white situation.

To add a point to your list: Signal does not have automatic cloud backup of messages, unlike WhatsApp. On WhatsApp, 30% of users have cloud backups enabled [1], meaning that you can basically assume that any reasonably sized group's messages can be accessed by people who have subpoena-power over Google (chance that there is no backup-enabled account in a group of n people is (1-0.3)^n... for 6 people it's already 12%).

[1]: https://telegra.ph/whatsapp-backdoor-01-16

replies(2): >>acdha+S7 >>jwr+X8
◧◩◪
6. partyb+W4[view] [source] [discussion] 2020-06-05 09:46:41
>>outado+n4
Yeah you have to manually start an encrypted chat. I always thought that increased the sense of security since you have the lock symbol and all but apparently people prefer encryption by default.
◧◩
7. partyb+b5[view] [source] [discussion] 2020-06-05 09:48:43
>>sekai+d4
imo it has the best UX of any chat app right now. It's like a souped up WhatsApp. Faster too.
◧◩
8. acdha+S7[view] [source] [discussion] 2020-06-05 10:12:42
>>est31+y4
Do you have a reference for the claim that your full contact list is uploaded to servers? That seems important since their privacy policy says that they only use hashes, and it can’t be dependent on SGX since it runs on non-Intel hardware:

https://signal.org/legal/#privacy-policy

replies(2): >>est31+2a >>thu211+zb
◧◩
9. jwr+X8[view] [source] [discussion] 2020-06-05 10:21:00
>>est31+y4
Not the full contact list, just hashes.

That was exactly my point: few people know about this.

replies(2): >>est31+P9 >>CultOf+Eu6
◧◩◪
10. est31+P9[view] [source] [discussion] 2020-06-05 10:28:38
>>jwr+X8
A hash of the phone number is as good as the phone number itself. Given a list of all phone numbers in use, it's trivial to build a rainbow table for them. And many you can also brute-force.
◧◩◪
11. est31+2a[view] [source] [discussion] 2020-06-05 10:31:18
>>acdha+S7
The method is explained here: https://signal.org/blog/private-contact-discovery/

Yes, it's hashes of phone numbers instead of the phone numbers themselves, but that's a detail. Phone numbers are easy to brute-force especially for people the protesters are worried about, as well as easy to build rainbow tables for.

replies(3): >>acdha+Ca >>jwr+fg >>BCM43+GZ
◧◩◪◨
12. acdha+Ca[view] [source] [discussion] 2020-06-05 10:36:41
>>est31+2a
I think you might want a better way of phrasing that: it’s not the “full contact list” - most people would assume that includes names and all of the other metadata - and since it’s rate-limited there’s an interesting trade off where it’s not easy to brute-force but it is targetable if you are trying to track specific known people.
replies(1): >>est31+Sb
◧◩◪
13. thu211+zb[view] [source] [discussion] 2020-06-05 10:45:56
>>acdha+S7
SGX is for the servers not the clients. Their enclave is open source so you can theoretically audit it using RA.

I say theoretically because these schemes all have a core problem when they're not federated - you have no idea what your client is really doing and it's the client performing remote attestation with the enclave. You have no control over it. It could update tomorrow and switch every last bit of encryption off. Or it could do RA but not pin the enclave hash to anything audited (i.e. it accepts any enclave signed by Signal).

It's not a theoretical problem. Facebook say that WhatsApp is end to end encrypted, in the same way as Signal. That didn't stop them blocking people from forwarding links related to coronavirus. The literal and entire point of E2E cryptography is to stop them monitoring and interfering with people's communications, Facebook have been assuring governments for years they're powerless to do that, but of course the moment Facebook wanted to fight "misinformation" it all went out the window.

Fundamentally Signal and WhatsApp can never provide meaningful encryption or privacy. They don't allow alternative clients, so regardless of how much code they throw into the mix they control the entire pipe end to end and can just as easily switch it off again. And the moment their employees feel they have a sufficiently good motivation, it'll happen again.

replies(1): >>im3w1l+3J
◧◩◪◨⬒
14. est31+Sb[view] [source] [discussion] 2020-06-05 10:50:52
>>acdha+Ca
The name, profile pic, etc. is less relevant than the social graph itself. State actors already have phone number <-> name mappings at least about their own residents. If you are just curious about who's visa applications to deny because according to data collected by your IMSI-catcher many of their contacts have participated in an anti-government protest, then the name etc. isn't really relevant.
replies(1): >>acdha+sl
◧◩◪◨
15. jwr+fg[view] [source] [discussion] 2020-06-05 11:41:42
>>est31+2a
I would disagree with the "that's a detail" statement. Properly salted hashes make building a social network graph much more difficult. It's only relatively easy to brute-force a single number.
replies(1): >>georgy+gh
◧◩◪◨⬒
16. georgy+gh[view] [source] [discussion] 2020-06-05 11:54:42
>>jwr+fg
I don’t think they are salted. When someone joins signal they are compared to your hashes. That is how you get notified that one of your contacts have joined signal.

If they were all individually salted, there would be no way to compare against new joiners.

17. Whompi+mj[view] [source] 2020-06-05 12:13:27
>>jwr+(OP)
I don't think Signal is "really hurt" by WhatsApp being slightly smoother and nicer. Signal caters to those who put a premium on privacy, they are ready and willing to have a slightly less "nice and smooth" UX.

Why does it "really hurt" Signal that are sub-group of the population is ignorant of its features? I doubt that's going to stop people from downloading a privacy app, most people don't care about privacy anyway, and if they do, they will DL signal.

replies(1): >>dastx+Cn
◧◩◪◨⬒⬓
18. acdha+sl[view] [source] [discussion] 2020-06-05 12:28:31
>>est31+Sb
Yes, I know. My point was that a better term might help you make your point without sounding like you’re claiming something different.
◧◩
19. dastx+Cn[view] [source] [discussion] 2020-06-05 12:47:21
>>Whompi+mj
> I don't think Signal is "really hurt" by WhatsApp being slightly smoother and nicer. Signal caters to those who put a premium on privacy, they are ready and willing to have a slightly less "nice and smooth" UX.

Having a slightly worse UX because that's just security considerations is one thing.

Having a slightly worse UX because reason that isn't related to security is another.

I've tried getting my wife onto signal, and while she's happy to try it out because I ask her to, she struggles to stay on it due to by day to day UX. I'm happy to deal with the issues, the general is not. And because they're not, I'm stuck with WhatsApp too.

If signal wants to have a shot at taking over WhatsApp and help with addressing the core issue at hand, specifically encryption between users, they need to address the UX. Sure if you can't address certain things because it weakens security fine, but if you're not addressing them because they think users won't mind because they're here for something else (i.e. security), it's gonna be a much harder sell, and it'll just stay a niche market.

20. cvburg+Fv[view] [source] 2020-06-05 13:38:07
>>jwr+(OP)
> WhatsApp is just nicer and smoother, and people tend to like that

Ive used both for a while and WhatsApp is aweful, at least on iOS by all standards I can find. Signal feels like iMessage with reactions, voice recordings, and handy tools. WhatsApp feels dated, clunky, and for groups it gets very very messy fast with out reactions.

replies(1): >>m12k+ef1
◧◩◪◨
21. im3w1l+3J[view] [source] [discussion] 2020-06-05 14:49:16
>>thu211+zb
> That didn't stop [facebook] blocking people from forwarding links related to coronavirus.

Source?

replies(1): >>thu211+OT
◧◩◪◨⬒
22. thu211+OT[view] [source] [discussion] 2020-06-05 15:45:07
>>im3w1l+3J
https://duckduckgo.com/?q=facebook+whatsapp+covid+forwarding...

Pick any version of the story. Or read their blog post:

https://blog.whatsapp.com/Keeping-WhatsApp-Personal-and-Priv...

How do they know a message is forwarded? The encryption is meant to make identical plaintexts encrypt to different ciphertexts, so obviously they must be leaking the forwarding status in unencrypted parts of the message. And why is an encrypted service trying to combat misinformation to start with - isn't that a contradiction in terms? These things raise difficult questions. You'd hope that once a service decides to go fully encrypted, its staff would believe that what kind of information going over it or how accurate that is, isn't any longer their concern.

replies(2): >>im3w1l+1P1 >>CultOf+6u6
◧◩◪◨
23. BCM43+GZ[view] [source] [discussion] 2020-06-05 16:17:05
>>est31+2a
It's truncated hashes, not full hashes. So you don't see exactly which phone number it is, you get a bucket and the client checks if the full hash is in the bucket. Which is far from perfect, but it's a little better than the full hash.
◧◩
24. m12k+ef1[view] [source] [discussion] 2020-06-05 17:27:49
>>cvburg+Fv
IMO Telegram has the nicest ux of them all, but Signal is finally good enough
◧◩◪◨⬒⬓
25. im3w1l+1P1[view] [source] [discussion] 2020-06-05 20:11:52
>>thu211+OT
I see. Given this clarification, I would argue that your original claim was misleading.
replies(1): >>thu211+r53
◧◩◪◨⬒⬓⬔
26. thu211+r53[view] [source] [discussion] 2020-06-06 10:48:43
>>im3w1l+1P1
OK. Where is the argument then? You've asserted, but not argued.

Today, Signal is claiming their encryption means the only data they have to give to government is date of install and last use. In the past they also claimed WhatsApp uses the same cryptography as them, at least for messages. These two claims cannot both be true. If there's some incredibly subtle detail that means deliberately exposing forwarding metadata in WhatsApp but not Signal they should really clarify that because it's not something I've ever seen a discussion of, and it doesn't follow from the cryptography they're using.

replies(1): >>CultOf+ou6
◧◩◪
27. theshr+ld3[view] [source] [discussion] 2020-06-06 12:36:02
>>outado+n4
They're all encrypted, but only specifically created Secret Chats are end-to-end encrypted.
replies(1): >>CultOf+ov6
◧◩◪◨⬒⬓
28. CultOf+6u6[view] [source] [discussion] 2020-06-07 22:07:21
>>thu211+OT
There’s a counter added to the encrypted portion of metadata of the message. The receiving client increments the counter by +1 if it forwards it. At some point, some client receives a message that has the maximum amount of forwards and thus the option to forward it won’t be shown by that client. This is handled in-app. An old or modified client won’t do anything with it, you can try it. It’s not a server-side thing but embedded in the E2EE’d data.
◧◩◪◨⬒⬓⬔⧯
29. CultOf+ou6[view] [source] [discussion] 2020-06-07 22:09:20
>>thu211+r53
They can both be true. Signal Protocol for message encryption is something different than Signal the official Signal Protocol client. ;) That’s where the difference lies and why the statement can be true: WhatsApp uses Signal Protocol for its encryption, but WhatsApp isn’t Signal.
◧◩◪
30. CultOf+Eu6[view] [source] [discussion] 2020-06-07 22:11:39
>>jwr+X8
Actually Signal is uploading contacts with their first and lastname to the cloud now. Or is planning to do so. Read their blog about that f-ing PIN feature. Its explained there. I hope they don’t go through with it, I absolutely do not wish to use some cloud; not even Signal’s. My data should be 100% local. And that they’re gonna push this without a back-up feature for iOS feels a bit like them raising their middle finger to us.
◧◩◪◨
31. CultOf+ov6[view] [source] [discussion] 2020-06-07 22:15:43
>>theshr+ld3
Encrypted in transit... But stored plain-text accessible in Telegram’s cloud. They store all your metadata, full contact list, all conversations, all media and attachments, etc. If you value your privacy, Telegram is the absolute worst and one of the most dangerous messengers out there. Telegram should never be recommended as a secure alternative. It’s insecure right to their core. Heck, even their secret chat crypto is a joke. Telegram should be avoided at all costs for private and/or sensitive communication. Even WhatsApp is wayyy more secure.
[go to top]