Conspiracy theory confirmed: Signal "encrypted" messaging platform is actually US intelligence asset
(media.conspiracies.win)
Comments (54)
sorted by:
Signal is centralized and owner of the server is not you. That's all you need to know to not trust it for any sensitive information.
Unfortunately, computer literacy of population is below zero.
People don't know what they don't know.
It's more than that. We are intentionally kept ignorant. Very few of those famous youtube tech bro faggots ever say it point blank. They'll shill that next iPhone pretty hard though.
Yeah but you got doxed or something bro kek.
And that will be only your own fault.
Hm. May be that's why sheeple don't even think about using something decentralized for messaging?
a) Notice that a center (perception) receives signals from circumference (perceivable).
b) Could there be different centers (life) within same circumference (inception towards death)?
c) Can a receiver (perception) differentiate between eminent signal (suggestion) and common signal (perceivable)?
Begs the question whether it's even cryptographically secure against non state actors? https://www.zerohedge.com/geopolitical/tucker-carlson-spotted-moscow-necons-meltdown-over-potential-putin-interview
raises the question
Makes me wonder about
Puts the question through college
there's so many ways to be surveilled electronically... almost all of our chips have backdoors hardwired into the architecture.
unless you communicate by carrier pigeon.. they literally have everything..
up to 600 miles, a carrier pigeon has a better transfer rate
https://www.tomshardware.com/news/yes-a-pigeon-is-still-faster-than-gigabit-fiber-internet
Latency could be a problem though.
(mind blown)
I'm gonna stick to my station wagon full of mag-tapes.
Signal is cryptographically secure - what you're typing is not. Apps/Google/Apple read the keyboard input on your device, whether its sent anywhere, who knows
My computer has a Coreboot bios. No IME.
You always hear this but never see the proof. I'm looking at an 8086 die and see no evidence of backdooring. When did the sneaky stuff start? Probably when they made multilayers, so it can be hidden between layers.
Is there backdoor on a 486?
Tucker is a major person of interest. So is Putin and his key staff. NSA could have keyloggers installed on the devices of any of those people and figured this out without cracking Signal.
That said, I wouldn’t trust any comms system to be secure these days.
The video clip
Session:
https://getsession.org/blog/session-decentralised-network
Matrix /Element
https://matrix.org/ecosystem/clients/
He's a 9/11 denier.
/hes an israeli asset
The great thing about open source software is that if you want to make allegations of spying or tracking by governments, you can also provide a link to the code that allows it to happen. The only way Tucker's Signal messages were hacked is that the US has some pegasus grade 0day on either Tucker's phone, or his contact in Russia (likely the ladder). I'm near 100% certain Signal's E2EE hasn't been broken, it's much more likely the Russian's phone got owned because the US has an interest in knowing who is communicating with Putin. Another scenario is that Russia gave the info to the US. Why would they care if this info leaked out? What would they have to lose?
You raise some interesting points
Signal is going to comply with warrants and anything else they’re legally obligated to provide. Is there evidence that they have access through other routes. Possibly but this doesn’t prove it one way or the other
Signal is end to end encrypted, meaning even with warrants and access to Signal's servers, the government can't see much.
You could argue that the government has a backdoor to whatever encryption algorithm Signal uses, however Signal is open source and if you wanted to you check that for yourself.
I think the most likely explanation is that either Tucker or the other guy's laptop or phone was hacked and the messages were intercepted that way.
A heads-up for anyone new to Linux & open source software:
Open-source doesn't automatically mean trustworthy.
Open-source has the enormous advantage of publicly visible source code but most of the time, that code is:
This is why we see linux development & adoption receiving exponentially less resistance from the PTB.
They are confident they will be able to sneak backdoors into popular open source software.
I'd like to add : Checked pre update, and laziness updates without checking.
Is there a secure, confidential solution? Does one already exist? If not, With proper funding, does the technology already exist to make one?
https://matrix.org - you can run it on your own server
Agree it's probably a back door in the phone itself. But then again Signal was stated by a bunch of folks with ties to the intel community so it's possible it's compromised. If I recall it's still centrally signed, not distributed e2e, so there's a vector.
At the time wire was far superior to signal. I haven't bothered keeping up in a while.
https://github.com/signalapp/Signal-Android/issues/8974
Signal hasn't been privacy recommended for almost a decade.
I'm new to all of this. What would you recommend?
These days, I haven't kept up. It would be a research project. You need an app that doesn't require your phone number, or your credit card. And, they need to stay that way after updates.
Example: TextNow stopped showing codes unless you paid with a credit card linked to a name.
Session
https://getsession.org/blog/session-decentralised-network
I don't think this was a warrant scenario?
I prefer Telegram, not because it is safe, but I don't care if the Russian Secret Service can read my messages, as long it is not our Godfathers.
TG chats are by default NOT E2E and can easily be read by anyone , not just GER/US/RUS agencies.
None of that is actual evidence Signal is compromised.
I'm not saying it is safe, but that is at best circumstantial.
How do you know his office isn't bugged, or his phone?
Or a spy at the other end?
I have no skin in the game.
But I know what is "confirmed" and what isn't.
True. And there are phone OS level root hacks that are trivial to inject onto the phone, incl. uptodate Androids and iOS devices.
Yet, I trust Signal just about as far as I can throw Trump, not very far...