i’ve just seen a comment in a post, in this very community, saying people trust signal because of missinformation (from what i could undertand).

if this is true, then i have a few questions:

-what menssaging app should i use for secure communications? i need an app that balances simplicity and security.

-how to explain it to my friends who use signal because i recomended?

-what this means for other apps in general?

  • kn33@lemmy.world
    link
    fedilink
    English
    arrow-up
    103
    ·
    1 day ago

    Given what you’ve said, Signal is still what you want and is good for it.

    There are two main issues people have with Signal:

    First is that it requires a phone number to sign up. That makes some people who want it to be truly anonymous unhappy. It’s not meant to be anonymous, though. It’s meant to be private. Those aren’t the same thing.

    Second is that it runs on AWS. This isn’t a problem in the sense that it’s possible for it to still retain privacy while running on AWS. Some people don’t like it because they view the dependence on the infrastructure of an American company to be a risk to availability. They also believe that it would exacerbate a security flaw if one were found.

    Personally, I know these risks and still find it to be the best balance between privacy, security, and ease of use.

    • Heyla@quokk.au
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 hours ago

      And what about suspicion of intrusions in some accounts of european imlrtznts poeple by the FSB recently ?

      I don’t know if it’s a social ingeneering

      But now, i think “good enough” attitude is not the good idéal, we are not in 2000’ it’s finish…

      Another app exists :

      Session

      simpleX

      Anonymous messenger

      Briar

      Twinme

      But it’ always better to use a verified and audited app, need to have a safe team

      https://fr.euronews.com/2026/03/12/des-pirates-informatiques-lies-a-la-russie-ciblent-les-applications-de-messagerie-de-respo

    • wildbus8979@sh.itjust.works
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      22 hours ago

      Second is that it runs on AWS. This isn’t a problem in the sense that it’s possible for it to still retain privacy while running on AWS. Some people don’t like it because they view the dependence on the infrastructure of an American company to be a risk to availability. They also believe that it would exacerbate a security flaw if one were found.

      Let’s not pretend the hypervisor doesn’t have full access to the VMs memory and execution. The only thing protecting the Signal server is Intel SGX.

        • wildbus8979@sh.itjust.works
          link
          fedilink
          arrow-up
          9
          ·
          19 hours ago

          I’m not claiming the contents of the messages are at risk here. You’re social graph and metadata though is another story.

            • wildbus8979@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              edit-2
              8 hours ago

              The thing if someone has memory access Signal doesn’t need to store anything, transiting data is now available. For example all of your contacts when doing contact discovery. It used to be a simple hash, something for which you could build a rainbow table in a few hours, at the worst. It’s lightly better now, but still.

              Don’t take it from me, take it from Moxie:

              https://signal.org/blog/private-contact-discovery/

              It also doesn’t really matter if the software itself can easily be tampered with in memory by the hypervisor. Like I said, they are putting a lot of trust in Intel SGX.

              And let’s not even get into the digital sovereignty issues, and financing of right wing billionaires. Yes, running on AWS is an issue. It’s multiple issues even.

              • pkjqpg1h@lemmy.zip
                link
                fedilink
                English
                arrow-up
                3
                ·
                8 hours ago

                https://signal.org/blog/private-contact-discovery/

                Since the enclave attests to the software that’s running remotely, and since the remote server and OS have no visibility into the enclave, the service learns nothing about the contents of the client request. It’s almost as if the client is executing the query locally on the client device.

                • wildbus8979@sh.itjust.works
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  edit-2
                  8 hours ago

                  … Providing you trust Intel SGX (and AWS for giving them access to actual SGX and not just emulating a compromised instruction set)

                  • pkjqpg1h@lemmy.zip
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    7 hours ago

                    Providing you trust Intel SGX (and AWS for giving them access to actual SGX and not just emulating a compromised instruction set)

                    😃

                    conspiracy begins…

              • Count042@lemmy.ml
                link
                fedilink
                English
                arrow-up
                2
                ·
                edit-2
                2 hours ago

                I don’t take anything from someone I don’t trust that also explicitly doesn’t use warrant canaries because he says they don’t work in contradiction to every legal authority.

                It’s also an issue that they run the signal server on one single AWS region.

                It isn’t hard or even all that expensive to run on multiple regions.