• 24 Posts
  • 2.24K Comments
Joined 3 years ago
cake
Cake day: July 7th, 2023

help-circle













  • 🤣🤣🤣😂

    Bruv, before Signal launched they posted an entire whitepaper detailing their protocol, the working mechanisms of the system, and source code. So to reply to your 3 points:

    1. No, this is stupid and easily verified by watching network traffic from any device. Signal isn’t secretly sending plaintext messages anywhere.
    2. No, it’s not impossible to tell this at all. That’s what source code is. The executable code. Not only have NUMEROUS security audits been done on Signal by everyone from Academia, to for-profit security researchers and governments, you can easily verify that what you’re running on your phone is the same source code as what is published publicly because the fingerprint hashes for builds are also published. This means the same fingerprint you’d get building it yourself from source should also be the same as what is publicly published.
    3. See my point above, but also when two users exchange keys on Signal (or in any other cryptographic sense), these keys are constantly verified. If changed, the session becomes invalid. Verifying these keys between two users is a feature of Signal, but moreover, the basics of cryptography functioning can, and have been proven, during the independent audits of Signal. Go read any of the numerous papers dating back to 2016.

    If you don’t understand how any of this works, it’s just best not to comment.