this post was submitted on 23 Sep 2023
526 points (99.4% liked)

Technology

59329 readers
5064 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Meredith Whittaker reaffirms that Signal would leave UK if forced by privacy bill::Meredith Whittaker, the president of the Signal Foundation, the organization that maintains the Signal messaging app, spoke about the U.K.'s controversial new privacy bill at TC Disrupt 2023.

you are viewing a single comment's thread
view the rest of the comments
[–] AllNewTypeFace@leminal.space 5 points 1 year ago (1 children)

There’s a difference between the spooks being able to read everyone’s messages and the ordinary police being able to do so. Assuming that Five Eyes or similar have a secret way of decrypting Signal messages, it won’t remain a secret if every drug dealer who uses Signal is swiftly arrested. (Even with the trick of parallel construction, postal inspectors magically getting lucky every time someone uses Signal would get suspicious pretty quickly.) If the spooks can read your Signal messages, they are compelled to ration that capability rather than burning it.

[–] jet@hackertalks.com 2 points 1 year ago

Agreed 100%. So I think signal matches most people's threat models, so it's still great to recommend to people.

If you were running some countries internal messaging service for diplomats. You might use signal, but you'd have to mirror the infrastructure to completely host it. And then probably add your own ciphers on top.

All down to the threat model.