this post was submitted on 07 May 2025
32 points (82.0% liked)

Privacy

38139 readers
664 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
32
TM Signal (lemmy.world)
submitted 3 weeks ago* (last edited 3 weeks ago) by [email protected] to c/[email protected]
 

The scariest part of this recent news is that TM Signal seem(ed) to be interoperable. People using TM Signal could interact with actual Signal users. How are you to know whether or not your groups have people using bastardized versions of Signal? Are things like Session interoperable with Signal?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 9 points 3 weeks ago (1 children)

The direct answer to your question is: verification of the security of the platform that the other party is using is outside of the scope of the Signal protocol. Anything you send to the other party can be taken off of their device. Signal only concerns itself with securing the message over the network and making it hard for an adversary with network dominance to build a social graph. It doesn't protect from all SIGINT.

Additionally, since the server is open source and the protocol is open an publicly documented, it is completely possible to build your own Signal client and give it whatever capabilities that you'd like.

There are several open source packages available that allow you to interface with Signal without using the official Signal client:

https://github.com/AsamK/signal-cli

https://gitlab.com/signald/signald (also, https://signald.org/articles/clients/ )