Fun topic.
Rule of thumbs are:
- How interesting are you? Whistleblower like Snowden or Assange? Consider yourself burned. Or, just an average dude with unfavorable political opinions? Meh - you aren't worth the effort. Example: for high value targets, US gov't has been known to intercept laptops and phones between the retailer (Amazon,etc.) and the target to pre-install spyware. That's expensive and only done for high value targets.
- Are you paying for the service? No? Then, you are not the customer - you are the product. Don't trust what you don't pay for. BUT: The exception to this is altruism: Some products are good (like Veracrypt) because the creators appears to have altruistic purposes. But, these are rare. AND - it is easier to put out a tool for altruistic purposes (like Veracrypt) vs running an ongoing service (like poal.co). Ongoing services are expensive to operate, so that's a red flag in itself.
- Where is the physical server? If you are an American - use a Chinese server. If you are Chinese - use an American server. So - WeChat is safer for an American to use vs. a US based service that may be subject to search warrants.
- Decentralization is key. Point to point encryption is worlds better than going across a central server.
So, specific to Signal:
- only you can answer #1
- you aren't paying for the service, what is their revenue model? A non profit asking for donations. Might be OK. If it is altruistic, then there may be hope. They are a non profit, so it would be of interest to look at their public records. (https://projects.propublica.org/nonprofits/organizations/463948126 ... looks like they got some large donations in 2013-2015 to build the tool. Would be interesting to dig and see who made those donations.)
- points #3 and #4 should be both covered here if it is truly end to end encryption w/o a central server. The good news is that signal is open source. SO ... to be safe: (1) download the source code, (2) review it, study the encryption and key handling, (3) compile the source code from the copy you downloaded and reviewed. There are security guys who do this for personal interest. And, they would be screaming if they found red flags in the code OR the compiled download versions didn't match what they compiled independently. I haven't heard anyone screaming on signal, so likely safe. But, always evaluate your risk level before using any tool.
I proffered on a similar question on VPNs a month ago. Might be of interest: https://poal.co/s/technology/477036/9788f0d9-12e5-489c-b2c3-192bd1152a85
My elaboration.
If you are using signal on an android phone and come to the attention of the Enemy either personally or as part of the group.
They have the power to replace the open source signal app with their own fork that will share conversations with spy agencies. Users will be none the wiser.
And all this is automated. Ai read conversations looking for key words.
Meaning you don't have to be important for them to spy. Probably just being a known white male conservative or right winger.
When you use Android you are using a spy tool. Nothing else can over come that.
Excellent point!
If you are "an interesting person", you'd better be using a rooted device without access to the google play store.
Nice take. 1995 called and wants it back tho.
"Are you paying for the service? No? Then, you are not the customer - you are the product."
Once upon a time this was reliable, but with the coming of M$, not so much anymore. With their products (in particular Win 8, 10 &11), you not only pay for them, but still become the product. I see other companies beginning to follow the same business model.
(post is archived)