the weakest link in 99% of Signal conversations is iOS and Android, who's to say the three letters can't just get the OS companies to take secret screenshots in private and stage a subpoena they know won't do anything to make sure their public relations lines up
>who's to say the three letters can't just get the OS companies to take secret screenshots
that's completely out of the control of signal devs, you can always use something like graphene
I think if you looked closely at these supposed "court records", what they probably in fact show is that they aren't allowed to get jack shit from it, because no matter how many naughty pizza pictures the bad guy sent in whatever court case you're referring to, it's not worth not catching a terrorism or red team spy because you revealed the insecurity over a silly little dickypig and the terror spy used a different way to communicate.
that's just speculation on your part, there's no evidence to suggest they can subvert signal's e2e
>they don't even distribute an APK on their website
I must be using honeypot all this time then?
1 week ago
Anonymous
that anon is lying, they do distribute an APK on their website
I know because I use it since I don't have a Goolag account so no ~~*play store*~~ access
yes, it is just speculation, and I am saying there isn't allowed to be evidence that they can subvert signals e2e. Anyone who doesn't live under a rock knows that any common communication device, including the ones you and I are using, have glowie chips and hidden spy routines from multiple different countries, which render any end to end encryption completely pointless from the point of these groups powerful enough to get that stuff on there in the first place, just as
the weakest link in 99% of Signal conversations is iOS and Android, who's to say the three letters can't just get the OS companies to take secret screenshots in private and stage a subpoena they know won't do anything to make sure their public relations lines up
I think if you looked closely at these supposed "court records", what they probably in fact show is that they aren't allowed to get jack shit from it, because no matter how many naughty pizza pictures the bad guy sent in whatever court case you're referring to, it's not worth not catching a terrorism or red team spy because you revealed the insecurity over a silly little dickypig and the terror spy used a different way to communicate.
>safe?
won't steal your credit card details, you can check the source code, so probably yes >private?
i mean, it has end to end encryption on everything always on. pretty nice, I would say it's private enough for a normie who would rather not get advertised based on discussions with his mom. >anonymous?
not really, phone number requirement is still there and in some places you need to show ID to buy a sim card. so if you need an anonymous communicator, this isn't it.
in short, seems decent enough to make communication with family encrypted and not sold by Facebook to advertisers. requirement for phone number throws anonymity out of the window, but your mom probably knows who you are already so for that purpose it's not a problem. if anything, using contact book as Signal contacts makes onboarding new normies easier because they don't have to "find" you, they probably already have your phone number. safety seems decent, it doesn't have any known remote code execution or similar vulnerabilities, and the source code for clients is available so you can make sure it doesn't have malicious behavior.
there, LULZ. now you can understand why safe != private != anonymous, and why you might not really need all 3 at all times. sure, a communicator with all 3 would be nicer, but for normal people Signal seems to be just fine.
that's, of course, as long as you can convince normies to try it instead of Facebook, but since the setup is easy and app is smooth (unlike most clients for my beloved Matrix) you can achieve your goal without making it seem that there are Herculean efforts required to not sell your conversations to Facebook.
if your phone is compromised signal's security is useless. if your convo partner's phone is compromised, again signal's security is useless.
same as using protonmail and talking with someone who has gmail.
Signal is in the US. With a NSL they will provide continuous logging, so all metadata which means a complete social graph based on phonenumber registration.
With phonenumber registration even metadata is really good data.
>With continuous logging they don't need to see your contacts, they just need to see who they have to send your messages to.
proof?
1 week ago
Anonymous
>Phone numbers are used to provide our Services to you and other Signal users.
Common fucking sense, they need to know how to route messages.
They know sender/recipient, they can log it, they will when there's a gun to their head.
1 week ago
Anonymous
>They know sender/recipient, they can log it, they will when there's a gun to their head.
proof?
1 week ago
Anonymous
It requires no proof, it's an evident fact.
1 week ago
Anonymous
nope, you can't weasel your way out of proving your claim, signal is f/oss and they can't see any of your data, it's all encrypted, it's now up to you to prove otherwise as the burden of proof is on you, champ, good luck with that, I'll wait
1 week ago
Anonymous
providing a server means they have to know where to route the messages retard
no technical points made in this thread. just MUH JOOZ. ever notice this? ever notice that this forum full of children can't make technical points and back it up with solid proof? ever notice this?
The glownaggers contacted Tucker and told him they knew he was trying to organize an interview with Putin and to stop, because the glowies were in Tucker's Signal.
It's not private or secure for any real use case. Probably a honeypot.
Has the perfect combination of being accessible for normies while actually being safe and secure. Don't be a terrorist though. I don't know much about this use case.
Against NSA/Mossad? No
Against just about any other adversary? Probably
eff pee bee pee
all tech solutions eventually fail
>Against NSA/Mossad? No
Proof? Court records show they can't get jack shit from it.
the weakest link in 99% of Signal conversations is iOS and Android, who's to say the three letters can't just get the OS companies to take secret screenshots in private and stage a subpoena they know won't do anything to make sure their public relations lines up
>who's to say the three letters can't just get the OS companies to take secret screenshots
that's completely out of the control of signal devs, you can always use something like graphene
that's just speculation on your part, there's no evidence to suggest they can subvert signal's e2e
Signal's position is that you should be using the stock mobile OS with your bootloader locked because anything else compromises muh security
they don't even distribute an APK on their website
>they don't even distribute an APK on their website
you're fucking lying and glowing
>they don't even distribute an APK on their website
I must be using honeypot all this time then?
that anon is lying, they do distribute an APK on their website
I know because I use it since I don't have a Goolag account so no ~~*play store*~~ access
yes, it is just speculation, and I am saying there isn't allowed to be evidence that they can subvert signals e2e. Anyone who doesn't live under a rock knows that any common communication device, including the ones you and I are using, have glowie chips and hidden spy routines from multiple different countries, which render any end to end encryption completely pointless from the point of these groups powerful enough to get that stuff on there in the first place, just as
is pointing out.
so you have no proof, just talking out your ass, good to know
do you get paid per post? I'd want at least a quarter per post if I had to argue with me. You poor bastard.
no I defend freedom for free, unlike you who is paid per post by the NSA, glow glow
I think if you looked closely at these supposed "court records", what they probably in fact show is that they aren't allowed to get jack shit from it, because no matter how many naughty pizza pictures the bad guy sent in whatever court case you're referring to, it's not worth not catching a terrorism or red team spy because you revealed the insecurity over a silly little dickypig and the terror spy used a different way to communicate.
It is safe to assume no one uses it
true.
use telegram homosexuals.
>use telegram homosexuals.
they store your keys so it's ultimately not trustworthy
>safe?
won't steal your credit card details, you can check the source code, so probably yes
>private?
i mean, it has end to end encryption on everything always on. pretty nice, I would say it's private enough for a normie who would rather not get advertised based on discussions with his mom.
>anonymous?
not really, phone number requirement is still there and in some places you need to show ID to buy a sim card. so if you need an anonymous communicator, this isn't it.
in short, seems decent enough to make communication with family encrypted and not sold by Facebook to advertisers. requirement for phone number throws anonymity out of the window, but your mom probably knows who you are already so for that purpose it's not a problem. if anything, using contact book as Signal contacts makes onboarding new normies easier because they don't have to "find" you, they probably already have your phone number. safety seems decent, it doesn't have any known remote code execution or similar vulnerabilities, and the source code for clients is available so you can make sure it doesn't have malicious behavior.
there, LULZ. now you can understand why safe != private != anonymous, and why you might not really need all 3 at all times. sure, a communicator with all 3 would be nicer, but for normal people Signal seems to be just fine.
that's, of course, as long as you can convince normies to try it instead of Facebook, but since the setup is easy and app is smooth (unlike most clients for my beloved Matrix) you can achieve your goal without making it seem that there are Herculean efforts required to not sell your conversations to Facebook.
>effortpost
Dumb homosexual op just wants to know if he can share his pizza on it
yea
da.
if your phone is compromised signal's security is useless. if your convo partner's phone is compromised, again signal's security is useless.
same as using protonmail and talking with someone who has gmail.
remember when the signal ceo chimped out on telegram calling it the worst program for safety?
a week later the fbi list under foia came out
yeah.....
Can you provide a high quality image please?
still waiting
signal has been public about this
>No Message Content
>Date and time a user registered
>Last date of a user's connectivity to the session
They ain't store shit and everything is encrypted. The point of signal is that they can give everything without giving your info
Signal is in the US. With a NSL they will provide continuous logging, so all metadata which means a complete social graph based on phonenumber registration.
With phonenumber registration even metadata is really good data.
signal doesn't have any metadata, they can't see your contacts
With continuous logging they don't need to see your contacts, they just need to see who they have to send your messages to.
>With continuous logging they don't need to see your contacts, they just need to see who they have to send your messages to.
proof?
>Phone numbers are used to provide our Services to you and other Signal users.
Common fucking sense, they need to know how to route messages.
They know sender/recipient, they can log it, they will when there's a gun to their head.
>They know sender/recipient, they can log it, they will when there's a gun to their head.
proof?
It requires no proof, it's an evident fact.
nope, you can't weasel your way out of proving your claim, signal is f/oss and they can't see any of your data, it's all encrypted, it's now up to you to prove otherwise as the burden of proof is on you, champ, good luck with that, I'll wait
providing a server means they have to know where to route the messages retard
you can do that with encryption retard
Delete this.
Then print it, scan it, print it again, scan it one more time. Then repost.
>phone number harvesting
Take a wild guess.
yes
https://signal.org/bigbrother/
number harvesting
LOL there's no such thing
not real. ever heard of a phone book you stupid fuck?
It is run by a israelite who totally deserves the position and didn't benefit from israeli nepotism at alll and she says it is safe and private.
You don't think israelites would do that do you? Just tell lies and collect information?
they usually give all of their data to whatever 3 letter agency asks
and that's because they don't really store much
they store an ID for your account and timestamps for your communications, and that's it.
the unsafe part is that you have to trust whoever you're talking with, if they don't even lock their screen your communications can be read by anyone.
no technical points made in this thread. just MUH JOOZ. ever notice this? ever notice that this forum full of children can't make technical points and back it up with solid proof? ever notice this?
was third reply not technical enough?
don't care, eat your own diarrhea
>doesn't read replies
>complains about replies
thanks gptkun, you too
No, but your opsec most likely isn't anal enough for that to matter.
no it's not safe
nothing is safe
you are not safe
>no it's not safe
>No Message Content
>Date and time a user registered
>Last date of a user's connectivity to the session
??????????????????????????
>implying your isp isn't shilled
this means nothing. do you even know what you just said? explain what you're trying to say, dumbass
>stupid goys trust me
I've completely submitted to mass surveillance, it's completely impossible to avoid unless you have a 300mm fabricator setup in your garage.
>ios/android
Apps are only are safe as the OS and underlying hardware so nah welcome to the matrix
The glownaggers contacted Tucker and told him they knew he was trying to organize an interview with Putin and to stop, because the glowies were in Tucker's Signal.
It's not private or secure for any real use case. Probably a honeypot.
I love how this keep being suppressed
look up full send tucker carlson he mentions it there
Just use Google Chat & Messages with the rest of the colony, fellow ant.
No better than Whatsapp.
Has the perfect combination of being accessible for normies while actually being safe and secure. Don't be a terrorist though. I don't know much about this use case.
werks enough for me, but i don't really message much, and if i do it's family.
glowboys aren't my worry either so keep that stuff offline if possible
realistically if you are posting this on glowchan, it is safe from the threat actors that actually affect you
It's 100% safe, since nobody else ever uses it, and you can't have your signal messages cracked if you have no one to send signal messages
>no one uses it
>300M+ users
kys glowie