So do that. You can do that with Signal.
Do you know of anyone doing it? Other people have said there are difficulties.
You wouldn’t register on websites, but you would communicate with them over plaintext. I hope that makes it clearer.
It is ok, in that era (dialup or wired internet) unencrypted http was basically as secure as unencrypted landlne phone calls. People still have unencrypted phone calls all the time. Typicalally sites would show public content (like product pages on an e-commerce site) by http, then switch to https for checkout to protect stuff like credit card numbers. Encrypting everything became important when wifi became widespread. Wifi hotspots would hijack DNS and spoof entire web sites to steal credentials. Also, LetsEncrypt made it possible to bypass the CA scam industry, making https-everywhere more popular. Public awareness also increased due to Snowden’s disclosures.
The RSA encryption patent also expired in 2000. Before that, US website operators were potentially exposed to hassle if they didn’t use a commercial server with an RSA license ($$$). But, it didn’t apply outside the US and FOSS SSL servers existed for those wanting them.
Those are nice generalities but I think they ignore reality. Jami seems like sort of a side project to its developers. Bug reports often are answered with a suggestion to make sure everyone is running the latest version of Jami, which is often useless advice. Like if you try to call your friend with your new phone and the call doesn’t complete, it’s unhelpful for your phone manufacturer to say your friend should get a new phone. You might be interested in helping fix the problem but your friend just wanted to have a phone conversation and doesn’t want to get dragged into a debugging project. It’s even worse if the other person is not your friend but rather is someone you just met and exchanged numbers with. If you try to follow up with a phone call and there is a problem, GAME OVER. You permanently lose contact with that person. You can’t possibly suggest Jami as a Skype replacement after that happens to you once or twice.
Another thing with comms programs in general is you really can’t debug them with just one computer. Their whole function is to let two computers talk to each other, so you need two computers where you control both ends and ideally control the network as well, so you can insert delays, network faults, etc. If the Android version has trouble talking to the Iphone version, you need both kinds of phones. I’m not sure if Jami’s devs really understand that. I’ve worked on telecom stuff in the past and it’s just the reality of that field.
Yet another (I’m not sure of this) is that Jami is a peer to peer program so I suspect some of the problems revolve around firewall traversal gotchas of various types. I don’t know if there is a cure for this while keeping the basic architectecture intact. I do like it in principle and I know that people get BitTorrent working reliably without too much trouble, so maybe Jami is just missing some trick.
Finally, Jami is pretty old and back in those days, people hadn’t really thought about the subtleties of encrypted group chats. Signal does a better job, and these days there is a standard (RFC 9420) for how to do it (I don’t know if Signal follows this standard). It would be good if Jami were revamped for that, but 1) that would break interoperability again, and 2) I don’t know if it’s workable at all with Jami’s architecture (serverless, using a distributed hash table for peer discovery).
For now I’ve sort of given up on Jami and am trying to figure out what to use instead. It’s unfortunate that the main devs don’t seem to have that much interest in making Jami reliable. Randos like me capable of making small contributions can’t really help much with more involvement from the experts.
Because your status updates and messages are encrypted and stored (until retrieved, of course) once for every recipient, and that includes your other devices and their other devices.
I’d like to see a numerical estimate of how much data this is. But, it sounds to me like more reason to want to self-host.
I don’t see any point to rehashing the other stuff. Non-TLS websites mostly went away once DNS spoofing at wifi hotspots became widespread.
Thanks. The more I think about it, the more this seems like outright evil behaviour on Signal’s part to pursue user growth, similar to Facebook etc. Imagine that you and your boss are in each other’s contacts for obvious work-related reasons. Do you really want Signal notifying your boss that you registered for Signal? For some of us it’s fine, but in general it seems like a terrible idea.
Yeah I’m on their Discourse forum, but the situation isn’t that great, and it’s unclear to me if the problems are fixable. Particularly when there are incompatibilities between version X and version Y, where both versions are already in the wild. You can’t travel backwards in time to fix those versions, and this (like email clients or telephones) is an application area where you can’t tell people to update their clients all the time. You have to keep things interoperable.
It’s also often inconvenient to reproduce bugs like that in order to diagnose them. If you try to talk to someone over Jami and it doesn’t work, you generally can’t borrow their phone to analyze the issue. If you’re one of the core developers, maybe you have access to a room full of different kinds of phones and OS versions to test with, but a typical user/contributor won’t have anything like that.
Very interesting, thanks. Do you mean they use SGX (Intel’s buggy secure enclave feature)? Any idea what they use it for? If not SGX, do you know what the issue is? AMD Epyc processors have something similar but different, fwiw. If there is such highly secret info on the server though, that makes self-hosting even more important. It also makes the architecture suspect.
Telling the govt that you registered for Signal sounds like a bad failure as far as I’m concerned, e.g. if you are a user in a repressive regime. Do you think Trump would like to get his hands on a list of all the Signal users in the US? Probably yes. What would he do with the list? IDK but it has to be bad. So it should be an objective of Signal to make it impossible for anyone to create such a list.
Anyway, it sounds like Signal has wised up and is getting rid of the phone number requirement. I don’t understand why people here keep defending the misfeature. I’ve heard such things explained as “system justification” but I still don’t understand it. All of us make poor decisions all the time, but we should at least make some effort to recognize them, and fix them when possible.
I think I would stay away from Synology in general these days, after this:
https://news.ycombinator.com/item?id=43734706
There are plenty of DIY NAS solutions available and I’d just use one.
To truly be safe from Signal’s influence you would need to audit the source code and build it yourself.
Usually I only install APK’s from F-Droid, which always builds its apps from source, rather than using the developer’s APK. I’m uncomfortable that Signal doesn’t seem to be on F-droid, and I’m in fact hesitant to install it from anywhere else. I’m not currently set up to build Android apps myself. I’m a fairly unsophisticated Android user.
They are overlapping areas, but they are “two completely different things”. They overlap by sharing common goals, not by being interchangeable.
They aren’t interchangeable but they intersect. Completely different means they are disjoint.
it proudly advertises you as a signal user to other signal users
That sounds terrible, a private message service shouldn’t advertise anything to anyone. If I subscribe to a subversive magazine, it shouldn’t advertise me to other subscribers. It’s a terrible invasion if they do. Signal and PGP are both comparable to subversive magazines in that regard, even if the PGP manual tried to say the opposite.
I think most of us these days recognize that the whole concept of public key directories and signature chains on PGP keys was a conceptual error in how people thought about privacy back then (they only cared about encrypting message content). We like to think we know better now, but maybe we don’t.
Okay? And? In this hypothetical world where Signal offered anonymity but still tied you to your number for other practical reasons, then you’re be correct that it would be a privacy concern.
According to Wikipedia, they do record some of that info and report it to the government when required. In fact there is further disclosure to them (they might not retain or use the info, but they do receive it) every time you connect to the Signal server.
Anyway the Wikipedia article indicates they have introduced usernames as an alternative to phone numbers, so they have finally acknowledged the problem and done something about it.
I haven’t seen a non-TLS website in years.
Your asserting “two completely different things” doesn’t make it true. Privacy and anonymity are not synonyms but they are overlapping areas. Also ISTM you are redefining terms to suit your purposes. Anonymity to me means the message recipient can’t tell who you are. If a THIRD PARTY (the server operator) can ALSO tell who you are, that’s a privacy failure, not just an anonymity one.
Why does it take so much storage per user? Does it have video uploads or anything like that? A user account should basically just be a row in a database.
From https://en.wikipedia.org/wiki/Signal_(software) :
In August 2022, Signal notified 1900 users that their data had been affected by the Twilio breach including user phone numbers and SMS verification codes.[105] At least one journalist had his account re-registered to a device he did not control as a result of the attack.[106] …
This mandatory connection to a telephone number (a feature Signal shares with WhatsApp, KakaoTalk, and others) has been criticized as a “major issue” for privacy-conscious users who are not comfortable with giving out their private number.[142] A workaround is to use a secondary phone number.[142] The ability to choose a public, changeable username instead of sharing one’s phone number was a widely-requested feature.[142][144][145] This feature was added to the beta version of Signal in February 2024.[146]
Using phone numbers as identifiers may also create security risks that arise from the possibility of an attacker taking over a phone number.[142] A similar vulnerability was used to attack at least one user in August 2022, though the attack was performed via the provider of Signal’s SMS services, not any user’s provider.[105] The threat of this attack can be mitigated by enabling Signal’s Registration Lock feature, a form of two-factor authentication that requires the user to enter a PIN to register the phone number on a new device.[147]
The wikipedia article looks informative and I will read through it: https://en.wikipedia.org/wiki/Signal_(software)
Is spam a serious problem on other messaging systems?
That is a pretty weird post that doesn’t make much sense, but I remember meeting Moxie and asking him about Android security and being surprised at how defensive he was about it. Is Signal the app he was working on? That helps somewhat. I get them confused with each other.
The Signal app doesn’t appear to be on F-droid, which is a bit discomforting.
The claim is that Signal’s phone verification step doesn’t cause privacy problems because Signal (purportedly) doesn’t retain the phone numbers after verification. That claim is falsified because the phone carrier stores the call record even if Signal doesn’t. They store it because of the same law that makes them turn it over to Big Brother on demand. The phone verification step is, therefore, a privacy problem. Obviously there are similar issues with IP routing, but at least I can use a VPN with an endpoint in another country.
I don’t understand what you mean about discoverability: is my presence on the network advertised to strangers and spammers? That doesn’t sound good. What does the onboarding process look like?
You still haven’t said what Signal’s advantages are supposed to be over alternatives, though I can guess some (e.g. better/more crypto than irc has). Jami seems conceptually ok, but buggy in implementation. Nextcloud Talk works but is kind of clunky. Matrix is popular though I’ve never used it: is it the main alternative to Signal these days? I thought it was what all the hipsters had migrated to while luddites like me were still on irc. Jitsi Meet looks nice though again I haven’t explored it much. I’ve been puzzled for a long time that there is so much work in this area yet everything has deficiencies. Are there difficult problems to solve?
If Signal’s code is open then of course I’d want to self-host the server. Can I do that? Does that get in the way of the onboarding process you mention? Where does the phone number come in, in that case? If I to use Signal’s server, that doesn’t sound so open, and normally there’s no way for me to verify that it’s running the same code that they claim.
I don’t see where I’m spreading FUD. Ignoring a question and calling it FUD doesn’t invalidate the question.
I get that Signal is a messaging system (not sure if “messenger service” has a specific meaning). What I don’t understand is why I’d want to use it instead of any of the million others that are out there. I’ve never used Signal and don’t have the slightest clue about how it operates, but apparently it tries to mess with the contact list on your phone? That sounds bad. I use Nextcloud Chat sometimes and its web design is ugly, but it works ok and you can self-host it fairly easily. It doesn’t do anything with your phone contacts. Jami is distributed but (maybe unrelated) I often have trouble getting it to work at all.
Is there a quick explanation of what signal actually does? I don’t understand the need for a phone number either. Jami doesn’t ask for a phone number. It has other deficiencies that make me not want to use it, but those are technical rather than policy, more or less. Similarly, irc (I’m luddite enough to still be using it) doesn’t ask for a phone number either. So this is all suspicious. There are a bunch of other things like this too (Element, Matrix, etc.) that I haven’t looked into and tbh I don’t understand why they exist.
Lichess.org for online chess, or (most private of all) a physical travel board if you’re with a friend who wants to play. Lichess isn’t very private but definition though. Not sure why you asked in c/privacy? Anyway what happened to reading a book on a bus trip?
Oh try universal paperclips if you haven’t. 5 hours is about right for finishing it. That’s pretty private.
This is spammy and AI-style long winded. I didn’t read much. A shorter version without the advertising would be more useful.
The usual way to stay mostly private is just set up a corporation and bill through it. Here in California the annual fees are enough to be annoying but in other states they are very low. I once played with the idea of offering “company as a service” that would do everything for you online, but meh.
Borg is a backup program not a synchronizer. Backing up to mutliple targets just means running a normal backup to target 1, then another to target 2, etc. Maybe what you really want is git. There are also some self-hosted multi-access notepad programs, sort of like how google docs work. Anyway if your problem requires a server or synchronization, look into self-hosting rather than some cloud thing.
It’s hard to understand what you want. Why multiple devices? Why remote storage? Why not just use your laptop with local storage and encrypted backups? If you must have remote storage, why not self-host it on a cheap VPS? Just who are you trying to protect your data from? It’s a lot different if you think Trump is after you or something like that: you have to check your bed for microphones, rather than just worrying about your computer software.
So far I’m satisfied with just using my laptop for personal files, but if I were more paranoid I’d set up a separate laptop with no internet and take some additional precautions besides that. Anyway, the more machines you use, the more potential security holes you have to deal with.
Multiple backups is just a matter of running a script that backs up to more than one place, right? I use Borg for backup, and pointing it to multiple targets is pretty easy.
Please go on. I’m not sure I understand you fully.
The usual answer for programmable voip is Twilio. I’ve been using vitelity since I’ve been there for a long time, and their support is quite good, but they’re less flexible than Twilio and cost a bit more. A DID (direct inward dial) number from them is $1.50/month instead of $1.
These numbers all terminate in data centers, and some particularly obnoxous websites check for that and won’t do 2FA verification through them. Worst case, you could get a real cellphone and leave it in a drawer and also have it as a useful burner. There are some very cheap ones with 1 year plans on qvc.com (search for tracfone). QVC seems cringy as hell but I’m a bit tempted anyway. There are also some on tracfone.com but QVC has more choices.
The initial post is a somewhat incomprehensible rant but I think the objection is that any number of skeezy websites all have domains pointing to the same Cloudflare IP. So when a malware app opens a TLS connection to one of those domains, the shared IP doesn’t tel you anything, and the ECH prevents you from seeing with Wireshark just whose home the malware is phoning. You have to resort to more drastic methods like intercepting DNS. Better yet, don’t run malware.
Hmm ok, though if a security program needs frequent updates, that’s a cause for concern in its own right… :/