this post was submitted on 27 Jan 2026
834 points (99.6% liked)
Technology
79355 readers
4240 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Signal
You're just replacing trust in Meta with trust in Signal Inc without understanding why WhatsApp is vulnerable to this.
Is Signal Inc more trustworthy than Meta? probably
is Signal (app) safe from the attack described? absolutely not.
Theoretically, you can check the code actually running on the Signal servers is the code they publish under a free and open source licence, using the hardware-based TEE attestations the servers will return
Someone more knowledgeable than me may have managed to do so, I haven't.
Tell me you don't understand how Signal's E2E mechanism works without telling me you don't understand how Signal's E2E mechanism works.
Tell me you don't understand what E2E encryption is without telling me you don't understand that the limits of E2E encryption.
See every other comment in this thread describing in great detail why you are wrong, but that you fundamentally DO NOT UNDERSTAND how any of this works whatsoever.
You fundamentally DO NOT UNDERSTAND how security works, go play with your algorithms and stop spamming my replies.
Um, security is based largely on encryption algorithms.
No encryption is largely based on encryption algorithms, security is much broader than that.
For reference https://en.wikipedia.org/wiki/Encryption
I think you're trying to refer to security posture, or security practices. However those mean nothing if you cannot encrypt or encode in some manner as to not be easily understood by a third party.
Largely this is done with some sort of algorithm.
This is key and I don't think Signal shies away from this. You MUST trust the code you're running. We know there are unofficial Signal builds. You must trust them. Why? Because think of it this way. You're running a build of Signal, you type a messages. In code that text you type then gets run through Signal's encryption. If you're running a non-trustworthy build, they have access to the clear text before encryption, obviously. They can encrypt it twice, once with their key and once with yours, send it to a server, decrypt theirs and send yours on to it's destination. (for example, there's more ways than this).
The code can be okay but it's delivery method(aka Google), the OS(aka Google) or the hardware can be compromised.