#Signal was warranted again, and as always they gave the only data they could give: time of registration in Unix miliseconds, and time of last connection in Unix miliseconds.

yet another reminder that you can't give away data you don't have in the first place.

https://signal.org/bigbrother/santa-clara-county/

Search warrants for Signal user data, Santa Clara County

Because everything in Signal is end-to-end encrypted by default, the broad set of personal information that is typically easy to retrieve in other apps simply doesn’t exist on Signal’s servers.

Signal Messenger

@Yuvalne Does anyone know how #Signal gets away with not handing out FCM/APNs tokens that technically must be associated to Signal accounts in order to send push notifications?

No intention to bash, especially since all messengers distributing in the official app stores are affected by this. I'm just curious whether there is a technical or legal loophole that Signal is using here.

@f09fa681 @Yuvalne in this case the warrant only requested the timestamps; it didn't ask for messages or anything else. I guess they know asking for messages is pointless?

I have to assume if the warrant demanded push keys that Signal would fight it, but as far as I know that hasn't happened.

@adrake @Yuvalne Yeah, you're right, they specifically requested the timestamps. I missed that. Obviously I don't know the intent of or the legal constraints under which those requests where made and why the timestamps in particular were requested.