And that's why you do not want shadow-IT in your company (not sure if it was in this case, but looks like a pretty good example for me).
Still, trusting Signals encryption itself is a good decision.
@Threadbane
Military comms are designed to only allow personal that are pre vetted. You can't accidentally invite an outsider. The hardware is also secure.
These people have security comms people that travel with them to set up access to secure comms.
The other thing is Signal is not allowed on official phones and can't be downloaded.
This was on personal mobiles, which are unsecure and likely targeted and compromised by foreign intelligence.
It doesn't matter the encryption if Russia has a keylogger and screen capture software installed on the phone.
One of the party had just gone through Russian customs and would have had to hand their phone over and likely had software put on their phone.
China has also been in the US mobile system. So another way to put software on their phones.
Authoritarian countries have used routinely use spyware to surveil journalists, lawyers, political dissidents, and human rights activists
https://en.m.wikipedia.org/wiki/Pegasus_(spyware)
This is not the fault of Signal, but the underlying operating system of the phone. Particularly when up against adversaries with State level resources to target individuals.
@daccle @signalapp they already had
One piece of misinfo we need to address is the claim that there are ‘vulnerabilities’ in Signal. This isn’t accurate. Reporting on a Pentagon advisory memo appears to be at the heart of the misunderstanding: https://npr.org/2025/03/25/nx-s1-5339801/pentagon-email-signal-vulnerability. The memo used the term ‘vulnerability’ in relation to Signal—but it had nothing to do with Signal’s core tech. It was warning against phishing scams targeting Signal users. 2/
@signalapp This is an example of how Signal should improve its vulnerability disclosure.
cf. the OWASP guide: https://cheatsheetseries.owasp.org/cheatsheets/Vulnerability_Disclosure_Cheat_Sheet.html#disclosure
Even if this is an UX improvement here, there should be a place resuming the identified problem and its impact, the vulnerable versions, the patched versions, the patch, etc.
Well made vulnerability improves confidence for the software because it shows maturity on the matter. It also avoid opportunistic attackers looking at the git log to identify and exploit bugs with fixes that aren't released yet
Let’s collect past security audits here: Formal audits Year Auditor(s) Sponsor App/Component Published Link Last update / extended 2013 iSEC Partners (NCC Group) Open Technology Fund RedPhone and TextSecure ❌ Blog post 2014 Frosch et al. German Ministry of Research and Education TextSecure Protocol ✅ PDF 2016 Schröder et al. Internet Society Key fingerprint verification ✅ PDF 2016 Cohn-Gordon et al. Various research grants Signal Protocol ...
@signalapp If someone in the conversation shares that conversation... that's outside of the app's control.
Just like anything else. If there is physical access to the thing, it is not secure.
First day in security:
(1) Something you are.
(2) Something you have.
(3) Something you know.
#Signal doesn't have all three
In what way did the NPR article get it wrong? They reported on a government memo suggesting vulnerability, but also contacted Signal to get the actual truth.
It also kind of misses the point that they are using Signal to avoid FOIA stuff.
If its not archived it can't be foia later when classification changes. Or even investigated internally. Try and be aware so you don't talk past people.
That is accurate but unsecured is probably not the right adjective to describe that.
Noncompliant would be better because it's not compliant with the requirements for government messaging but also has never claimed to be.
@evrenozara @signalapp the chats are likely gone forever, unless they willingly give up their devices with the chats undeleted.
I've heard people calling Signal "unapproved" but not "unsecured".
@evrenozara @signalapp this doesn't make it insecure, it makes it unfit for usage by officials. It wasn't *made* for that purpose, it's meant for the general public. That's not a failing of the app, it's a failing of the officials.
The US federal government has communication systems that the officials have access to and that fit the record keeping requirements, as well as other advantages for official use (not being able to add an unauthorized person for example). They just didn't use those.
Of course a lot of new eyes are also checking y’all out since apparently our national security folks just said “fuck a SCIF, let’s throw it all into chat”
Wonder if the Secretary of Dranks Defense got phished and finessed out of those war plans…?
@signalapp oh, and I am a fan of Signal, it’s not only quite possibly the most secure messaging platform but also forms the underpinning of other secure messaging systems too.
Not sure there’s a way to build in something to counter the incompetence of our officials in the code unfortunately.
@signalapp It's not #disinfo when one points out that you demand #PII aka. #PhoneNumbers from Users and that is literally a architectural vulnerability, alongside your #proprietary & #Centralized #Infrastructure.
Not to mention the lack of @torproject / #Tor support with an #OnionService or the willingness to fulfill #cyberfacist "Embargoes" or shilling a #Shitcoin #Scam named #MobileCoin!
And don't get me started on the #cyberfacism that is #CloudAct.
I may nit have allvthe.evidence yet, but #Signal stenches like #ANØM: #Honeypot-esque!
Signal was originally created to replace text/SMS, which is why a phone number is required. It started as an encrypted layer over SMS/MMS.
Being open source allows scrutiny. Being centralized doesn't equal insecure and Criminal usage is not proof of security. Cloud Act affects all US firms.
> I may nit have allvthe.evidence yet ...
So spread FUD potentially pushing people to less secure platforms? Not cool tbh.
What they didn't say is that the war plans came from chatgpt, target coordinates and all (with citations of course 👍 )