| pronouns (en) | he/him or they/them |
| pronouns (nl) | hij/hem of die/diens |
| It's me. | https://stiiin.nl/ |
| pronouns (en) | he/him or they/them |
| pronouns (nl) | hij/hem of die/diens |
| It's me. | https://stiiin.nl/ |
Static + dynamic analysis of Signal's APK. The good news first: Signal is genuinely exceptional.
Rust core (libsignal_jni.so), post-quantum hybrid Double Ratchet (Kyber-1024 + X25519), Direct ByteBuffers with immediate zeroing after PIN/username hashing, Intel SGX attestation for SVR — MREnclave verification means even a compromised Signal server can't extract your PIN hash.
But two things stood out:
1. Firebase is always there. Google receives IP + notification timestamps regardless of message content. If you need metadata privacy, Signal still leaks presence data to Google's infrastructure.
2. Certificate revocation endpoints hit http://g.symcd.com in plaintext. An ISP or state-level observer can fingerprint Signal usage from DNS queries and HTTP traffic to those CAs — without touching message content.
Conclusion: strongest crypto engineering in consumer messaging. The attack surface isn't the cryptography. It's the operational dependencies.
Soon the full analysis
#infosec #AndroidSecurity #Signal #privacy #ReverseEngineering #postquantum #mobileforensics
See the Planner app within Microsoft Teams for Android.
Be surprised that it's there, days after being told you don't have a license.
Try to create a To Do list in it. It works.
Try to delete it. There's no option to do so.
Who the fuck makes this shit, and why do we keep buying it?
**Grandfather, you lived through an explosion of renewable energy beyond even the most optimistic forecasts. Yet fossil fuels persisted. What happened??**
**Well, grandson, you see, a very large number of professional people thought a sentence-generating software program had a little guy inside it. And then, **