50
Reviewing the Cryptography Used by Signal
(soatok.blog)
Welcome! This is a community for all those who are interested in protecting their privacy.
PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!
Literally all they need to do is have their own phone with Signal installed, and then create an address book listing with the Suspects phone number on it.
Next time Signal syncs, it will pop up “Suspect is on Signal!”.
Subpoena-ing the Signal Foundation is not required.
But it proves nothing, and if you are in a jurisdiction where the police can demand your phone or you are stupid enough to hand it over when they can’t, that’s not on Signal.