295
you are viewing a single comment's thread
view the rest of the comments
[-] poVoq@slrpnk.net 16 points 2 weeks ago

Significant improvements to certificate pinning and validation have been added to all major XMPP clients as a result of this incident, but it should also be clear that hosting a server on infrastructure under control by an antagonist government (see also Signal) is a very bad idea and hard to mitigate against.

[-] eleitl@lemmy.zip 4 points 2 weeks ago

End to end encryption between clients (also for groups) seems to partly address the issue of a bad server. As for self-hosting, any rented or cloud sevices are very vulnerable to an evil maid. So either in-house hosting or locked cages with tamper-proof hardware remain an option.

[-] moonpiedumplings@programming.dev 1 points 1 week ago* (last edited 1 week ago)

So Signal does not have reproducible builds, which are very concerning securitywise. I talk about it in this comment: https://programming.dev/post/33557941/18030327 . The TLDR is that no reproducible builds = impossible to detect if you are getting an unmodified version of the client.

Centralized servers compound these security issues and make it worse. If the client is vulnerable to some form of replacement attack, then they could use a much more subtle, difficult to detect backdoor, like a weaker crypto implementation, which leaks meta/userdata.

With decentralized/federated services, if a client is using other servers other than the "main" one, you either have to compromise both the client and the server, or compromise the client in a very obvious way that causes the client to send extra data to server's it shouldn't be sending data too.

A big part of the problem comes with what Github calls "bugdoors". These are "accidental" bugs that are backdoors. With a centralized service, it becomes much easier to introduce "bugdoors" because all the data routes through one service, which could then silently take advantage of this bug on their own servers.

This is my concern with Signal being centralized. But mostly I'd say don't worry about it, threat model and all that.

I'm just gonna @ everybody who was in the conversation. I posted this top level for visibility.

@Ulrich@feddit.org @rottingleaf@lemmy.world @jet@hackertalks.com @eleitl@lemmy.world @Damage@feddit.it

EDIT: elsewhere in the thread it is talked about what is probably a nation state wiretapping attempt on an XMPP service: https://www.devever.net/~hl/xmpp-incident

For a similar threat model, signal is simply not adequate for reasons I mentioned above, and that's probably what poqVoq was referring to when he mentioned how it was discussed here.

The only timestamps shared are when they signed up and when they last connected. This is well established by court documents that Signal themselves share publicly.

This of course, assumes I trust the courts. But if I am seeking maximum privacy/security, I should not have to do that.

[-] Ulrich@feddit.org 1 points 2 weeks ago

Signal is under control by the government? 🤔

[-] poVoq@slrpnk.net 3 points 2 weeks ago

Their server infrastructure is (run by Pentagon and NSA best buddies AWS).

[-] Ulrich@feddit.org 1 points 2 weeks ago

And that means the government controls it?

[-] poVoq@slrpnk.net 3 points 2 weeks ago* (last edited 2 weeks ago)

The infrastructure is under control of an antagonistic government, yes. Hetzner is also technically a private company, but they obviously willingly complied with requests from the German government.

[-] Ulrich@feddit.org 1 points 2 weeks ago

And what are the implications of that control? It doesn't mean they can access anything on it. Especially not data that doesn't exist.

[-] poVoq@slrpnk.net 2 points 2 weeks ago

They have live access to all of the metadata and can easily correlate that with phone numbers that Signal stores and shares on request of governments. Just because Signal claims they don't store anything doesn't mean that the ones that 100% run all the servers Signal uses don't access and store anything. You are being extremely naive if you believe Signals BS marketing.

[-] Ulrich@feddit.org 1 points 2 weeks ago

They have live access to all of the metadata and can easily correlate that with phone numbers

I'd love to see the evidence you have for this.

You are being extremely naive if you believe Signals BS marketing.

I don't believe in marketing. I believe in open source code, security audits, and the entirety of the privacy and security community.

[-] poVoq@slrpnk.net 1 points 2 weeks ago

Look, if you run the server you have access to metadata of clients connecting to it. That is networking 101. And that Signal shares phone numbers and connection timestamps is well established by court documents.

The security audits are of the code and encryption algorithm, not the infrastructure.

[-] Ulrich@feddit.org 1 points 2 weeks ago

So you don't have any evidence.

And that Signal shares phone numbers and connection timestamps is well established by court documents

They do not share phone numbers. Phone numbers are the identifier, meaning if anyone wants the timestamps, they need to have it already.

The only timestamps shared are when they signed up and when they last connected. This is well established by court documents that Signal themselves share publicly.

[-] poVoq@slrpnk.net 1 points 2 weeks ago

I don't need evidence for water being wet 🤷

[-] Ulrich@feddit.org 1 points 2 weeks ago

I can observe that water is wet. I cannot observe that the NSA is collecting mountains of metadata from Signal servers.

[-] poVoq@slrpnk.net 1 points 2 weeks ago

You can observe that your Signal client connects to IPs that belong to AWS, which is the same thing.

this post was submitted on 19 Jul 2025
295 points (100.0% liked)

Technology

73567 readers
3104 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS