938
submitted 1 year ago by tree@lemmy.zip to c/technology@lemmy.world

Signal’s president reveals the cost of running the privacy-preserving platform—not just to drum up donations, but to call out the for-profit surveillance business models it competes against.

The encrypted messaging and calling app Signal has become a one-of-a-kind phenomenon in the tech world: It has grown from the preferred encrypted messenger for the paranoid privacy elite into a legitimately mainstream service with hundreds of millions of installs worldwide. And it has done this entirely as a nonprofit effort, with no venture capital or monetization model, all while holding its own against the best-funded Silicon Valley competitors in the world, like WhatsApp, Facebook Messenger, Gmail, and iMessage.

Today, Signal is revealing something about what it takes to pull that off—and it’s not cheap. For the first time, the Signal Foundation that runs the app has published a full breakdown of Signal’s operating costs: around $40 million this year, projected to hit $50 million by 2025.

Signal’s president, Meredith Whittaker, says her decision to publish the detailed cost numbers in a blog post for the first time—going well beyond the IRS disclosures legally required of nonprofits—was more than just as a frank appeal for year-end donations. By revealing the price of operating a modern communications service, she says, she wanted to call attention to how competitors pay these same expenses: either by profiting directly from monetizing users’ data or, she argues, by locking users into networks that very often operate with that same corporate surveillance business model.

“By being honest about these costs ourselves, we believe that helps provide a view of the engine of the tech industry, the surveillance business model, that is not always apparent to people,” Whittaker tells WIRED. Running a service like Signal—or WhatsApp or Gmail or Telegram—is, she says, “surprisingly expensive. You may not know that, and there’s a good reason you don’t know that, and it’s because it’s not something that companies who pay those expenses via surveillance want you to know.”

Signal pays $14 million a year in infrastructure costs, for instance, including the price of servers, bandwidth, and storage. It uses about 20 petabytes per year of bandwidth, or 20 million gigabytes, to enable voice and video calling alone, which comes to $1.7 million a year. The biggest chunk of those infrastructure costs, fully $6 million annually, goes to telecom firms to pay for the SMS text messages Signal uses to send registration codes to verify new Signal accounts’ phone numbers. That cost has gone up, Signal says, as telecom firms charge more for those text messages in an effort to offset the shrinking use of SMS in favor of cheaper services like Signal and WhatsApp worldwide.

Another $19 million a year or so out of Signal’s budget pays for its staff. Signal now employs about 50 people, a far larger team than a few years ago. In 2016, Signal had just three full-time employees working in a single room in a coworking space in San Francisco. “People didn’t take vacations,” Whittaker says. “People didn’t get on planes because they didn’t want to be offline if there was an outage or something.” While that skeleton-crew era is over—Whittaker says it wasn’t sustainable for those few overworked staffers—she argues that a team of 50 people is still a tiny number compared to services with similar-sized user bases, which often have thousands of employees.

read more: https://www.wired.com/story/signal-operating-costs/

archive link: https://archive.ph/O5rzD

you are viewing a single comment's thread
view the rest of the comments
[-] Chobbes@lemmy.world 171 points 1 year ago

There’s something kind of funny about one of the largest expenses being SMS and voice calls to verify phone numbers when one of the largest complaints about signal is the phone number requirement. I wonder how much this cost factors into them considering dropping the phone number requirement.

[-] topinambour_rex@lemmy.world 115 points 1 year ago

If they drop the phone number requirements, you will get spam, a lot of spam. Much more than now.

[-] WallEx@feddit.de 15 points 1 year ago

Because there are no other possible verifications apart from phone numbers? Do you open a bank account with your phone number, because it's the only way?

[-] tja@sh.itjust.works 73 points 1 year ago

What would you think would be an appropriate alternative to easily verify chat accounts that's cheaper than validating phone numbers?

[-] WallEx@feddit.de 7 points 1 year ago

Video call, email, other verificated factors.

So do you think this is the only option available?

[-] Dark_Arc@social.packetloss.gg 57 points 1 year ago* (last edited 1 year ago)

You think a verification via a video call is cheaper than SMS...?

That's not to mention the potential concerns that would arise around the possibility of signal storing (some portion of) the video...

[-] WallEx@feddit.de 3 points 1 year ago

Nope, just saying phone numbers are far from the only option. And if telcos are price gauging you should look at the alternatives.

[-] Gutless2615@ttrpg.network 34 points 1 year ago

No you’ve complained and insinuated there are plenty of other solutions that the world class team at Signal, literally the preminent experts in their field, chose not to use - and then offered to some truly next level terrible options.

[-] WallEx@feddit.de 2 points 1 year ago

Complained? I've merely stated a fact. And you think I'm offended? I'm trying to have a discussion you are not interested in it seems.

How are the other options terrible? Please elaborate. That way you might actually contribute and not just call names.

[-] Dark_Arc@social.packetloss.gg 9 points 1 year ago

Nope, just saying phone numbers are far from the only option.

What would you think would be an appropriate alternative to easily verify chat accounts that's cheaper than validating phone numbers?

It's the cheaper portion that's the issue. There are "other options", but they're not cheaper and/or they have their own issues.

I didn't touch the email case because email addresses can be so rapidly created (even out of thin air via a catch all style inbox) there's nothing to it.

load more comments (1 replies)
[-] PlexSheep@feddit.de 28 points 1 year ago

Video call is expensive, and frankly, if I'm gonna sign up at a private service, I'm not going to make a damn video call.

Email is not enough to go against spam. Email addresses are basically an Infinite Ressource.

Other verified factors are nothing concrete. Sure we could all use security hardware keys, but what's the chances that my mom has one?

[-] WallEx@feddit.de 4 points 1 year ago

So you do think that phone numbers are the only way to verify the person? This is just stupid. There are enough, like IDs or stuff like that. If you don't want that, that's a totally different story.

[-] PlexSheep@feddit.de 3 points 1 year ago

It's a bad problem no? Combatting "spam" Accounts while balancing privacy.

Personally, I don't want to give them any more information than is really necessary.

load more comments (1 replies)
[-] uis@lemmy.world 1 points 1 year ago

Other verified factors are nothing concrete. Sure we could all use security hardware keys, but what's the chances that my mom has one?

PKI doesn't require hardware keys

[-] PlexSheep@feddit.de 2 points 1 year ago

True, but it's not exactly User friendly too, right? If not, tell me. I'll be happy.

[-] uis@lemmy.world 1 points 1 year ago* (last edited 1 year ago)

If you want user-friendly WebAuthn - firefox does it for you. If you want pgp/gpg, then just install pgp/gpg client of your choice.

If you want encrypt emails, Thunderbird should have built-in encryption support.

[-] PlexSheep@feddit.de 1 points 1 year ago

I'm using all of these, but with my hardware keys. Didn't know you could do it without. I knew that it was part of the webauthn concept but no idea how it works.

[-] wmassingham@lemmy.world 4 points 1 year ago

Captchas or other challenges, and better spambot detection.

[-] alignedchaos@sh.itjust.works 11 points 1 year ago

Those are already in place. They don’t suffice.

[-] devfuuu@lemmy.world 3 points 1 year ago

I'd be ok with a credit card verification or so something like that, even if still uncomfortable for me, but I hear it reduces a lot of spam.

But then that would make people confused and make them run away when the app seems to be free and now is asking for a credit card validation... it's too strange.

Anyway I never got a single spam message on signal from all the years I use it, so not sure how others view the problem or even if it is a problem.

[-] iopq@lemmy.world 2 points 1 year ago

Use a 3d face scan, but only send the hash over the net. Can double for account recovery (when user has no email or something)

[-] PlexSheep@feddit.de 34 points 1 year ago

That's a joke right?

If not: It does not matter what hash I send, because it's cryptographically impossible to tell what the hashed thing is. That is the whole point of a hash.

Also: sending a hash over the network instead of a password or whatever the source material is would be a bad practice from security perspective, if not a directly exploitable vulnerability. It would mean that anyone that knows the hash can pretend to be you, because the hash would be used to authenticate and not whatever the source material is. The hash would become the real password and the source material nothing more than a mnemonic for the user. Adding to that: the server storing the hash would store a plaintext password.

See: https://security.stackexchange.com/questions/8596/https-security-should-password-be-hashed-server-side-or-client-side

[-] uis@lemmy.world 2 points 1 year ago

It would mean that anyone that knows the hash can pretend to be you, because the hash would be used to authenticate and not whatever the source material is.

Guess what happens to passwords themselves? Same thing, but user can't just add nonce. Replay attacks are super easy to mitigate and hashing makes it easier.

Not saying that biometry authentication isn't shit for security itself.

[-] PlexSheep@feddit.de 4 points 1 year ago

Honestly, I'm not sure what you are talking about. Could you elaborate more?

Are you implying that sending some hash is better than sending the secret and let the server deal with it?

[-] uis@lemmy.world 2 points 1 year ago

It took a long time to reply to you, sorry.

When used for login, it prevents MITM attacker(assuming you are not using app sent to you by attacker) from stealing your password(because hash functions are extremely hard to reverse), while when used both for registration and login, your password doesn't even leave your computer. There are even password managers that don't store any passwords, but just generate them by hashing your secret with server name.

[-] PlexSheep@feddit.de 2 points 1 year ago

How does this prevent MITM attacks? The secret you send to the server, be it called hash or password, is what's used to authenticate the user. For the purpose of client/server communication, this "password" on your host only is not relevant, as it's only used to generate the real secret.

A hypothetical MITM attacker would still gain access to that secret, without needing to care how it was generated, be it by hashing something on your host or by coming up with semi random letters yourself.

The secret sent to the server becomes the defacto password.

Now about those password managers, they are a thing but I don't have experience using them. Through a disadvantage is that if a site gets breached you have to do something weird with your password manager, so that a different password is produced with your secret key and the domain name. This can be done with a counter that needs to be manually adjusted, but that's weird from a usability point of view.

[-] uis@lemmy.world 2 points 1 year ago

How does this prevent MITM attacks? The secret you send to the server, be it called hash or password, is what's used to authenticate the user.

Maybe I phrased incorrectly. It prevents attacker from getting password and using it again in future.

For the purpose of client/server communication, this "password" on your host only is not relevant, as it's only used to generate the real secret.

Salted hash if not implemented with possible MITM attacks in mind indeed can be used by attacker. Resisting them is easy and can be done by channel binding techniques like using channel public key as part of salt. In such case if attacker successfully will make MITM attack, server will just reject hash, because it is not equal with expected one.

The secret sent to the server becomes the defacto password.

Passwords are secrets. Secrets aren't passwords.

but that's weird from a usability point of view.

HOTP exists. HOTP is used.

load more comments (4 replies)
load more comments (5 replies)
[-] scorpionix@feddit.de 14 points 1 year ago

Where would one get a 3d face scan from? For my part, I don't have a scanning rig set up anywhere.

[-] iopq@lemmy.world 1 points 1 year ago

You turn your face in different angles, creating a 3d scan of your face using your phone camera

[-] topinambour_rex@lemmy.world 3 points 1 year ago

I open a bank account with a copy of my id, a copy of a bill to my adress, and some money. My phone number can be used along the process, like for a digital signature.

[-] preasket@lemy.lol 15 points 1 year ago

Make phone numbers optional and add a setting to allow/forbid accounts with no phone number to message you. I bet phone numbers have zero effect on the level of spam.

[-] sndrtj@feddit.nl 29 points 1 year ago

Interestingly this phone number complaint only shows up among techies and especially Americans. You guys don't get to keep your phone number? I've had the same number now for 20 years here in Europe, it may as well be synonymous with my identity.

In fact, I'd say the phone number requirement, or at least option, actually promotes adoption in parts of the world. I wouldn't have been able to get my mother to use Signal if it didn't work with a phone number, for instance. She's not gonna make an account just for a chat app. Phone number she already has.

[-] devfuuu@lemmy.world 39 points 1 year ago

Exactly because I have the same phone number for almost 30 years, that is the problem. It's too deep interlaced with my real and personal identity and I regard it as a very private thing that only few people should have.

I don't get the idea that a phone number should just be randomly given as if it was natural.

It's good to have it as an option for example so my mother can use it simply and quickly, but when I go to a conference and want to connect to new people which are still strangers and will and don't give my phone number. So in those situations I have to randomly use other chat system or share emails? When signal already is in my pocket and my main chat application 99% of the time and is perfect for 1 to 1 friendly chats?

[-] shortwavesurfer@monero.town 29 points 1 year ago

It's actually a privacy issue because your phone number is tied to your physical identity so deeply that giving it out is giving too much away.

[-] neonred@lemmy.world 26 points 1 year ago

because people might feel uncomfortable sending unnecessary personal information to another party, especially if it does not change often, like the telephone number?

[-] Kusimulkku@lemm.ee 4 points 1 year ago

I'm mostly contacting people I already know so using phone number (something I already have a collection of) is very handy to me

[-] Sphks@lemmy.dbzer0.com 8 points 1 year ago

My kids don't have a phone number and I would be glad we could use Signal.

[-] sederx@programming.dev 5 points 1 year ago

should be optional.

[-] Poutinetown@lemmy.ca 25 points 1 year ago

Phone numbers will still be required to sign up, you only won't need it to add a contact.

[-] Chobbes@lemmy.world 12 points 1 year ago
[-] bobs_monkey@lemm.ee 19 points 1 year ago

Probably helps cut down on spam and bot accounts

this post was submitted on 17 Nov 2023
938 points (100.0% liked)

Technology

61024 readers
4033 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS