Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Or, he took a barely niché messaging app plugin (OTR), improved it to provide forward secrecy for non-round trips, and deployed the current state-of-the art end-to-end encryption to over 3,000,000,000 users, as Signal isn't the only tool to use double-ratchet E2EE.

>broken SGX metadata protections

Citation needed. Also, SGX is just there to try to verify what the server is doing, including that the server isn't collecting metadata. The real talking is done by the responses to warrants https://signal.org/bigbrother/ where they've been able to hand over only two timestamps of when the user created their account and when they were last seen. If that's not good enough for you, you're better off using Tor-p2p messengers that don't have servers collecting your metadata at all, such as Cwtch or Quiet.

>weak supply chain integrity

You can download the app as an .apk from their website if you don't trust Google Play Store.

>a mandate everyone supply their phone numbers

That's how you combat spam. It sucks but there are very few options outside the corner of Zooko's triangle that has your username look like "4sci35xrhp2d45gbm3qpta7ogfedonuw2mucmc36jxemucd7fmgzj3ad".

>and agree to Apple or Google terms of service to use it?

Yeah that's what happens when you create a phone app for the masses.





Exactly. These arguments are so weak that they read more like a smear campaign than an actual technical discussion.

"You have to agree to Apple's terms to use it"? What's Signal meant to do, jailbreak your phone before installing itself on it?


Moxie Marlinspike sounds like some 90s intelligence guy’s understanding of what an appealing name to hacker groups would sound like. Put a guy like that as so-called creator of some encryption protocol for messaging and promote the app like it’s for secret conversations and you think people won’t be suspicious? It screams honeypot like nothing else.

He IS a hacker from the 90s. It’s an assumed name. Plenty of hackers from the 90s have pseudonyms.

> so-called creator of some encryption protocol

All evidence points to him being one of the protocol’s designers, along with Trevor Perrin.

I’ve met both of them. The first time I met Moxie and talked about axolotl (as it was called back then) was in 2014. Moxie and Trevor strike me as having more integrity and conviction than most. There is no doubt in my mind that they are real and genuine.

Interestingly enough, some of the work Trevor did related to Signal’s cryptography was later used by Jason Donenfeld in the design of WireGuard.

> It screams honeypot like nothing else.

As you can see there is plenty of evidence suggesting otherwise.


>Moxie Marlinspike sounds like some 90s intelligence guy’s understanding of what an appealing name to hacker groups would sound like. Put a guy like that as so-called creator of some encryption protocol for messaging and promote the app like it’s for secret conversations and you think people won’t be suspicious? It screams honeypot like nothing else.

This criticism has absolutely zero substance and honestly just reads like paranoid rambling. The Signal protocol has been independently formally analyzed [1] and has no known security issues.

[1] https://eprint.iacr.org/2016/1013


It's not about the protocol but other sides of the design. Example: https://news.ycombinator.com/item?id=38555810

The example you linked is about push notifications in general, nothing specific to the Signal app. If the concern is that your OS is compromised or spying on you, that's not something E2E encryption can protect against, whether it's Signal or any other app.

> nothing specific to the Signal app

The specific part is that Signal forces Google and Apple on its users, and forces the specific kind of push notifications, too.


Signal works fine on degoogled LineageOS, so I'm not sure that's true.

LineageOS is Google's Android. Try to run Signal on a Pinephone.

You can use linux clients just fine, like gurk, which I linked you in another comment.

AFAIK I must connect it to Android or iOS before I can use it.

I don't think so, you could use the official Linux build as far as I know. I think it needs a phone number but not necessarily a mobile device. I might be wrong though.

It required to scan the QR code from a "mobile" app last time I tried.

(You really have a lot of free time to write unsubstantiated dismissals to all my posts.)


> It required to scan the QR code from a "mobile" app last time I tried.

Are you against using an Android (or LineageOS) emulator to do so?

> (You really have a lot of free time to write unsubstantiated dismissals to all my posts.)

You pop up in a lot of threads I'm interested in and seem to say a lot of incorrect things, that's all.


> Are you against using an Android (or LineageOS) emulator to do so?

1. It's annoying and inconvenient.

2. It's the result of an artificial restriction by Moxie, for which I can't see any good reason, making me suspicious. In my opinion, this is basically an attack on true mobile freedom.

3. I do not believe in a good app isolation of Waydroid, so I would prefer to use as rare as possible. I also do not trust Android too much. And I will have to run two Signal apps simultaneously.


So the argument against Signal is now "the creator's nickname sounds odd"? I mean, OK? Keep using WhatsApp, Telegram or Instagram if you think those are more private than Signal.

It's totally comments of people using Telegram.

It's just people having zero product sense, or an idea of what it means to target more than 0.01% of the market. The last comment said that Signal's problem is that it's mobile-first, which, how does someone even think that a messaging app should be anything other than mobile-first?

Having Google and Apple apps is fine. Having that be the only option, and the recommended option for high risk use cases is unforgivable.

Those aren't the only two options. You can buy a non-Google Android phone and install the APK on it.

There are no fully open/auditable android phones. All of them have privileged binary blobs. An end to end chat service where there are no options permitting full accountability of the client software and operating system is largely security theater.

Even if you do all that, it is not an official option, let alone a recommended one. The recommendation is to accept the google or apple terms of service.

Moxie even went as far as to say he would actively do anything in his power to discourage or stop the use of third party clients.

Potentially targeted users are set up to fail.


How do I run Signal on my Librem 5?

Use something like gurk[0]

[0] https://github.com/boxdot/gurk-rs


You write an OS/2 emulator for it and use the OS/2 version of Signal, of course. How else?

Does anyone actually think that’s his real name?

I'm sure some people who don't realise it's a pseudonym do? Sounds like you're one of them.

Lol, why are you so mad? My while point is that he doesn’t reveal his actual name.

Oh man, I didn't think I'll actually see a reply with "u mad bro?" on this site. Anyway, good luck with your endeavors.

Hey, not my problem if you can’t take a few seconds to understand what people are writing.

How could I have failed to understand such clear writing, shame on me.

> You can download the app as an .apk from their website if you don't trust Google Play Store.

I wish apple & google provided a way to verify that an app was actually compiled from some specific git SHA. Right now applications can claim they're opensource, and claim that you can read the source code yourself. But there's no way to check that the authors haven't added any extra nasties into the code before building and submitting the APK / ios application bundle.

It would be pretty easy to do. Just have a build process at apple / google which you can point to a git repo, and let them build the application. Or - even easier - just have a way to see the application's signature in the app store. Then opensource app developers could compile their APK / ios app using github actions. And 3rd parties could check the SHA matches the app binaries in the store.


This is what F-droid does (well, I suspect most apps don't have reproducable builds that would allow 3rd-party verification), but Signal does not want 3rd-party builds of their client anyhow.

They could still figure out a way to attest their builds against source.

This is much harder when Signal actively goes against that.

>> and agree to Apple or Google terms of service to use it?

> Yeah that's what happens when you create a phone app for the masses.

No, that's what happens when you actively forbid alternative clients and servers, prevent (secure) alternative methods of delivery for your app and force people to rely on the American megacorps known for helping governmental spying on users, https://news.ycombinator.com/item?id=38555810


>over 3,000,000,000 users

Is that a typo or are you really implying half the human population use Signal?

Edit: I misread, you are counting almost every messaging app user.


Just WhatsApp. Moxie's ideas are used in plenty of other messengers. The context was "what Moxie did for the field of instant messaging".

Yeah, whatsapp uses the same protocol.

Well, we do not really have any idea what Whatsapp uses, because it is proprietary.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: