Does that mean that other apps like signal for example have back doors?

Do criminals have a knowledge of exploits in the recommended messaging apps?

  • WhatAmLemmy@lemmy.world
    link
    fedilink
    English
    arrow-up
    45
    arrow-down
    1
    ·
    edit-2
    20 days ago

    You’re missing the #1 reason organized criminals prefer their own service. To have trusted staff who control everything — the servers, code development & deployment — whom can’t be ordered by a court to shut off access to individuals at any time, or provide metadata, eavesdrop, etc.

    The weakest link with legal services like Signal is that they can be compelled by law enforcement, the judicial system, and government… That’s an enormous risk for any organized crime operation. Even a minimal amount of metadata collection can do a lot of damage, especially if it’s analyzed over months/years, and especially when performed by an advanced persistent threat actor like a nation state.

    • MTK@lemmy.world
      link
      fedilink
      arrow-up
      16
      arrow-down
      1
      ·
      20 days ago

      I disagree, stupid self developed systems leak so much more, I think the number 1 reason is, surprise surprise, stupid people.

      Also plenty of criminals and organized crime also use standard tools like telegram (which is way worse then signal)

      • refalo@programming.dev
        link
        fedilink
        arrow-up
        20
        ·
        20 days ago

        I think you’re both right. I think the non-stupid people with successful self-developed systems simply aren’t talked about, because they don’t get caught, because they’re not stupid.

      • RonSijm@programming.dev
        link
        fedilink
        arrow-up
        4
        ·
        19 days ago

        It probably depends on the level of the criminals and organized crime groups. I saw this Youtube video a couple weeks ago that talks about the history of how organized crime groups were using encrypted communication https://www.youtube.com/watch?v=gigIOc_0PKo (And how they were honey-potted by the FBI to use an FBI-hosted service, lol)

        Organized crime groups that make 100s of millions should be capable enough to hire skilled developers and sysops to host self-managed services. At some point if they make enough money, investing in self-managed communication becomes preferable over using telegram or signal.

        • MTK@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          19 days ago

          There are multi million companies that get hacked left and right, money does not mean intelligent security measures.

          Also, best option is the big ones, anyone who wants real security and privacy should use something that already exists. Sure, maybe not signal (even though for anything less then a state actor it is plenty) but there are plenty of self-hosted or decentralized communication apps out there.

          Anyone who builds their own app is very likely making a bad decision.

          Just a reminder that one of the most wanted man in the world by the most capable state in the world (Snowden) is using signal

    • Scoopta@programming.dev
      link
      fedilink
      arrow-up
      4
      arrow-down
      3
      ·
      20 days ago

      Theoretically signal only has your phone number and time of sign up which means theoretically it shouldn’t matter if the legal system asks them for information.

      • FizzyOrange@programming.dev
        link
        fedilink
        arrow-up
        9
        ·
        19 days ago

        … theoretically. In practice if the NSA used a secret court order that banned them from talking about it and made them update the app to reveal plaintext for one particular person, I don’t see how they could get out of that (other than by breaking the law and risking jail).

        I think the chances of that are very small though.

        • dustycups@aussie.zone
          link
          fedilink
          arrow-up
          6
          ·
          19 days ago

          There is legislation in Australia that allows precicely this. Then 5 eyes or Interpol or whatever for everyone else.

        • Scoopta@programming.dev
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          19 days ago

          …that’s a terrifying but also plausible prospect. Guess it’s a reason not to use the published app and instead build it yourself.

      • refalo@programming.dev
        link
        fedilink
        arrow-up
        9
        arrow-down
        1
        ·
        edit-2
        20 days ago

        Yea and if a nation-state knows your phone number, they can track your exact whereabouts in real-time. Let’s not pretend like we know better than them about what information matters :)

        • Scoopta@programming.dev
          link
          fedilink
          arrow-up
          2
          ·
          19 days ago

          …yeah and if they went to signal to ask about you they’re going to provide signal your phone number as it’s the only identifier they have in their system…so the nation state already had that to begin with, it isn’t sensitive info despite what it can be used for.

  • will_a113@lemmy.ml
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    2
    ·
    20 days ago

    The average criminal is no dumber or smarter than the average non-criminal. As such they’re every bit as subject to marketing ploys and mis/disinformation. so if their criminal buddies are using BaddieApp Pro, they probably will too. Or if they hear that Bill Gates is using the Signal app for mind control, there’s a good chance they’ll believe it.

  • Ephera@lemmy.ml
    link
    fedilink
    English
    arrow-up
    12
    ·
    19 days ago

    I’ve definitely also thought about, if our government gets taken over by fascists, how do you organize a rebellion?

    And yeah, Signal definitely has some weird fucking shit going on. As far as I’m aware, they don’t allow you to use their centralized servers, if you don’t use their provided build of the app. They don’t seem to have a mechanism to enforce that, so you could still use a self-compiled build, but if all your friends are on a compromised client, you can’t talk to anyone anyways.

    Well, and then there’s also the great stupidity that Signal requires a phone number. In my country, you can’t sign up to a mobile phone plan without revealing your full identity. If the fascist government realizes that I’m part of the rebellion, they can make my phone number disappear in unfortunate circumstances.

    So, yeah, I’d at least want to self-host the communication platform. I’d probably use an existing open-source solution, but would try to audit at least part of it…

      • Ephera@lemmy.ml
        link
        fedilink
        English
        arrow-up
        7
        ·
        19 days ago

        I thought I heard so, too, but when I tried to research it, all that came up is that you can publicly hide your phone number and instead give people your username, but you still need the phone number for sign-up. I really do not know, though, if search engines are failing me again…

        • Cheradenine@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          5
          ·
          19 days ago

          That’s correct, you still need a phone number for sign up. between contacts you can use usernames.

          So Signal has your phone number, your contacts only have it if you use your number instead ofgiving them a username.

    • Mikina@programming.dev
      link
      fedilink
      arrow-up
      2
      ·
      19 days ago

      I think that simply knowing about PGP and using it with traditional platforms will go a long way. If you add some steganography to the mix, it can go a long way.

  • Treczoks@lemmy.world
    link
    fedilink
    arrow-up
    11
    ·
    19 days ago

    Lets put it this way: There are criminals that use whatsup, twitter, and the like for communication. They don’t really last for some reason. Then there are those who use a special, commercial system. They might fail if they fall for traps like EncroChat (or however that was spelled). Then there are those who try to set up their own system, but lack the capabilities and talent for that. And last but not least are those groups you have not heard from in the news. They do have proper infosec.

      • Treczoks@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        18 days ago

        Another way to stay under the radar. IIRC there was a case where information was passed on an image board by means of using random-looking filenames that actually encoded messages.

    • nous@programming.dev
      link
      fedilink
      English
      arrow-up
      8
      ·
      20 days ago

      Your average criminal is not making their own and have to trust some third party regardless. Law enforcement agencies have been known to have wide spread honey pot secure messaging apps before.

    • rtxn@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      20 days ago

      All they really need is a program that turns cleartext into ciphertext and back, an open communication channel to transmit ciphertext, a secure way to exchange keys, and good operational security. There are plenty of cybersecurity experts with good skills and flexible morals, except NK and Russia probably pay better than the local meth lord.

  • Zorsith@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    5
    ·
    20 days ago

    Because they’re not stupid and understand that government agencies could have a finger in the pie for any publicly available software in some way/shape/form? Paranoia keeps them in business longer.