Meredith Whittaker, the president of the Signal Foundation, the organization that maintains the Signal messaging app, spoke about the U.K.'s controversial new privacy bill at TC Disrupt 2023.
Meredith Whittaker reaffirms that Signal would leave UK if forced by privacy bill::Meredith Whittaker, the president of the Signal Foundation, the organization that maintains the Signal messaging app, spoke about the U.K.'s controversial new privacy bill at TC Disrupt 2023.
What are the governments around the world afraid of? Always so quick to go for overly invasive privacy laws. They should be afraid of the citizens, not the other war around.
The fact that they store encryption keys on their servers in the cloud, relying on SGX lock boxes to prevent trivial exploitation of those keys.
In information security, as with intelligence work, it's about capabilities not intent.
Signal has the capability, to brute force the SGX enclosures, or even use trivial code signed by Intel to simply export the keys from SGX enclosures, which means all of the encryption keys stored in signals cloud, which is all of them, could be compromised. That is a capability they have.
SGX has had multiple exploits, especially side channel attacks through timing, and other metadata in the CPU. Intel is a US corporation, and their subject to national security letters, so they could be compelled to release their SGX signing keys..
All the Lego pieces are there for signal to have a back door. It's about capabilities. I'm not saying they have a back door, but the pieces are there for one.
If you recall a few years ago, there's a big hullabaloo about signal storing encryption keys in the cloud behind four digit pins.. this is why people are so angry about it. It means we have to trust the central servers, which is antithetical to the capability model that we talked about.
That being said we are reasonably sure the signal client code is secure. So if you disable pin codes and signal, your encryption key is still sent to signal cloud, but it is signed with a cryptographically secure 128-bit something code. So that's fine. But if everybody you're talking to hasn't disabled the pin, then the other side of your conversation is still exploitable.
TLDR: signals great if your threat model does not include five eyes intelligence services, and if your threat model does include five eyes intelligence services you should use something else. Not by intent, but by capabilities.
The Online Safety Bill, which was passed into law in September, includes a clause — clause 122 — that, depending on how it’s interpreted, could allow the U.K.’s communications regulator, Ofcom, to break the encryption of apps and services under the guise of making sure illegal material such as child sexual exploitation and abuse content is removed.
Whittaker didn’t mince words in airing her fears about the Online Safety Bill’s implications.
“We’re really worried about people in the U.K. who would live under a surveillance regime like the one that seems to be teased by the Home Office and others in the U.K.”
Whittaker noted that Signal takes a number of steps to ensure its users remain anonymous regardless of the laws and regulations in their particular country.
Asked onstage what data Signal’s handed over in the instances that it’s received search warrants, Whittaker said that it’s been limited to the phone number registered to a Signal account and the last time a user accessed their account.
She pointed to reasons for optimism, like Meta planning to roll out end-to-end encryption on Facebook Messenger and Instagram in spite of the U.K.’s Online Safety Bill.
The original article contains 506 words, the summary contains 194 words. Saved 62%. I'm a bot and I'm open source!
My one wonder is, what would banks use to securely provide access to their customers online? What about online stores for local small, medium, and large businesses? Or is this going to knly target messaging and social networks?
Given that the UK's tech industry is strongly tied to Fintech, and without it utterly crumbles into becoming cheap support for the US, I hope there is some serious clapback from the likes of Monzo, Starling, and co.
I was kind of worried that India did not ban signal when they banned all the end-to-end encrypted chat applications.
If the UK follow the same path, namely signal is exempted, that would be a strong indication that signal is compromised at the nation state level at the very least.
Update: what's with all the down votes? I'm a signal cheerleader, this is a test of signal, we'll see how they react, how the ecosystem reacts. It's curious. We should pay attention. That's all I'm saying
I don't recall. I just know India did not ban signal. But they banned all the other end and encrypted apps I use. So it's very curious.
One of my colleagues said, and a very reasonable and intelligent colleague at that, if you were going to design a global intelligence honey pot for encrypted messaging, signals how you would do it.
I'm not saying they are, but they have the capability to, structurally their ideal for honeypot. The fact that India didn't ban them, that's a data point....
I still use signal, on the balance of probabilities it's still the best platform for a general end to end encryption, but nothing is forever so I keep my options open
There’s a difference between the spooks being able to read everyone’s messages and the ordinary police being able to do so. Assuming that Five Eyes or similar have a secret way of decrypting Signal messages, it won’t remain a secret if every drug dealer who uses Signal is swiftly arrested. (Even with the trick of parallel construction, postal inspectors magically getting lucky every time someone uses Signal would get suspicious pretty quickly.) If the spooks can read your Signal messages, they are compelled to ration that capability rather than burning it.
Agreed 100%. So I think signal matches most people's threat models, so it's still great to recommend to people.
If you were running some countries internal messaging service for diplomats. You might use signal, but you'd have to mirror the infrastructure to completely host it. And then probably add your own ciphers on top.
It doesn't necessarily mean that. It could also be that they attempt to block the rise of new platforms, and by doing so limiting the amount of platforms that they have to compromise.