Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And those people assume their phone number will not be revealed to random contacts and their contacts! A phone number on its own is PII! It is in some contexts more dangerous than knowing your drivers license or social security number.

What utter deception! And why i distrust signal even more! The entire world uses whatsapp which has its own identifiers as do most messaging apps. Signal deviated and went out of its way to collect the one piece of information even more identifying than your full name and address! Lol



I don't know anybody who thinks this. If you use a standard population distribution: it's safe to assume a slight majority of Signal's user base remembers when phone numbers were publicly accessible through printed phone books. Contact sharing is a substantially less problematic subset of that.


But when you use any messaging app they show your nick (and signal lets you set your name), the natural assumption which I too had was that phone numbers are used for sms only to invite others but on singal my name/nick is used like whatsapp, viber,etc..

> Contact sharing is a substantially less problematic subset of that.

HN rate limits me so please look at other comments i made on this thread about why this is decidedly more dangerous than just about any insecurity you know about. Nothing is more dangerous than false security especially when most people don't think in detail about security, they just assume signal will take care of it. I have an example about sources being revealed when a journalist's phone is compromised (many more examples).

For the general population, are you saying man in the middle attacks are of a greater risk than the other person's phone being compromised? Because if so I would strongly disagree with that and can provide sources to back that up (but save me time and look into all the pegasus pwnages and mobile stealers). In which case, in the threat model that matters most to the general polulation, signal compromised by sharing the one piece of information that is so good at identifying people it is the most popular anti-fraud identifier: phone numbers!

My trust in it is even lesser by how everyone rallies in defense of signal and downvotes any critique of it like with this thread. Be wary of crap you're not allowed to question!


> the natural assumption which I too had was that phone numbers are used for sms only to invite others but on singal my name/nick is used like whatsapp, viber,etc..

I don't know about Viber, but this isn't true for WhatsApp. If someone sends you a message on WhatsApp, you can see their phone number.

Again: the overwhelming threat model is here is "two individuals that already know each other want to communicate privately." That's what Signal facilitates, and it does so pretty well given the purity compromises that need to happen to do that for non-technical users. They're not worried about leaking phone numbers, because they're already shared.

Finally: there's a good chance you being downvoted here because (1) these comments are indistinguishable from FUD, and (2) you're making claims (and now talking about examples) without citing them. I'll lead by example here: we know that the FBI can only retrieve minimal metadata from Signal[1], and various foreign intelligence services have more luck deploying malware to phones[2] than they do actually breaking anything about Signal's design. Nation state adversaries don't have trouble finding peoples' phone numbers.

[1]: https://therecord.media/fbi-document-shows-what-data-can-be-...

[2]: https://theintercept.com/2017/03/07/the-cia-didnt-break-sign...


> Again: the overwhelming threat model is here is "two individuals that already know each other want to communicate privately." That's what Signal facilitates, and it does so pretty well given the purity compromises that need to happen to do that for non-technical users. They're not worried about leaking phone numbers, because they're already shared.

Well there is no justification for that threat model beyond "our leader said so". Especially when they expressly fight state level censorship and interference but something as simple as someone shoulder surfing you defeats it. Threat models are for security professionals not regular people. Regular people don't model threat or assess securitu risk properly. They don't know encryption is useless if you don't authenticate. And signal's refusal to be independntly usable outside of smartphones given how much law enforcement and spies love to abuse mobile phone infrastructure leaves me to be very suspicious of their intent. Making phone numbers opt-out just makes you less discoverable at best. They have 50 million dollars and various projects no one asked for yet this is too difficult and complex? You still have't given me a reason to accept that beyond "trust me, i know".

> Finally: there's a good chance you being downvoted here because (1) these comments are indistinguishable from FUD, and (2) you're making claims (and now talking about examples) without citing them.

Disagreeing with you is FUD? What claims did i make that need citing? Please challenge me then?

For anyone who reada this thread, do you really want to use Signal given the hostility a person would get for questioning their terribly questionable choices?

> know that the FBI can only retrieve minimal metadata from Signal[1], and various foreign intelligence services have more luck deploying malware to phones[2] than they do actually breaking anything about Signal's design. Nation state adversaries don't have trouble finding peoples' phone numbers.

Do you freaking realize that you are making my point for me here? The problem is being able to connect signal messages with phone numbers. Of course they know everyone's phone numbers! But reporter A talking to source B is all they need to know because they can get access to either's phones! There are very few cases where a real life adversary cannot at some point access one party's phone over time.

If the only protection is against man in the middle attacks then signal is by far the weakest app in that category because wire, briar,etc.. i can just use them on any device.

I had advocated for signal for many years and have gotten burned by it more than any other messaging app. The worst security tools are the ones that lead you to trust them more than you should, the more cultishly supportive their supporters are the more wary of them you should be.

For the target audience of signal, imessage on an iphone is a better choice. For the real users of signals that need higher security wire and briar are better. Signal compromises on too much and then claims too much security guarantees.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: