Even State Department-funded Human Rights Watch admits that authorities combine legal and illegal methods to obtain convictions: https://text.hrw.org/report/2018/01/09/dark-side/secret-origins-evidence-us-criminal-cases

Combining dragnet surveillance with device hacking is intended in the design of both tools. Hence, State Department-funded Signal dupes you into handing over your identity as part of the population-centric mapping. In custody, your phone will be hacked when it is taken away if it’s important.

https://xcancel.com/hannahcrileyy/status/2034273723667161480#m

  • Natanael@slrpnk.net
    link
    fedilink
    arrow-up
    16
    arrow-down
    3
    ·
    10 hours ago

    What evidence do you have that Signal collects anything? Traffic logs from the app or something?

    • wildbus8979@sh.itjust.works
      link
      fedilink
      arrow-up
      8
      arrow-down
      1
      ·
      10 hours ago

      Signal doesn’t need to, you need to trust the whole chain. You’ll need to trust AWS, you need to trust Intel SGX, etc

      • Natanael@slrpnk.net
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        7 hours ago

        At that point you can rely on nothing but Tor or I2P

        Nothing else hides metadata better than Signal, without involving large networks of independent nodes that participate in Sybil resistant routing. The only thing that gets close is threshold schemes where you still need multiple independent entities running servers.

    • akilou@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      arrow-down
      8
      ·
      10 hours ago

      You can check if a number is registered with Signal just by having Signal and starting a chat with that number