• Ulrich
    link
    fedilink
    English
    -12 days ago

    analysing network traffic wouldn’t allow an adversary to see what you’re sending with Signal

    How are they analyzing network traffic with Signal? It’s encrypted. And why does it matter if they know you’re sending a message? Literally everyone using Signal is sending a message.

    • @papertowels@mander.xyz
      link
      fedilink
      English
      6
      edit-2
      2 days ago

      How are they analyzing network traffic with Signal? It’s encrypted

      Not my specialty, but signals end to end encryption is akin to sealing a letter. Nobody but the sender and the recipient can open that letter.

      But you still gotta send it through the mail. That’s the network traffic analysis that can be used.

      Here’s an example of why that could be bad.

          • Ulrich
            link
            fedilink
            English
            -132 days ago

            Or it’s just a perfectly normal thing that billions of people do every day?

            • MynameisAllen
              link
              fedilink
              English
              82 days ago

              Except that signal is blocked by many companies Mobile Device Management. The one that don’t can typically see who has the app installed. This provides a new clever way to maybe whistleblow

              • Ulrich
                link
                fedilink
                English
                -1
                edit-2
                2 days ago

                Use a different device? Use Molly? Use any number of other apps? What’s to stop the MDM from blocking The Guardian app?

          • Phoenixz
            link
            fedilink
            English
            31 day ago

            Then you’re a terrorist if you use the internet, period

            Nearly all internet traffic if encrypted, and for plain browser traffic it’s probably in the 95+%

            You access your bank? Terrorist! Email? Terrorist! Lemmy? Terrorist!

            • @Diurnambule@jlai.lu
              link
              fedilink
              English
              11 day ago

              I dunno, I am not the French state. I can only see that they think the usage of signal is making you a terrorist.

          • Ulrich
            link
            fedilink
            English
            01 day ago

            Then you’re also a terrorist if you use The Guardian 🤷‍♂️

            • @Diurnambule@jlai.lu
              link
              fedilink
              English
              2
              edit-2
              1 day ago

              I dont’ know, do you have sources about this ? Or are you imagining thing and deciding it is true ?

              • Ulrich
                link
                fedilink
                English
                01 day ago

                Sources for what, exactly? What is “fantasming”? The title of the article you posted is “Criminalization of encryption”. The Guardian is using encryption to send messages, so why would they be exempt? In fact, why would any internet use at all not be criminalized? It’s all encrypted.

                • @Diurnambule@jlai.lu
                  link
                  fedilink
                  English
                  2
                  edit-2
                  1 day ago

                  So you read the title and you know everything. There is a liste of what they are accusing and their is no mention of internet

                  The elements of the investigation that have been communicated to us are staggering. Here are just some of the practices that are being misused as evidence of terrorist behavior6:

                  – the use of applications such as Signal, WhatsApp, Wire, Silence or ProtonMail to encrypt communications ;

                  – using Internet privacy tools such as VPN, Tor or Tails7 ;

                  – protecting ourselves against the exploitation of our personal data by GAFAM via services such as /e/OS, LineageOS, F-Droid ;

                  – encrypting digital media;

                  – organizing and participating in digital hygiene training sessions;

                  – simple possession of technical documentation.

                  But continue to invent reality. What are fact if not debatable point of view ? That the end for me. Have a great day.

                  • Ulrich
                    link
                    fedilink
                    English
                    01 day ago

                    I don’t know everything. Just because it’s not explicitly listed today doesn’t mean it won’t be tomorrow. This was just created yesterday. And it does the same thing that all of those listed apps do: facilitates private communication.

    • Natanael
      link
      fedilink
      English
      72 days ago

      Timing of messages. They can’t tell what you send, but can tell when

      • Ulrich
        link
        fedilink
        English
        -24
        edit-2
        2 days ago

        No they can’t.

        E: if someone wants to provide evidence to the contrary instead of just downvoting and moving on, please, go ahead.

        • @papertowels@mander.xyz
          link
          fedilink
          English
          11 day ago

          Here’s a relevant stack exchange question. Regarding what an ISP can learn. Of note, everybody is ceding that the ISP can tell you’re using signal, and they’ve moved on to whether or not they’d be able to fingerprint your usage patterns.

            • I Cast Fist
              link
              fedilink
              English
              42 days ago

              Packet data has headers that can identify where it’s coming from and where it’s going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal’s servers use (which is public information), it’s trivial to know when a device is sending/receiving messages with Signal.

              This is also why something like Tor manages to circumvent packet sniffing, it’s impossible to know the actual destination because that’s part of the encrypted payload that a different node will decrypt and forward.

              • Ulrich
                link
                fedilink
                English
                0
                edit-2
                1 day ago

                Packet data has headers that can identify where it’s coming from and where it’s going to

                Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

                This is also why something like Tor manages to circumvent packet sniffing

                TOR is what their already-existing tip tool uses.

            • @papertowels@mander.xyz
              link
              fedilink
              English
              3
              edit-2
              2 days ago

              How exactly do you think encryption prevents the analysis of seeing when an encrypted message is sent? It feels like you’re trying to hand-waive away by saying “encryption means you’re good!”

              Cyber security is not my thing, but my understanding is that you’d still see network traffic - you just wouldn’t know what it says.

            • Natanael
              link
              fedilink
              English
              32 days ago

              I run a cryptography forum

              Encryption doesn’t hide data sizes unless you take extra steps