• I Cast Fist
        link
        fedilink
        English
        42 days ago

        Packet data has headers that can identify where it’s coming from and where it’s going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal’s servers use (which is public information), it’s trivial to know when a device is sending/receiving messages with Signal.

        This is also why something like Tor manages to circumvent packet sniffing, it’s impossible to know the actual destination because that’s part of the encrypted payload that a different node will decrypt and forward.

        • Ulrich
          link
          fedilink
          English
          0
          edit-2
          1 day ago

          Packet data has headers that can identify where it’s coming from and where it’s going to

          Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

          This is also why something like Tor manages to circumvent packet sniffing

          TOR is what their already-existing tip tool uses.

          • @Cenzorrll@lemmy.world
            link
            fedilink
            English
            21 day ago

            Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

            You mean like your workplace wifi that you’re blowing the whistle at?

            • Ulrich
              link
              fedilink
              English
              11 day ago

              Does it matter? How would you get access to such information?

              • @papertowels@mander.xyz
                link
                fedilink
                English
                1
                edit-2
                1 day ago

                If the header isn’t encrypted it’d be easy to inspect, and thus easy to determine where it goes, which is why it matters.

                Based on your questions, it sounds like you’re expecting the network traffic itself to be encrypted, as if there were a VPN. Does signal offer such a feature? My understanding is that the messages themselves are encrypted, but the traffic isn’t, but I could be wrong.

                • Ulrich
                  link
                  fedilink
                  English
                  01 day ago

                  If the header isn’t encrypted it’d be easy to inspect

                  Easy for whom? How are you getting access to the traffic info?

                  • @papertowels@mander.xyz
                    link
                    fedilink
                    English
                    11 day ago

                    You’re talking about encryption and signal because you’re worried about folks whose network you’re connected to being able to invade your privacy, right?

                    I’d say it’s a pretty reasonable suggestion to say we start with those guys. If you don’t worry about those guys, who do have access to traffic info, then why bother with encryption?

          • I Cast Fist
            link
            fedilink
            English
            1
            edit-2
            1 day ago

            Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?

            That, or a court order telling your ISP or mobile operator to allow the sniffing. Or just the police wanting to snoop your stuff because they can. Not every country cares about individual or human rights, you know

            TOR is what their already-existing tip tool uses.

            Yes, but tor can be blocked at a firewall level, its packets are easy to identify. “Nations like China, Iran, Belarus, North Korea, and Russia have implemented measures to block or penalize Tor usage”

      • Natanael
        link
        fedilink
        English
        32 days ago

        I run a cryptography forum

        Encryption doesn’t hide data sizes unless you take extra steps

      • @papertowels@mander.xyz
        link
        fedilink
        English
        3
        edit-2
        2 days ago

        How exactly do you think encryption prevents the analysis of seeing when an encrypted message is sent? It feels like you’re trying to hand-waive away by saying “encryption means you’re good!”

        Cyber security is not my thing, but my understanding is that you’d still see network traffic - you just wouldn’t know what it says.