Skip to main content


After the article from The Atlantic, I've seen a lot of misinformation circulating among journalists. I'm not getting into the political side of things, but many are focusing on the fact that Signal was used, claiming it's "not encrypted" or "not secure." This really saddens me because it spreads the wrong message.

#Signal #Privacy #Security #Encryption #Misinformation #TechNews #Journalism

in reply to Stefano Marinelli

it’s “not secure (enough for the USG to share classified information)”
in reply to Michael Stanclift

@vmstan sure. But when I see journalists claiming it's not encrypted or generally insecure, I'm afraid that people could consider WhatsApp or Telegram more secure. And I'm not a fan of centralized solutions
in reply to Stefano Marinelli

There's also so much misunderstanding that "Signal is not approved for this usage" as meaning that "Signal should not be used for anything".
in reply to mkj

@mkj exactly. That's my point. My car isn't secure on the sea, but this doesn't mean it's insecure on the road.
@mkj
in reply to Stefano Marinelli

i feel like a secure messaging system would include some sort of verification of the recipient(s), so even if the reporting is a bit off, it's not an entirely invalid point to raise about Signal. at least this might encourage people to think about the fact that "end-to-end encrypted" doesn't mean “secure”.

but, Signal isn't intended to be that sort of secure messaging system in the first place, so ultimately it's still user error.

in reply to Stefano Marinelli

At least we all know that it is encrypted and that it is secure. In this case there was just a person too dumb to use the group chat function correctly and invited a journalist to the group chat.
in reply to Stefano Marinelli

People just don't understand what Signal is designed to protect, and it's not yourself from your own incompetence.

Stefano Marinelli reshared this.

in reply to New Phone Houthis 👊🇺🇸🔥

@Avitus Exactly. I think I saw someone years ago phrasing it as "you might be having a secure conversation with the devil". An apt analogy.

End to end encryption is great, but you also need to have *some* idea of what the ends are, and what they can and should be trusted with.

@stefano

in reply to mkj

@mkj @Avitus I’m sure there are other variations, but this is the one from Scott Hanselman (Microsoft); applies just as well to Signal and E2EE, and whether one of your endpoints is who you think it is, or compromised.
in reply to Stefano Marinelli

@Stefano Marinelli It's annoying because people are, as usual, conflating "secure" and "authorized channels" and "secure" and "encrypted".

InfoSec fails by flattening security to an on/off state because boardrooms treat us like that. Fuck.

in reply to Stefano Marinelli

I think this article described it best.

404media.co/when-your-threat-m…

No phone, no app, no encryption can protect you from yourself if you send the information you’re trying to hide directly to someone you don’t want to have it.



When Your Threat Model Is Being a Moron


One of the most basic tenets of cybersecurity is that you must “consider your threat model” when trying to keep your data and your communications safe, and then take appropriate steps to protect yourself.

This means you need to consider who you are, what you are talking about, and who may want to know that information (potential adversaries) for any given account, conversation, etc. The precautions you want to take to protect yourself if you are a random person messaging your partner about what you want to eat for dinner may be different than those you’d want to take, if, hypothetically, you are the Secretary of Defense of the United States or a National Security Advisor talking to top administration officials about your plans for bombing an apartment building in Yemen.

Things you might consider when doing any sort of communication, if you are thinking about your threat model, would be “what messaging app should I use?”, “Is it end-to-end-encrypted?”, “What device should I use to send the message,” “Do I have two-factor authentication on?”, “What type of two-factor authentication is it (app or SMS based? Hardware based?),” and, crucially, “How widely do I want to share this information?” End-to-end encryption means that a message is encrypted on the device itself before being sent; this means that it is then decrypted at the “endpoint,” meaning that only the intended recipient should be able to read it.

This is all, of course, a very long way of saying that there is no messaging app that can protect you if you are wildly careless, or more generally an idiot. There is no threat modeling that can account for you sending information directly to someone who you do not want to have it, which is exactly what Pete Hegseth, national security advisor Michael Waltz, vice president JD Vance, director of national intelligence Tulsi Gabbard, and a host of other top administration officials did when texting about their plans to bomb a suspected terrorist’s girlfriend’s apartment building in Yemen.

As Joseph has laid out here, there are design changes that Signal could make that would make it less likely for someone to accidentally message the wrong person or accidentally add them to the wrong group chat. At the moment, it can be difficult to know who someone is after you’ve added them to your contacts, because Signal doesn’t force you to select a profile picture or set nicknames for contacts, and, you can’t always see a person’s username or phone number after you’ve begun chatting with them on Signal.

THAT SAID, top officials in the executive branch should not be using Signal to communicate about military actions at all because the threat model for this sort of communication is so extraordinary and unique (and bound by retention laws) that they should be communicating on existing government channels designed for this exact purpose and which don’t have disappearing message functionality. And even if Signal’s UI could be slightly better or less confusing, if you are sharing bombing plans then you should probably take extra steps to make sure “We are currently clean on OPSEC” is actually true.

Since the first Atlantic story broke, people in my life have asked me if Signal is secure. Of the commercially available, widely-used messaging apps, Signal has extremely good security. But using Signal on whatever device the officials happened to be using makes those devices a target, and sophisticated nation state actors capable of hacking iPhones and other new smartphones are definitely in Pete Hegseth’s and Michael Waltz’s threat model. The truth of the matter is that no phone, no app, no encryption can protect you from yourself if you send the information you’re trying to hide directly to someone you don’t want to have it.


This entry was edited (3 days ago)
in reply to Stefano Marinelli

the key (non-legal) point is the use of personal phones (easily compromised in comparison) for discussing what should have been in person in a SCIF. Legally these people should lose their positions and face prison time like any other NSA or CIA staffer would have by now.
in reply to dch

@dch Don't forget where they're heading ... "I could stand in the middle of Fifth Avenue and shoot somebody, and I wouldn't lose any voters, OK?"
@stefano