Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But not Signal, for example. Well, they do: but they have nothing to share. Telegram on the contrary have a ton to share.


It’s a bit disingenuous to say that Signal has nothing to share. Signal has access logs as well as metadata about the phone number, the name given on the app, group memberships, etc.

With Signal, it’s also trivial to find out if someone is using it by adding their number to one’s address book. Then they can ask Signal for access and other information. That’s not easily possible with Telegram (there are settings to prevent this).

That said, Telegram does store all non-secret chats in an accessible form (for it) on its servers.



Last paragraph in https://arstechnica.com/information-technology/2018/10/new-s...

Also, my point about finding who uses Signal and the access logs (though it’s not a historic log, for which I stand corrected) stand — Signal does store the last access information.


Well Signal is sitting on a centralized Google Cloud instance and Google can just issue a ToS violation, with the metadata that it is collecting about certain users on Signal that the three-letter agencies are looking for, including logs and phone numbers and that can essentially force Google to get them shutdown.

Even without it, Google can shutdown any instance whenever it wants to on its own terms since that is another private platform and can choose to do business with whoever they want to.


[flagged]


Can you please elaborate on this statement? How did you determine this?


Citation? But regardless without central servers hosting content what could they access?


Maybe, but what does it changes about it having no data to share ?


Source please?


I think OP may be sloppily confusing Signal and Matrix here. The link for the case for a link between Matrix and Israel is there : https://www.hackea.org/notas/matrix.html

"Matrix is not a community-based software, it was born [00] in Amdocs [01], a multinational corporation founded in Israel.

On the Internet we find many pieces of information connecting Amdocs with Israel’s Intelligence [02][03][04]. We do not know if it is because they wanted to wash their image, but allegedly Amdocs does not own the project anymore. A new organization, New Vector, was created for Matrix. Nevertheless the same people work there [05] and the project keeps being generously funded [06]."


Talking of sloppiness, that hackea.org article is a huge steaming pile of FUD about Matrix.

For what it’s worth, the team who came up with Matrix was originally based in two separate startups: one in the UK doing VoIP, one in France doing mobile dev. Both got acquired by Amdocs in 2010, but we ended up forming an independent “incubated startup” first to build telco apps, and then we came up with the idea of Matrix in ~2013. We then built out Matrix until 2017 when Amdocs killed our funding, having run out of patience for what amounted to generous FOSS philanthropy.

We then set up New Vector (now Element) as an entirely independent UK/FR startup, and have received zero funding from Amdocs since. To be crystal clear: Amdocs has zero privileged influence or control over Matrix (or Element, for that matter), and has zero access to the Matrix servers we operate as Element. And besides - the whole point of Matrix is that you can and should run your own servers so you can pick who to trust, even if you don’t trust the project itself.


Thanks for taking the time to asess this. Nice to have some first hand information on this !


They have a clear picture of users' social networks because of their dubious requirement that people provide them with working mobile numbers. Who speaks to whom, how frequently, during what times and what days of the week etc. Incredibly valuable and revealing data.


The opposite is the truth. The signal servers don't know who talks to whom, and they chose phone number as identifier specifically so the app could use your local address book for contacts and not store your contacts server side.


Are you real? There is no need to transmit a mobile phone number to a remote service in order for an iOS or Android application to get access to locally stored contacts. You do not need to receive a "verification SMS" to allow the application to access your contacts.


Your evidence is that the signal app client knows your phone number and can see your contacts list and your groups and your chat messages, and if it is malicious, it could just send all that to the server which could just store it in plaintext and turn it over to anyone who asks. But people have reverse engineered the app and it doesn't do that.


Pardon, but you're completely lost. The service knows your mobile phone number because the app requires you to provide it in order to activate your Signal account. After you've provided your mobile number the Signal service sends you an SMS with a verification code, and the app asks you to enter that code. Your account is unusable until you comply with this procedure. Since the service is passing messages between users, those who run the service also know which people communicate with eachother - because a valid mobile number is tied to each and every Signal user account.

I have no idea what you're rambling about regarding people having "reversee engineered the application". There's no reverse engineering required, as it's entirely open source.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: