I don't know, but if someone would paste a link to such domain in their signal client, would it be this helper which fetches it to render a preview?
> I just found that we shared a link pointing to a governmental domain. I cleaned every log today and retrieved the link then sent it back. The domain has been contacted again. So yes it is related to link preview.<p>> Thanks Stefan<p>From a 3 days old account.
Not surprisingly, this turns out to have a totally benign explanation.<p>Still, I do think this demonstrates how hard it is for (apparently) well-meaning, somewhat-technical users to understand what their software does.<p>I don’t think reading over firewall logs is a very good way to ensure trust in client-side software, of course. (Aside from just being ridiculously time-consuming, there are too many easy ways to exfiltrate data. Like…sending it to the Signal servers?)<p>But I do sort of idly wonder, given the ever-increasing complexity of the trusted computing base, how we can make it so users who are (apparently) concerned enough to read over firewall logs can more productively evaluate trust.
If this was a spying attempt they'd surely set up a less suspicious domain instead of a subdomain<p>On a different note, does someone know what this firewall software is called?