TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Is Washington Post correct in saying Signal is unsecure?

50 点作者 killjoywashere大约 2 个月前
https:&#x2F;&#x2F;www.washingtonpost.com&#x2F;national-security&#x2F;2025&#x2F;03&#x2F;26&#x2F;trump-signal-chat-war-plan-texts-released&#x2F;<p>By Alex Horton and Missy Ryan<p>&quot;the conversation that occurred over an unsecure, commercially available messaging platform.&quot;<p>My understanding has been that Signal is actually well out ahead of other platforms in terms of respecting user privacy, so this seems confusing to me. Has Signal failed an audit that I&#x27;m unaware of?

34 条评论

crazygringo大约 2 个月前
Unsecure in terms of being vulnerable to state spying on cell phones. Not of network interception, but rather compromised phones where a foreign adversary can read all your phone&#x27;s data.<p>From this perspective, <i>all</i> phones are insecure. Classified government stuff isn&#x27;t ever supposed to be on commercial smartphones in the first place.<p>The kind of security Signal provides is sufficient for people who aren&#x27;t active targets of foreign states.
评论 #43483711 未加载
评论 #43483884 未加载
评论 #43492108 未加载
评论 #43483972 未加载
评论 #43483783 未加载
xoa大约 2 个月前
&quot;Secure&quot;, particularly when used in the casual general public sense, is a pretty overloaded term. All real security is in the context of a specific threat profiles, and makes tradeoffs vs other required functionality. Signal is definitely &quot;secure&quot; in the sense of its core cryptography and design, and it&#x27;s aimed to be of practical value to the global general public. But that requires being able to scale massively, making authentication more convenient and leaving more up to the users, who won&#x27;t tend to have their own sophisticated centralized auth system, IT support, and constant life&#x2F;safety critical stuff being thrown around. Signal provides tools that can be used for better assurance in who you&#x27;re talking to but it doesn&#x27;t simply take that out of users&#x27; hands entirely because for its use case that simply isn&#x27;t feasible.<p>For small vetted group top secret conversations by a sophisticated organization, it makes more sense to have something where inviting anyone who hasn&#x27;t already been brought into the magic circle with physical interaction is simply impossible. If technically unsophisticated users are important, ideally one would have fully vetted tech support who will be monitoring all participants and doing the verification work for them. All managed via central systems and heavily walled off with multiple layers from crossing between high and low sides. If they want to talk to the general public, they should use physically different devices. Worse scaling, far more friction, but that&#x27;s OK for top levels of a big organization in the context of extremely sensitive information.<p>Signal is a tool and a decent one, but no tool is good for absolutely everything and trying to use a hammer as a saw isn&#x27;t a defect in the hammer it&#x27;s a problem with the user&#x2F;organization trying to do something so foolish.
modriano大约 2 个月前
For the threat profile of top leadership of the US government, yes, Signal is not secure. Signal runs on phones and phones can be compromised or lost, which can grant non-authorized individuals the ability to read the messages.<p>Spyware like Pegasus [0] has been able to use zero-click exploits to penetrate target phones and read messages as though they were the phone&#x27;s owner.<p>The US has the best SigInt capacity in the world. The leaders of the US government know that phones are not secure against sophisticated adversaries and they know that we have very sophisticated adversaries. It&#x27;s deeply troubling that so many of our leaders were so comfortable discussing Secret level plans in such a reckless and illegal way, and it&#x27;s extremely likely that hostile adversaries have fly-on-the-wall level access to extremely sensitive US planning.<p>[0] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Pegasus_(spyware)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Pegasus_(spyware)</a>
评论 #43484172 未加载
burningion大约 2 个月前
When you work for most public corporations, you aren&#x27;t allowed to bring personal devices linked to company servers to specific countries. You need to bring a burner device instead, because you are perceived as a target for corporate espionage.<p>This is like that, except the government and the type of people on the list are even better targets for their personal devices. The government has strict rules about secrecy and communication for military operations, and strong punishments for not following these protocols, because they can lead to a loss of life.<p>This is a different sort of &quot;unsecure&quot;. The platform itself may be &quot;secure&quot;, but the device, being in public where someone could take a picture of military secrets, etc. isn&#x27;t.
评论 #43483746 未加载
评论 #43490288 未加载
LinuxBender大约 2 个月前
Just guessing but perhaps what they meant was that Signal allows one to invite anyone into a chat thread whereas their actual in-house classified comms will not permit that without going through a massive chain of approvals and being assigned custom hardware.
评论 #43483609 未加载
shmatt大约 2 个月前
We publicly know about tools like Pegasus and competitors Predator, Hermit and I would confidently assume hundreds of other tools that dont publicly advertise themselves. (they all might be using the same handful of 0days for all we know)<p>There are multiple public price lists for 0days, Crowdfense currently has iOS full Zero Click Full Chain listed as $5m-$7m<p>And thats a long way to say - thats correct, its insecure. For the price of $7m any adverse of the US (or friendly country, who cares) can read all these government messages (who knows how many more Signal groups exist without the Atlantic editor)<p>That would be the cheapest way to get US confidential information in the history of spy agencies. The NSA budget is $10B per year<p>The assumption of anyone should be - everything in my iPhone and Android phone can be read for $7m. The conversations im having in front of my iPhone can be recorded for $7m. Then the only question left is - is the information worth more than that<p>If the answer is yes, assume your phone is compromised and only talk near it &#x2F; message using it, information you understand will become public
nottorp大约 2 个月前
End to end encryption doesn&#x27;t make the <i>ends</i> secure, just the channel between them.<p>Not something the average Jane needs to worry about, but people discussing military action should.<p>Edit: if Jane&#x27;s phone gets hacked, they&#x27;re going to swipe her credit cards and send messages to all her whatsapp contacts asking to borrow money urgently and here&#x27;s a convenient Revolut link*. Not exfiltrate her Signal messages.<p>* whatsapp thing is for real, the latest scam making the news around where I am.
input_sh大约 2 个月前
They&#x27;re not saying it&#x27;s not secure for normal conversation, but not up to the national security standards for such coversations. It not being a proper tool for the job is what makes it &quot;unsecure&quot;.
评论 #43483873 未加载
kurtoid大约 2 个月前
I think the &quot;unsecure&quot; is relative - instead of something in-house, locally hosted, and up to the required standards for classified information
评论 #43483646 未加载
WithinReason大约 2 个月前
The sentence applies the &quot;unsecure&quot; adjective directly to Signal as a &quot;messaging platform&quot;, not to the phone itself or the wider context. Signal by itself is secure. No need to mince words here, the Washington Post is simply wrong.
评论 #43485599 未加载
评论 #43483967 未加载
dymk大约 2 个月前
Well, unsecure in the sense that a reporter was mistakenly added to a group chat they certainly should not have been in. A secure app in this context would prevent random people from being added to secure areas.
评论 #43483763 未加载
评论 #43483728 未加载
评论 #43483811 未加载
lmeyerov大约 2 个月前
The threat model for using signal is wider than what signal can audit internally:<p>Audits of a signal deployment, vs signal software at some point in time, aren&#x27;t just of the app, but also how it is installed, configured, patched, operated, monitored, etc. Likewise, it&#x27;s the full system, like device, os, network.<p>This stuff is supposed to run managed, especially at the level of the VP and secdef. Ex: Are they running signal patched from this week or 6 months ago, so a network attacker can leverage a software exploit to work around the crypto. Ex: Was an attacking payload sent through one of the chats while one of the people talking to the VP&#x27;s + secdef&#x27;s device was in Russia?<p>With the unmonitored auto deletion, and on who knows what device&#x2F;network, external + internal crimes audit trails are being intentionally, recklessly, and illegally deleted. Managed detection and response, and post-crime investigations, are hard when you can&#x27;t see.
barotalomey大约 2 个月前
I think Signal is the only usable option for trusted fully e2e-encrypted messaging today. Even the military is using it in some countries.
评论 #43485494 未加载
nonfamous大约 2 个月前
Also it’s not just the app — it’s the fact that the app is running on unsecured private devices in unsecured locations.
openasocket大约 2 个月前
It is certainly insecure compared to the normal channels for sharing classified information. The US government maintains a network that is cut off from the rest of the internet (more or less, there’s some nuances). The only way to access it is through a SCIF room. So they aren’t just using encryption for sending data, they are also using physical layer security. You can’t hack what you can’t reach, after all.
pavel_lishin大约 2 个月前
My understanding - largely based on this person&#x27;s blog - is that Signal is the best secure messaging app that exists today: <a href="https:&#x2F;&#x2F;soatok.blog&#x2F;2024&#x2F;07&#x2F;31&#x2F;what-does-it-mean-to-be-a-signal-competitor&#x2F;" rel="nofollow">https:&#x2F;&#x2F;soatok.blog&#x2F;2024&#x2F;07&#x2F;31&#x2F;what-does-it-mean-to-be-a-sig...</a>
评论 #43483779 未加载
评论 #43483799 未加载
评论 #43483707 未加载
dismalaf大约 2 个月前
No, they&#x27;re wrong. Signal is considered extremely secure, which is why journalists and government uses it. Some people like to criticize anything Trump does, right or wrong.<p>That being said, the Signal non-profit entity is located in the US, so probably subject to the same risks as WhatsApp and Messenger; namely US courts compelling them to share data.
评论 #43483761 未加载
评论 #43483946 未加载
CSMastermind大约 2 个月前
Signal responded to this directly on X: <a href="https:&#x2F;&#x2F;x.com&#x2F;signalapp&#x2F;status&#x2F;1904666111989166408" rel="nofollow">https:&#x2F;&#x2F;x.com&#x2F;signalapp&#x2F;status&#x2F;1904666111989166408</a>
评论 #43485674 未加载
Jyaif大约 2 个月前
In this case, assuming you are using Signal on iOS, the app could very well decide to send all the decyphered messages of targeted users (users that say a certain thing, or users with a certain name) to a 3rd party server. If they wanted to be undetected in all cases, they could leak data via the timing of the network packets.<p>And they could do all that without even knowing it, just by using a compromised toolchain.<p>Long story short, unless the SW (the app, the OS, the toolchains) and the HW have been audited, you have no idea what&#x27;s going on.
derbOac大约 2 个月前
Just to reinforce what others are saying, security isn&#x27;t a binary yes or no thing, it&#x27;s on a continuum that has tradeoffs with usability, and where you want to be on that continuum depends on risk. There are things you could do to be more secure than Signal, but they would also be more difficult to use, and many of those things aren&#x27;t about Signal itself, but the hardware and networks it is on.
bearjaws大约 2 个月前
Any system you can invite someone into willy nilly isn&#x27;t really that secure. At least it doesn&#x27;t give them the full chat history.
mikequinlan大约 2 个月前
If it is know that secret agencies are using Signal, then it is almost certain that other agencies are working to exploit that.<p>An obvious attack on Signal is to get one of your people a job working there, or to bribe&#x2F;blackmail and existing employee, and have them install a backdoor or other exploitable code (maybe a secret weakening of the encryption?).
评论 #43484584 未加载
QuiEgo大约 2 个月前
Nothing stops you from opening signal in a bar and having a guy sitting behind you from the KGB reading the texts. Or say, adding a rando to the group. In their context, that means it’s unsecure.<p>The cryptography of Signal is not the issue.
nottorp大约 2 个月前
Stupid question, if anyone still reads this thread:<p>Why do these oh-so-secure offerings allow any idiot to add you to a group chat without asking you if you approve?
tmiku大约 2 个月前
Soatok wrote a good blog post about this that was discussed yesterday: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=43471223">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=43471223</a> <i>The Practical Limitations of End-to-End Encryption</i> (41 points, 42 comments)<p>The gist is that there are potential threats that any end-to-end encryption cannot fully protect against. Signal is a good provider of that encryption, but there are other considerations to protect highly confidential data, and Signal often lures non-technical users into disregarding those.
emorning3大约 2 个月前
I wouldn&#x27;t trust any form of symmetric encryption to secure anything.<p>And I would bet that there used to be people in the govt that could have told you why.
评论 #43485770 未加载
analog31大约 2 个月前
I wonder if its possible that an adversary added the reporter to the chat by controlling a compromised phone.
1vuio0pswjnm7大约 2 个月前
&quot;commercially available messaging platform&quot;<p>Is Signal engaged in commerce. Is it a free service.
chrisweekly大约 2 个月前
Nit: the word is &quot;insecure&quot;, not &quot;unsecure&quot;.
评论 #43490955 未加载
jeffbee大约 2 个月前
It&#x27;s missing the point of the story to focus on this aspect. The characters involved in this event were not using Signal because they thought it was secure. They used Signal because they intended to break and knew they were breaking the law.
评论 #43483887 未加载
评论 #43484116 未加载
aorloff大约 2 个月前
How could anyone know, unless they have contributed to Signal&#x27;s repo ?<p>Presumably within Signal, there are plenty of weak points. And certainly Signal&#x27;s ability to modify their app as they please doesn&#x27;t fit within the OPSEC guidelines.<p>The question is: why would one of the most powerful militaries on the planet use a consumer app, regardless of its reputation ?<p>And the answer is: because the Trump administration is compromised.
评论 #43483789 未加载
givemeethekeys大约 2 个月前
It isn’t less secure than it was before the messaging scandal.<p>What will reporters use moving forward? Facebook messenger? &#x2F;s
bananapub大约 2 个月前
come on dude.<p>&quot;unsecured&quot; as in &quot;not a secure comms system managed and approved by the NSA&quot;, which for the US government is normally considered <i>a bad thing</i>.<p>for normal people who <i>don&#x27;t</i> want the NSA to be managing their comms then Signal is approximately the best possible choice, along with not being a fucking idiot while using it.
评论 #43483730 未加载
Ros23大约 2 个月前
1) Those Alex Horton and Missy Ryan do owe an apology to Signal project. Their publication was incorrect and caused misinformation regarding one of the most secure platforms on Earth.<p>2) As for Gov officials - I understand they used Signal on 1) Government issued devices, without a doubt running NSA built OS; 2) preinstalled Signal App, without a doubt audited by NSA line by line; 3) tactical OP information which has very close expiry date.<p>3) That &quot;journalist&quot;, IMO, is guilty of high treason. They must have immediately notified the group about their presence and they must have not publish any of the secrets they accidentally got privy to. And even more, from professional POV, the actions of journalist were deeply non-ethical. I dare say, un-American and definitely not something that any US Citizen can be expected to do.<p>4) The &quot;deep state&quot; is furious because they can&#x27;t leak Signal chat messages. IMO, it&#x27;s a good choice. They (Administration) just need to carefully audit the groups and distribution lists. That was a very bad call.<p>I personally will _continue_ using Signal, even with more confidence now.
评论 #43489978 未加载
评论 #43492218 未加载