this post was submitted on 25 Mar 2025
1343 points (99.5% liked)

World News

45228 readers
4861 users here now

A community for discussing events around the World

Rules:

Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.


Lemmy World Partners

News !news@lemmy.world

Politics !politics@lemmy.world

World Politics !globalpolitics@lemmy.world


Recommendations

For Firefox users, there is media bias / propaganda / fact check plugin.

https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] orbituary@lemmy.dbzer0.com 64 points 6 days ago (5 children)

That encryption is not impenetrable, however, and the Google Threat Intelligence Group warned just last month of "increasing efforts from several Russia state-aligned threat actors to compromise Signal Messenger accounts used by individuals of interest to Russia's intelligence services."

This is somewhat disingenuous. Signal can't be directly cracked. Only access to the phone directly or via mirroring can expose it. The article somewhat explains this.

I am in no way whatsoever excusing the actions of these douche-chalupas. I prefer accuracy in my reporting, though. That said, Witkoff in Russia may as well have been a direct line to Putin.

[–] Rentlar@lemmy.ca 50 points 6 days ago (2 children)

The most uncrackable encryption can be defeated by Steven Witkoff sitting on Putin's lap while reading the messages.

[–] orbituary@lemmy.dbzer0.com 8 points 6 days ago (1 children)
[–] SexualPolytope@lemmy.sdf.org 4 points 6 days ago* (last edited 6 days ago) (1 children)

I think it's disingenuous to try to suggest that communists have anything to do with it. It's purely an oligarchical shithole.

[–] orbituary@lemmy.dbzer0.com 0 points 6 days ago

Putin was KGB. The fact that the sleeper argent Krasnov awoke 38 years after his recruitment is testament to the Soviet program's effectiveness.

[–] empireOfLove2@lemmy.dbzer0.com 27 points 6 days ago (2 children)

This seems a bit too nitpicky tbh.
The author is correct, Signal is not "perfect", because the weakest link is always the endpoint device and the end user. Which is kind of the whole point of this article; The issue is not that Signal was used, as it's reasonably secure, it's that the people using it are not secure at all.

[–] orbituary@lemmy.dbzer0.com 10 points 6 days ago (2 children)

Oh, I'm definitely picking nits. I agree and said as much in my last comment. But the way the article presented it made it feel like there is a clear and present danger from Chinese and Russian threat actors against the protocol.

[–] AtHeartEngineer@lemmy.world 4 points 6 days ago (1 children)

Right, those shouldn't be conflated (the protocols vs the phone/persons security properties).I think anyone actively targeted by a major govt power is probably fucked though. Pegasus has taught us that, so while signal is probably a pretty secure protocol, phones definitely have a lot of vulnerabilities.

[–] orbituary@lemmy.dbzer0.com 1 points 6 days ago

Indeed. So are digital hygiene practices.

[–] einkorn@feddit.org 2 points 6 days ago (2 children)

OK, my time to pick nits: There is a clear and present threat. China, Russia and certainly the US as well have teams of cryptographers looking at software such as Signal and analysing every update and change made in order to spot potential openings. The threat towards Signal however is comparatively small because there are tens if not hundreds of times as many people checking the code as well and reporting back to Signal because of its Open-source nature.

[–] orbituary@lemmy.dbzer0.com 1 points 6 days ago

That's exactly my point. I work in security, specifically versus threat actors. I don't typically deal with State actors, but on occasion I do. Those are the real problem.

You're writing the concerns, suggestions, and warnings I would give.

[–] CalipherJones@lemmy.world 1 points 6 days ago (1 children)

As far as I'm aware the encryption can't really be broken given the current amount of compute. Is anyone aware of what potential vulnerabilities there could be to the Signal protocol outside of brute forcing? How hard is it to crack a private public key exchange?

[–] Bilaketari@reddthat.com 1 points 5 days ago

One of the biggest issues is they can be recorded and potentially decrypted in the future once quantum computing attacks become feasible. At the moment, the cryptography in Signal (or similar) has no known vulnerabilities that would make it vulnerable to practical attacks given reasonable assumptions about the technology that exists in the world at the moment.

[–] IsoKiero@sopuli.xyz 2 points 6 days ago

people using it are not secure at all.

And this is very much not limited just to signal. No matter what software, protocol or any other way you use to communicate, both you and the receiving entity/entities are the weakest link by a long shot. I don't expect even my closest friends to hold our everyday conversations secret if for whatever reason their wellbeing was threated in any way. And even if I did there's always other options, like targeted social engineering, to get trough pretty much any reasonable safety concerns on digital communication.

Of course in everyday life if our chat histories were publicly available it would not be too big of an issue, but it's still something worth keeping on mind when interacting over any digital or any other written medium.

[–] Mouselemming@sh.itjust.works 3 points 6 days ago

Given the rest of their behavior I'm seeing that chat member leaning across the lunch table towards Putin's secretary, holding out his phone: "hey look, we're just about to bomb Yemen!"

[–] corsicanguppy@lemmy.ca 2 points 6 days ago (1 children)

may as well have been a direct line to Putin.

Was Mr Putin over his shoulder at the crucial moment, or just a state-run high-def camera?

[–] orbituary@lemmy.dbzer0.com 1 points 6 days ago

почему не оба?

[–] fitgse@sh.itjust.works 1 points 6 days ago

But it isn’t that hard to create a signal account with the name of someone high in the US ranks and send a request to these people. They are too dumb to actually validate the key of the person.

Encryption can’t handle when the encrypt with a foe’s key and send that for the message.