Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. No, Signal has not been hacked.

No, Signal has not been hacked.

Scheduled Pinned Locked Moved Uncategorized
11 Posts 7 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • hassignalbeenhacked@infosec.exchangeH This user is from outside of this forum
    hassignalbeenhacked@infosec.exchangeH This user is from outside of this forum
    hassignalbeenhacked@infosec.exchange
    wrote last edited by
    #1

    No, Signal has not been hacked. However, we do recommend turning off showing Signal content in notifications because the content is stored in memory on device. Apparently, this memory can be retrieved if an attacker has physical access to an unlocked device and has the right tool.

    Link Preview Image
    Signal Security Checklist | Digital Security Checklists for Activists

    Configure Signal to protect your messages and calls

    favicon

    Activist Checklist (activistchecklist.org)

    jesterchen@social.tchncs.deJ bardmoss@autistics.lifeB garretpolk@mastodon.gamedev.placeG upofadown@mstdn.caU 4 Replies Last reply
    3
    0
    • em0nm4stodon@infosec.exchangeE em0nm4stodon@infosec.exchange shared this topic
      R relay@relay.publicsquare.global shared this topic
    • hassignalbeenhacked@infosec.exchangeH hassignalbeenhacked@infosec.exchange

      No, Signal has not been hacked. However, we do recommend turning off showing Signal content in notifications because the content is stored in memory on device. Apparently, this memory can be retrieved if an attacker has physical access to an unlocked device and has the right tool.

      Link Preview Image
      Signal Security Checklist | Digital Security Checklists for Activists

      Configure Signal to protect your messages and calls

      favicon

      Activist Checklist (activistchecklist.org)

      jesterchen@social.tchncs.deJ This user is from outside of this forum
      jesterchen@social.tchncs.deJ This user is from outside of this forum
      jesterchen@social.tchncs.de
      wrote last edited by
      #2

      @HasSignalBeenHacked uhm... if an attacker has access to the unlocked device...... why wouldn't he just open signal? (And no, I did actually not read the article, usually I do before asking stuff like that, but news like these have often bugged me in some CVE related disclosures as well.)

      hassignalbeenhacked@infosec.exchangeH caitp@mstdn.socialC 2 Replies Last reply
      0
      • jesterchen@social.tchncs.deJ jesterchen@social.tchncs.de

        @HasSignalBeenHacked uhm... if an attacker has access to the unlocked device...... why wouldn't he just open signal? (And no, I did actually not read the article, usually I do before asking stuff like that, but news like these have often bugged me in some CVE related disclosures as well.)

        hassignalbeenhacked@infosec.exchangeH This user is from outside of this forum
        hassignalbeenhacked@infosec.exchangeH This user is from outside of this forum
        hassignalbeenhacked@infosec.exchange
        wrote last edited by
        #3

        @jesterchen Yeah, that’s a great point. However, here’s an article in the news today that folks are talking about. Someone deleted the signal app but the notifications were still retrievable.

        Link Preview Image
        FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database

        The case was the first time authorities charged people for alleged “Antifa” activities after President Trump designated the umbrella term a terrorist organization.

        favicon

        404 Media (www.404media.co)

        jesterchen@social.tchncs.deJ 1 Reply Last reply
        0
        • jesterchen@social.tchncs.deJ jesterchen@social.tchncs.de

          @HasSignalBeenHacked uhm... if an attacker has access to the unlocked device...... why wouldn't he just open signal? (And no, I did actually not read the article, usually I do before asking stuff like that, but news like these have often bugged me in some CVE related disclosures as well.)

          caitp@mstdn.socialC This user is from outside of this forum
          caitp@mstdn.socialC This user is from outside of this forum
          caitp@mstdn.social
          wrote last edited by
          #4

          @jesterchen @HasSignalBeenHacked this is about the news that agencies were able to access the notification database for the device using digital forensic techniques, i.e. special tools that can access the iOS filesystem -- push notifications turn out to be held unencrypted in a database on the iOS filesystem, and are thus pretty easy for enforcement to get at.

          But it doesn't mean that they are able to access the Signal application itself, if the device was off

          kete@mstdn.socialK 1 Reply Last reply
          0
          • hassignalbeenhacked@infosec.exchangeH hassignalbeenhacked@infosec.exchange

            @jesterchen Yeah, that’s a great point. However, here’s an article in the news today that folks are talking about. Someone deleted the signal app but the notifications were still retrievable.

            Link Preview Image
            FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database

            The case was the first time authorities charged people for alleged “Antifa” activities after President Trump designated the umbrella term a terrorist organization.

            favicon

            404 Media (www.404media.co)

            jesterchen@social.tchncs.deJ This user is from outside of this forum
            jesterchen@social.tchncs.deJ This user is from outside of this forum
            jesterchen@social.tchncs.de
            wrote last edited by
            #5

            @HasSignalBeenHacked thanks for your reply. As I said: usually I read articles first,...

            The new link is behind a paywall, but what I can see leads to new questions: Do people really believe, data is lost as soon as I delete something? And this is not even asking about other places where data might be stored. If I delete files, usually they're not physically deleted, only the allocation get's destroyed... and yeah, what typical user does know something like that, I know... (and that is long before clear vs. purge vs. cryptographically destroy like in NIST SP 800-88r2 or such).

            And as long as the device is unlocked, the encryption won't help.......

            And I know how difficult it is to explain the "basics" of this. So thanks again for the clarification.

            jesterchen@social.tchncs.deJ 1 Reply Last reply
            0
            • jesterchen@social.tchncs.deJ jesterchen@social.tchncs.de

              @HasSignalBeenHacked thanks for your reply. As I said: usually I read articles first,...

              The new link is behind a paywall, but what I can see leads to new questions: Do people really believe, data is lost as soon as I delete something? And this is not even asking about other places where data might be stored. If I delete files, usually they're not physically deleted, only the allocation get's destroyed... and yeah, what typical user does know something like that, I know... (and that is long before clear vs. purge vs. cryptographically destroy like in NIST SP 800-88r2 or such).

              And as long as the device is unlocked, the encryption won't help.......

              And I know how difficult it is to explain the "basics" of this. So thanks again for the clarification.

              jesterchen@social.tchncs.deJ This user is from outside of this forum
              jesterchen@social.tchncs.deJ This user is from outside of this forum
              jesterchen@social.tchncs.de
              wrote last edited by
              #6

              @HasSignalBeenHacked And thanks for the list to the checklist above. I will share it. 🙂

              1 Reply Last reply
              0
              • R relay@relay.mycrowd.ca shared this topic
              • caitp@mstdn.socialC caitp@mstdn.social

                @jesterchen @HasSignalBeenHacked this is about the news that agencies were able to access the notification database for the device using digital forensic techniques, i.e. special tools that can access the iOS filesystem -- push notifications turn out to be held unencrypted in a database on the iOS filesystem, and are thus pretty easy for enforcement to get at.

                But it doesn't mean that they are able to access the Signal application itself, if the device was off

                kete@mstdn.socialK This user is from outside of this forum
                kete@mstdn.socialK This user is from outside of this forum
                kete@mstdn.social
                wrote last edited by
                #7

                @caitp @jesterchen @HasSignalBeenHacked
                I don't even have this option, Notification Content, in GrapheneOS.

                caitp@mstdn.socialC 1 Reply Last reply
                0
                • kete@mstdn.socialK kete@mstdn.social

                  @caitp @jesterchen @HasSignalBeenHacked
                  I don't even have this option, Notification Content, in GrapheneOS.

                  caitp@mstdn.socialC This user is from outside of this forum
                  caitp@mstdn.socialC This user is from outside of this forum
                  caitp@mstdn.social
                  wrote last edited by
                  #8

                  @kete @jesterchen @HasSignalBeenHacked it's a part of the Signal app's settings, I'm not sure if that's what you're referring to, could be iOS-specific

                  1 Reply Last reply
                  0
                  • hassignalbeenhacked@infosec.exchangeH hassignalbeenhacked@infosec.exchange

                    No, Signal has not been hacked. However, we do recommend turning off showing Signal content in notifications because the content is stored in memory on device. Apparently, this memory can be retrieved if an attacker has physical access to an unlocked device and has the right tool.

                    Link Preview Image
                    Signal Security Checklist | Digital Security Checklists for Activists

                    Configure Signal to protect your messages and calls

                    favicon

                    Activist Checklist (activistchecklist.org)

                    bardmoss@autistics.lifeB This user is from outside of this forum
                    bardmoss@autistics.lifeB This user is from outside of this forum
                    bardmoss@autistics.life
                    wrote last edited by
                    #9

                    @HasSignalBeenHacked
                    I followed the steps, until it got to looking for "Notification Content". That selection does not exist on my copy of Signal.

                    1 Reply Last reply
                    0
                    • hassignalbeenhacked@infosec.exchangeH hassignalbeenhacked@infosec.exchange

                      No, Signal has not been hacked. However, we do recommend turning off showing Signal content in notifications because the content is stored in memory on device. Apparently, this memory can be retrieved if an attacker has physical access to an unlocked device and has the right tool.

                      Link Preview Image
                      Signal Security Checklist | Digital Security Checklists for Activists

                      Configure Signal to protect your messages and calls

                      favicon

                      Activist Checklist (activistchecklist.org)

                      garretpolk@mastodon.gamedev.placeG This user is from outside of this forum
                      garretpolk@mastodon.gamedev.placeG This user is from outside of this forum
                      garretpolk@mastodon.gamedev.place
                      wrote last edited by
                      #10

                      @HasSignalBeenHacked On Android I see the option under Settings -> Notifications -> Messages -> Show -> No name or message

                      1 Reply Last reply
                      0
                      • hassignalbeenhacked@infosec.exchangeH hassignalbeenhacked@infosec.exchange

                        No, Signal has not been hacked. However, we do recommend turning off showing Signal content in notifications because the content is stored in memory on device. Apparently, this memory can be retrieved if an attacker has physical access to an unlocked device and has the right tool.

                        Link Preview Image
                        Signal Security Checklist | Digital Security Checklists for Activists

                        Configure Signal to protect your messages and calls

                        favicon

                        Activist Checklist (activistchecklist.org)

                        upofadown@mstdn.caU This user is from outside of this forum
                        upofadown@mstdn.caU This user is from outside of this forum
                        upofadown@mstdn.ca
                        wrote last edited by
                        #11

                        @HasSignalBeenHacked

                        Putting on my user hat...

                        OK. Signal has forward secrecy. So messages are gone after I receive them. Great!

                        Oh, you didn't turn on disappearing messages? Oh, right, then forensic tools like Cellebrite can get them. You have to turn on disappearing messages. The default is off.

                        Oh, you did turn on disappearing messages? We send the messages in notifications. So the OS can keep them. Turns out Apple was doing that. There is an option you can turn on to prevent that. It is off by default.

                        At what point does the usability get so bad that we can blame the messaging system?

                        This same app had a usability issue that turned into a security issue just last year:

                        End to End Encrypted Messaging in the News: An Editorial Usability Case Study

                        https://articles.59.ca/doku.php (my article)

                        1 Reply Last reply
                        1
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups