Jump to content

Signal (software): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Luc19950 (talk | contribs)
Added several hyperlinks
Migupla (talk | contribs)
No edit summary
Tag: Reverted
Line 36: Line 36:
'''Signal''' is a [[Cross-platform software|cross-platform]] [[encryption|encrypted]] [[messaging app|messaging service]] developed by the [[Signal Foundation]] and [[Signal Messenger LLC]]. It uses the [[Internet]] to send one-to-one and group messages, which can include [[Computer file|files]], voice notes, [[Digital image|images]] and [[Video|videos]].<ref name="arbitrary-file-types"/> It can also be used to make one-to-one [[Telephone call|voice]] and [[Videotelephony|video calls]],<ref name="Mott-2017-03-14"/><ref name="desktop-v1.35.1"/> and the [[Android (operating system)|Android]] version can optionally function as an [[SMS]] app.<ref name="Frosch 2016"/>
'''Signal''' is a [[Cross-platform software|cross-platform]] [[encryption|encrypted]] [[messaging app|messaging service]] developed by the [[Signal Foundation]] and [[Signal Messenger LLC]]. It uses the [[Internet]] to send one-to-one and group messages, which can include [[Computer file|files]], voice notes, [[Digital image|images]] and [[Video|videos]].<ref name="arbitrary-file-types"/> It can also be used to make one-to-one [[Telephone call|voice]] and [[Videotelephony|video calls]],<ref name="Mott-2017-03-14"/><ref name="desktop-v1.35.1"/> and the [[Android (operating system)|Android]] version can optionally function as an [[SMS]] app.<ref name="Frosch 2016"/>


Signal uses standard cellular [[telephone number]]s as identifiers and secures all communications to other Signal users with [[end-to-end encryption]]. The apps include mechanisms by which users can independently verify the identity of their contacts and the integrity of the data channel.<ref name="Frosch 2016"/><ref name="Schröder-2016"/>
Signal uses standard cellular [[telephone number]]s as identifiers due to store social graph on client side unlike other messenger app, and secures all communications to other Signal users with [[end-to-end encryption]]. The apps include mechanisms by which users can independently verify the identity of their contacts and the integrity of the data channel.<ref name="Frosch 2016"/><ref name="Schröder-2016"/>


All Signal software is [[free and open-source software|free and open-source]]. Its [[Client (computing)|clients]] are published under the [[GPLv3]] [[Software license|license]],<ref name="signal-ios-github" /><ref name="signal-android-github" /><ref name="signal-desktop-github"/> while the [[Server (computing)|server]] code is published under the [[AGPLv3]] license.<ref name="Signal-Server" /> The [[Nonprofit organization|non-profit]] Signal Foundation was launched in February 2018 with initial funding of $50&nbsp;million.<ref name="Greenberg-2018-02-21"/>
All Signal software is [[free and open-source software|free and open-source]]. Its [[Client (computing)|clients]] are published under the [[GPLv3]] [[Software license|license]],<ref name="signal-ios-github" /><ref name="signal-android-github" /><ref name="signal-desktop-github"/> while the [[Server (computing)|server]] code is published under the [[AGPLv3]] license.<ref name="Signal-Server" /> The [[Nonprofit organization|non-profit]] Signal Foundation was launched in February 2018 with initial funding of $50&nbsp;million.<ref name="Greenberg-2018-02-21"/>
Line 98: Line 98:


==Limitations==
==Limitations==
Signal requires that the user provides a phone number for verification,<ref name="phone-number">{{cite web|first=Masha|last=Kolenkina|title=Will any phone number work? How do I get a verification number?|url=http://support.whispersystems.org/hc/en-us/articles/212476118-Will-any-phone-number-work-How-do-I-get-a-verification-number-|publisher=Open Whisper Systems|date=20 November 2015|accessdate=20 December 2015|archive-date=16 January 2017|archive-url=https://web.archive.org/web/20170116181641/https://support.whispersystems.org/hc/en-us/articles/212476118-Will-any-phone-number-work-How-do-I-get-a-verification-number-|url-status=live}}</ref> eliminating the need for user names or passwords and facilitating contact discovery (see below).<ref name=":0">{{Cite web|url=https://theintercept.com/2017/09/28/signal-tutorial-second-phone-number/|title=How to Use Signal Without Giving Out Your Phone Number|last=Lee|first=Micah|date=2017-09-28|website=The Intercept|language=en-US|access-date=2018-02-25|archive-date=2020-01-22|archive-url=https://web.archive.org/web/20200122040137/https://theintercept.com/2017/09/28/signal-tutorial-second-phone-number/|url-status=live}}</ref> The number does not have to be the same as on the device's SIM card; it can also be a VoIP number<ref name="phone-number" /> or a landline as long as the user can receive the verification code and have a separate device to set up the software. A number can only be registered on one mobile device at a time.<ref name="multiple-devices"/>
Signal requires that the user provides a phone number for verification,<ref name="phone-number">{{cite web|first=Masha|last=Kolenkina|title=Will any phone number work? How do I get a verification number?|url=http://support.whispersystems.org/hc/en-us/articles/212476118-Will-any-phone-number-work-How-do-I-get-a-verification-number-|publisher=Open Whisper Systems|date=20 November 2015|accessdate=20 December 2015|archive-date=16 January 2017|archive-url=https://web.archive.org/web/20170116181641/https://support.whispersystems.org/hc/en-us/articles/212476118-Will-any-phone-number-work-How-do-I-get-a-verification-number-|url-status=live}}</ref>store social graph on client side and eliminating the need for user names or passwords and facilitating contact discovery (see below).<ref name=":0">{{Cite web|url=https://theintercept.com/2017/09/28/signal-tutorial-second-phone-number/|title=How to Use Signal Without Giving Out Your Phone Number|last=Lee|first=Micah|date=2017-09-28|website=The Intercept|language=en-US|access-date=2018-02-25|archive-date=2020-01-22|archive-url=https://web.archive.org/web/20200122040137/https://theintercept.com/2017/09/28/signal-tutorial-second-phone-number/|url-status=live}}</ref> The number does not have to be the same as on the device's SIM card; it can also be a VoIP number<ref name="phone-number" /> or a landline as long as the user can receive the verification code and have a separate device to set up the software. A number can only be registered on one mobile device at a time.<ref name="multiple-devices"/>


This mandatory connection to a phone number (a feature Signal shares with [[WhatsApp]], [[KakaoTalk]], and others) has been criticized as a "major issue" for privacy-conscious users who are not comfortable with giving out their private phone number.<ref name=":0" /> A workaround is to use a secondary phone number.<ref name=":0" /> The option to choose a public, changeable username instead of sharing one's phone number with everyone they message (or share a group with) is a widely requested feature, which as of June 2020 has not yet been implemented.<ref name=":0" /><ref>{{Cite web|url=https://github.com/signalapp/Signal-Android/issues/1085|title=Allow different kinds of identifiers for registration · Issue #1085 · signalapp/Signal-Android|website=GitHub|language=en|access-date=2018-02-25|archive-date=2020-02-15|archive-url=https://web.archive.org/web/20200215082751/https://github.com/signalapp/Signal-Android/issues/1085|url-status=live}}</ref><ref>{{cite web |title=Discussion: A proposal for alternative primary identifiers |url=https://community.signalusers.org/t/a-proposal-for-alternative-primary-identifiers/3023 |website=Signal Community |accessdate=26 June 2020 |date=24 May 2018 |archive-date=28 June 2020 |archive-url=https://web.archive.org/web/20200628045054/https://community.signalusers.org/t/a-proposal-for-alternative-primary-identifiers/3023 |url-status=live }}</ref> Signal in 2019 announced plans to implement this feature, overcoming the challenges associated with storing users' social graphs by using what they called Secure Value Recovery (SVR).<ref name="SVR"/> This allows users to [[client-side encryption|client-side encrypt]] their Signal contacts with an alphanumeric passphrase (which Signal calls a PIN<ref>{{cite web |title=Signal Blog: Introducing Signal PINs |url=https://signal.org/blog/signal-pins/ |website=signal.org |access-date=2020-06-27 |archive-date=2020-06-19 |archive-url=https://web.archive.org/web/20200619012713/https://signal.org/blog/signal-pins/ |url-status=live }}</ref>) and uses [[Intel SGX]] to limit the number of passphrase guesses, alleviating the risk of server-side [[Brute-force attack|brute-force]] attempts.<ref name="SVR">{{cite web |title=Signal Blog: Secure Value Recovery |url=https://signal.org/blog/secure-value-recovery/ |website=signal.org |access-date=2020-06-26 |archive-date=2020-06-19 |archive-url=https://web.archive.org/web/20200619051106/https://signal.org/blog/secure-value-recovery/ |url-status=live }}</ref><ref>{{cite web |title=Discussion: Technology Preview for secure value recovery |url=https://community.signalusers.org/t/technology-preview-for-secure-value-recovery/ |website=Signal Community |date=19 December 2019}}</ref><ref>{{cite web |title=Tweet by Signal |url=https://twitter.com/signalapp/status/1209594272632098817 |website=Twitter |accessdate=27 June 2020 |language=en |archive-date=24 December 2019 |archive-url=https://web.archive.org/web/20191224221217/https://twitter.com/signalapp/status/1209594272632098817 |url-status=live }}</ref> Cryptography expert [[Matthew D. Green]] described this method as "sophisticated work,"<ref>{{cite web |title=Tweet by Matthew Green |url=https://twitter.com/matthew_d_green/status/1207753119729430529 |website=Twitter |accessdate=26 June 2020 |language=en |date=19 December 2019 |archive-date=19 December 2019 |archive-url=https://web.archive.org/web/20191219202341/https://twitter.com/matthew_d_green/status/1207753119729430529 |url-status=live }}</ref> but also expressed concerns that the data the system was protecting should not rely on the security of SGX, which has been [[Software Guard Extensions#Attacks|repeatedly broken]].<ref>{{cite web |title=Second Tweet by Matthew Green |url=https://twitter.com/matthew_d_green/status/1207758061944918016 |website=Twitter |accessdate=27 June 2020 |language=en |date=19 December 2019 |archive-date=19 December 2019 |archive-url=https://web.archive.org/web/20191219203535/https://twitter.com/matthew_d_green/status/1207758061944918016 |url-status=live }}</ref><ref>{{cite web |title=Third Tweet by Matthew Green |url=https://twitter.com/matthew_d_green/status/1270417804563488768 |website=Twitter |accessdate=27 June 2020 |language=en |date=9 June 2020 |archive-date=9 June 2020 |archive-url=https://web.archive.org/web/20200609182156/https://twitter.com/matthew_d_green/status/1270417804563488768 |url-status=live }}</ref>
This mandatory connection to a phone number (a feature Signal shares with [[WhatsApp]], [[KakaoTalk]], and others) has been criticized as a "major issue" for privacy-conscious users who are not comfortable with giving out their private phone number.<ref name=":0" /> A workaround is to use a secondary phone number.<ref name=":0" /> The option to choose a public, changeable username instead of sharing one's phone number with everyone they message (or share a group with) is a widely requested feature, which as of June 2020 has not yet been implemented.<ref name=":0" /><ref>{{Cite web|url=https://github.com/signalapp/Signal-Android/issues/1085|title=Allow different kinds of identifiers for registration · Issue #1085 · signalapp/Signal-Android|website=GitHub|language=en|access-date=2018-02-25|archive-date=2020-02-15|archive-url=https://web.archive.org/web/20200215082751/https://github.com/signalapp/Signal-Android/issues/1085|url-status=live}}</ref><ref>{{cite web |title=Discussion: A proposal for alternative primary identifiers |url=https://community.signalusers.org/t/a-proposal-for-alternative-primary-identifiers/3023 |website=Signal Community |accessdate=26 June 2020 |date=24 May 2018 |archive-date=28 June 2020 |archive-url=https://web.archive.org/web/20200628045054/https://community.signalusers.org/t/a-proposal-for-alternative-primary-identifiers/3023 |url-status=live }}</ref> Signal in 2019 announced plans to implement this feature, overcoming the challenges associated with storing users' social graphs by using what they called Secure Value Recovery (SVR).<ref name="SVR"/> This allows users to [[client-side encryption|client-side encrypt]] their Signal contacts with an alphanumeric passphrase (which Signal calls a PIN<ref>{{cite web |title=Signal Blog: Introducing Signal PINs |url=https://signal.org/blog/signal-pins/ |website=signal.org |access-date=2020-06-27 |archive-date=2020-06-19 |archive-url=https://web.archive.org/web/20200619012713/https://signal.org/blog/signal-pins/ |url-status=live }}</ref>) and uses [[Intel SGX]] to limit the number of passphrase guesses, alleviating the risk of server-side [[Brute-force attack|brute-force]] attempts.<ref name="SVR">{{cite web |title=Signal Blog: Secure Value Recovery |url=https://signal.org/blog/secure-value-recovery/ |website=signal.org |access-date=2020-06-26 |archive-date=2020-06-19 |archive-url=https://web.archive.org/web/20200619051106/https://signal.org/blog/secure-value-recovery/ |url-status=live }}</ref><ref>{{cite web |title=Discussion: Technology Preview for secure value recovery |url=https://community.signalusers.org/t/technology-preview-for-secure-value-recovery/ |website=Signal Community |date=19 December 2019}}</ref><ref>{{cite web |title=Tweet by Signal |url=https://twitter.com/signalapp/status/1209594272632098817 |website=Twitter |accessdate=27 June 2020 |language=en |archive-date=24 December 2019 |archive-url=https://web.archive.org/web/20191224221217/https://twitter.com/signalapp/status/1209594272632098817 |url-status=live }}</ref> Cryptography expert [[Matthew D. Green]] described this method as "sophisticated work,"<ref>{{cite web |title=Tweet by Matthew Green |url=https://twitter.com/matthew_d_green/status/1207753119729430529 |website=Twitter |accessdate=26 June 2020 |language=en |date=19 December 2019 |archive-date=19 December 2019 |archive-url=https://web.archive.org/web/20191219202341/https://twitter.com/matthew_d_green/status/1207753119729430529 |url-status=live }}</ref> but also expressed concerns that the data the system was protecting should not rely on the security of SGX, which has been [[Software Guard Extensions#Attacks|repeatedly broken]].<ref>{{cite web |title=Second Tweet by Matthew Green |url=https://twitter.com/matthew_d_green/status/1207758061944918016 |website=Twitter |accessdate=27 June 2020 |language=en |date=19 December 2019 |archive-date=19 December 2019 |archive-url=https://web.archive.org/web/20191219203535/https://twitter.com/matthew_d_green/status/1207758061944918016 |url-status=live }}</ref><ref>{{cite web |title=Third Tweet by Matthew Green |url=https://twitter.com/matthew_d_green/status/1270417804563488768 |website=Twitter |accessdate=27 June 2020 |language=en |date=9 June 2020 |archive-date=9 June 2020 |archive-url=https://web.archive.org/web/20200609182156/https://twitter.com/matthew_d_green/status/1270417804563488768 |url-status=live }}</ref>

Revision as of 08:16, 12 December 2020

Signal
Developer(s)
Initial releaseJuly 29, 2014 (2014-07-29)[1][2]
Repository
Operating system
TypeEncrypted voice calling, video calling and instant messaging
License
Websitesignal.org Edit this on Wikidata

Signal is a cross-platform encrypted messaging service developed by the Signal Foundation and Signal Messenger LLC. It uses the Internet to send one-to-one and group messages, which can include files, voice notes, images and videos.[9] It can also be used to make one-to-one voice and video calls,[10][11] and the Android version can optionally function as an SMS app.[12]

Signal uses standard cellular telephone numbers as identifiers due to store social graph on client side unlike other messenger app, and secures all communications to other Signal users with end-to-end encryption. The apps include mechanisms by which users can independently verify the identity of their contacts and the integrity of the data channel.[12][13]

All Signal software is free and open-source. Its clients are published under the GPLv3 license,[5][6][7] while the server code is published under the AGPLv3 license.[8] The non-profit Signal Foundation was launched in February 2018 with initial funding of $50 million.[14]

History

The end-to-end encrypted messaging service Signal was launched in 2014, and has become more widely used in 2019 and 2020. Signal’s growth has often spiked during "periods in which decisions are questioned or undone—to moments of social and political upheaval".[40] However, the roots of Signal go back to earlier encrypted voice and text apps of the early 2010s.

2010–2013: Origins

Signal is the successor of the RedPhone encrypted voice calling app and the TextSecure encrypted texting program. The beta versions of RedPhone and TextSecure were first launched in May 2010 by Whisper Systems,[41] a startup company co-founded by security researcher Moxie Marlinspike and roboticist Stuart Anderson.[42][43] Whisper Systems also produced a firewall and tools for encrypting other forms of data.[42][44] All of these were proprietary enterprise mobile security software and were only available for Android.

In November 2011, Whisper Systems announced that it had been acquired by Twitter. The financial terms of the deal were not disclosed by either company.[45] The acquisition was done "primarily so that Mr. Marlinspike could help the then-startup improve its security".[46] Shortly after the acquisition, Whisper Systems' RedPhone service was made unavailable.[47] Some criticized the removal, arguing that the software was "specifically targeted [to help] people under repressive regimes" and that it left people like the Egyptians in "a dangerous position" during the events of the Egyptian revolution of 2011.[48]

Twitter released TextSecure as free and open-source software under the GPLv3 license in December 2011.[42][49][50][51] RedPhone was also released under the same license in July 2012.[52] Marlinspike later left Twitter and founded Open Whisper Systems as a collaborative Open Source project for the continued development of TextSecure and RedPhone.[1][53]

2013–2018: Open Whisper Systems

Open Whisper Systems' website was launched in January 2013.[53]

In February 2014, Open Whisper Systems introduced the second version of their TextSecure Protocol (now Signal Protocol), which added end-to-end encrypted group chat and instant messaging capabilities to TextSecure.[54] Toward the end of July 2014, they announced plans to merge the RedPhone and TextSecure applications as Signal.[55] This announcement coincided with the initial release of Signal as a RedPhone counterpart for iOS. The developers said that their next steps would be to provide TextSecure instant messaging capabilities for iOS, unify the RedPhone and TextSecure applications on Android, and launch a web client.[55] Signal was the first iOS app to enable easy, strongly encrypted voice calls for free.[1][56] TextSecure compatibility was added to the iOS application in March 2015.[57][58]

Signal Android icon, 2015–2017
Signal icon, 2015–2020

From its launch in May 2010[41] until March 2015, the Android version of Signal (then called TextSecure) included support for encrypted SMS/MMS messaging.[59] From version 2.7.0 onward, the Android application only supported sending and receiving encrypted messages via the data channel.[60] Reasons for this included security flaws of SMS/MMS and problems with the key exchange.[60] Open Whisper Systems' abandonment of SMS/MMS encryption prompted some users to create a fork named Silence (initially called SMSSecure[61]) that is meant solely for the exchange of encrypted SMS and MMS messages.[62][63]

In November 2015, the TextSecure and RedPhone applications on Android were merged to become Signal for Android.[64] A month later, Open Whisper Systems announced Signal Desktop, a Chrome app that could link with a Signal mobile client.[65] At launch, the app could only be linked with the Android version of Signal.[66] On September 26, 2016, Open Whisper Systems announced that Signal Desktop could now be linked with the iOS version of Signal as well.[67] On October 31, 2017, Open Whisper Systems announced that the Chrome app was deprecated.[3] At the same time, they announced the release of a standalone desktop client (based on the Electron framework[7]) for Windows, MacOS and certain Linux distributions.[3][68]

On October 4, 2016, the American Civil Liberties Union (ACLU) and Open Whisper Systems published a series of documents revealing that OWS had received a subpoena requiring them to provide information associated with two phone numbers for a federal grand jury investigation in the first half of 2016.[69][70][71] Only one of the two phone numbers was registered on Signal, and because of how the service is designed, OWS was only able to provide "the time the user's account had been created and the last time it had connected to the service".[70][69] Along with the subpoena, OWS received a gag order requiring OWS not to tell anyone about the subpoena for one year.[69] OWS approached the ACLU, and they were able to lift part of the gag order after challenging it in court.[69] OWS said it was the first time they had received a subpoena, and that they were committed to treat "any future requests the same way".[71]

In March 2017, Open Whisper Systems transitioned Signal's calling system from RedPhone to WebRTC, also adding the ability to make video calls with the mobile apps.[72][73][10]

2018–present: Signal Messenger

On February 21, 2018, Moxie Marlinspike and WhatsApp co-founder Brian Acton announced the formation of the Signal Foundation, a 501(c)(3) nonprofit organization whose mission is "to support, accelerate, and broaden Signal's mission of making private communication accessible and ubiquitous."[74][14] The foundation was started with an initial $50 million in funding from Acton, who had left WhatsApp's parent company Facebook in September 2017.[14] According to the announcement, Acton is the foundation's executive chairman and Marlinspike continues as the CEO of Signal Messenger.[74] By 2020, Signal runs totally on donations, as a nonprofit.[40]

Between November 2019 and February 2020, Signal added support for iPads, view-once images and videos, stickers, and reactions.[75] They also announced plans for a new group messaging system and an "experimental method for storing encrypted contacts in the cloud."[75]

Signal was reportedly popularized in the United States during the George Floyd protests. As U.S. protests gained momentum, on June 3, Twitter CEO Jack Dorsey tweeted a recommendation for users to download Signal Messenger.[76] Heightened awareness of police monitoring led protesters to use the app to communicate. Black Lives Matter organizers had used the app "for several years".[77][40] During the first week of June, the encrypted messaging app was downloaded over five times more than it had been during the week prior to the death of George Floyd.[77] In June 2020, Signal Foundation announced a new feature that enables users to blur faces in photos, in response to increased federal efforts to monitor protesters.[40][78]

Features

Signal allows users to make one-to-one voice and video[10] calls to other Signal users on iOS, Android, and desktop.[11] All calls are made over a Wi-Fi or data connection and (with the exception of data fees) are free of charge, including long distance and international.[56] Signal also allows users to send text messages, files,[9] voice notes, pictures, GIFs,[79] and video messages over a Wi-Fi or data connection to other Signal users on iOS, Android and a desktop app. The app also supports group messaging.

All communications to other Signal users are automatically end-to-end encrypted. The keys that are used to encrypt the user's communications are generated and stored at the endpoints (i.e. by users, not by servers).[80] To verify that a correspondent is really the person that they claim to be, Signal users can compare key fingerprints (or scan QR codes) out-of-band.[81] The app employs a trust-on-first-use mechanism in order to notify the user if a correspondent's key changes.[81]

On Android, users can opt into making Signal the default SMS/MMS application, allowing them to send and receive unencrypted SMS messages in addition to the standard end-to-end encrypted Signal messages.[54] Users can then use the same application to communicate with contacts who do not have Signal.[54] Sending a message unencrypted is also available as an override between Signal users.[82]

TextSecure allowed the user to set a passphrase that encrypted the local message database and the user's encryption keys.[83] This did not encrypt the user's contact database or message timestamps.[83] The Signal applications on Android and iOS can be locked with the phone's pin, passphrase, or biometric authentication.[84] The user can define a "screen lock timeout" interval, providing an additional protection mechanism in case the phone is lost or stolen.[81][84]

Signal also allows users to set timers to messages.[85] After a specified time interval, the messages will be deleted from both the sender's and the receivers' devices.[85] The time interval can be between five seconds and one week long,[85] and the timer begins for each recipient once they have read their copy of the message.[86] The developers have stressed that this is meant to be "a collaborative feature for conversations where all participants want to automate minimalist data hygiene, not for situations where your contact is your adversary".[85][86]

Signal excludes users' messages from non-encrypted cloud backups by default.[87]

Signal has support for read receipts and typing indicators, both of which can be disabled.[88][89]

Signal allows users to automatically blur faces of people in photos to protect their identities.[90][91][92][93]

Limitations

Signal requires that the user provides a phone number for verification,[94]store social graph on client side and eliminating the need for user names or passwords and facilitating contact discovery (see below).[95] The number does not have to be the same as on the device's SIM card; it can also be a VoIP number[94] or a landline as long as the user can receive the verification code and have a separate device to set up the software. A number can only be registered on one mobile device at a time.[96]

This mandatory connection to a phone number (a feature Signal shares with WhatsApp, KakaoTalk, and others) has been criticized as a "major issue" for privacy-conscious users who are not comfortable with giving out their private phone number.[95] A workaround is to use a secondary phone number.[95] The option to choose a public, changeable username instead of sharing one's phone number with everyone they message (or share a group with) is a widely requested feature, which as of June 2020 has not yet been implemented.[95][97][98] Signal in 2019 announced plans to implement this feature, overcoming the challenges associated with storing users' social graphs by using what they called Secure Value Recovery (SVR).[99] This allows users to client-side encrypt their Signal contacts with an alphanumeric passphrase (which Signal calls a PIN[100]) and uses Intel SGX to limit the number of passphrase guesses, alleviating the risk of server-side brute-force attempts.[99][101][102] Cryptography expert Matthew D. Green described this method as "sophisticated work,"[103] but also expressed concerns that the data the system was protecting should not rely on the security of SGX, which has been repeatedly broken.[104][105]

Using phone numbers as identifiers may also create security risks that arise from the possibility of an attacker taking over a phone number.[95] This can be mitigated by enabling an optional Registration Lock PIN in Signal's privacy settings.[106]

Android-specific

From February 2014[54] to February 2017,[107] Signal's official Android client required the proprietary Google Play Services because the app was dependent on Google's GCM push-messaging framework.[108][107] In March 2015, Signal moved to a model of handling the app's message delivery themselves and only using GCM for a wakeup event.[109] In February 2017, Signal's developers implemented WebSocket support into the client, making it possible for it to be used without Google Play Services.[107]

Desktop-specific

Setting up Signal's desktop app requires that the user first install Signal on an Android or iOS based smartphone with an Internet connection.[4] Once the desktop app has been linked to the user's account, it will function as an independent client; the mobile app does not need to be present or online.[110] Users can link up to 5 desktop apps to their account.[96]

Usability

In July 2016, the Internet Society published a user study that assessed the ability of Signal users to detect and deter man-in-the-middle attacks.[13] The study concluded that 21 out of 28 participants failed to correctly compare public key fingerprints in order to verify the identity of other Signal users, and that the majority of these users still believed they had succeeded, while in reality they failed.[13] Four months later, Signal's user interface was updated to make verifying the identity of other Signal users simpler.[111]

Before version 4.17,[112] the Signal Android client could only make plain text-only backups of the message history, i.e. without media messages.[113][114] On February 26, 2018, Signal added support for "full backup/restore to SD card",[115] and as of version 4.17, users are able to restore their entire message history when switching to a new Android phone.[112] On June 09, 2020, the Signal iOS client added the ability to transfer all Signal information from an old iOS device to a new one. The transfer is done wirelessly over a local connection between the two devices and is end-to-end encrypted.[116]

Architecture

Encryption protocols

Signal messages are encrypted with the Signal Protocol (formerly known as the TextSecure Protocol). The protocol combines the Double Ratchet Algorithm, prekeys, and a Triple Diffie-Hellman (3XDH) handshake.[117] It uses Curve25519, AES-256, and HMAC-SHA256 as primitives.[12] The protocol provides confidentiality, integrity, authentication, participant consistency, destination validation, forward secrecy, backward secrecy (aka future secrecy), causality preservation, message unlinkability, message repudiation, participation repudiation, and asynchronicity.[118] It does not provide anonymity preservation, and requires servers for the relaying of messages and storing of public key material.[118]

The Signal Protocol also supports end-to-end encrypted group chats. The group chat protocol is a combination of a pairwise double ratchet and multicast encryption.[118] In addition to the properties provided by the one-to-one protocol, the group chat protocol provides speaker consistency, out-of-order resilience, dropped message resilience, computational equality, trust equality, subgroup messaging, as well as contractible and expandable membership.[118]

In October 2014, researchers from Ruhr University Bochum published an analysis of the Signal Protocol.[12] Among other findings, they presented an unknown key-share attack on the protocol, but in general, they found that it was secure.[119] In October 2016, researchers from UK's University of Oxford, Queensland University of Technology in Australia, and Canada's McMaster University published a formal analysis of the protocol.[120][121] They concluded that the protocol was cryptographically sound.[120][121] In July 2017, researchers from Ruhr University Bochum found during another analysis of group messengers a purely theoretic attack against the group protocol of Signal: A user who knows the secret group ID of a group (due to having been a group member previously or stealing it from a member's device) can become a member of the group. Since the group ID cannot be guessed and such member changes are displayed to the remaining members, this attack is likely to be difficult to carry out without being detected.[122]

As of August 2018, the Signal Protocol has been implemented into WhatsApp, Facebook Messenger, Skype,[123] and Google Allo,[124] making it possible for the conversations of "more than a billion people worldwide" to be end-to-end encrypted.[125] In Google Allo, Skype and Facebook Messenger, conversations are not encrypted with the Signal Protocol by default; they only offer end-to-end encryption in an optional mode.[87][126][123][127]

Up until March 2017, Signal's voice calls were encrypted with SRTP and the ZRTP key-agreement protocol, which was developed by Phil Zimmermann.[1][128] As of March 2017, Signal's voice and video calling functionalities use the app's Signal Protocol channel for authentication instead of ZRTP.[129][72][10]

Authentication

To verify that a correspondent is really the person that they claim to be, Signal users can compare key fingerprints (or scan QR codes) out-of-band.[81] The app employs a trust on first use mechanism in order to notify the user if a correspondent's key changes.[81]

Servers

Signal relies on centralized servers that are maintained by Signal Messenger. In addition to routing Signal's messages, the servers also facilitate the discovery of contacts who are also registered Signal users and the automatic exchange of users' public keys. By default, Signal's voice and video calls are peer-to-peer.[10] If the caller is not in the receiver's address book, the call is routed through a server in order to hide the users' IP addresses.[10]

Contact discovery

The servers store registered users' phone numbers, public key material and push tokens which are necessary for setting up calls and transmitting messages.[130] In order to determine which contacts are also Signal users, cryptographic hashes of the user's contact numbers are periodically transmitted to the server.[131] The server then checks to see if those match any of the SHA256 hashes of registered users and tells the client if any matches are found.[131] The hashed numbers are thereafter discarded from the server.[130] In 2014, Moxie Marlinspike wrote that it is easy to calculate a map of all possible hash inputs to hash outputs and reverse the mapping because of the limited preimage space (the set of all possible hash inputs) of phone numbers, and that a "practical privacy preserving contact discovery remains an unsolved problem."[132][131] In September 2017, Signal's developers announced that they were working on a way for the Signal client applications to "efficiently and scalably determine whether the contacts in their address book are Signal users without revealing the contacts in their address book to the Signal service."[133][134]

Metadata

All client-server communications are protected by TLS.[128][135] In October 2018, Signal deployed a "Sealed Sender" feature which encrypts the sender's information using the sender and recipient identity keys, and includes it inside the message. With this feature Signal's servers can no longer see who is sending messages to whom.[136] Signal's privacy policy states that any identifiers are only kept on the servers as long as necessary in order to place each call or transmit each message.[130] Signal's developers have asserted that their servers do not keep logs about who called whom and when.[137] In June 2016, Marlinspike told The Intercept that "the closest piece of information to metadata that the Signal server stores is the last time each user connected to the server, and the precision of this information is reduced to the day, rather than the hour, minute, and second".[87]

The group messaging mechanism is designed so that the servers do not have access to the membership list, group title, or group icon.[60] Instead, the creation, updating, joining, and leaving of groups is done by the clients, which deliver pairwise messages to the participants in the same way that one-to-one messages are delivered.[138][139]

Federation

Signal's server architecture was federated between December 2013 and February 2016. In December 2013, it was announced that the messaging protocol Signal uses had successfully been integrated into the Android-based open-source operating system CyanogenMod.[140][141][142] Since CyanogenMod 11.0, the client logic was contained in a system app called WhisperPush. According to Signal's developers, the Cyanogen team ran their own Signal messaging server for WhisperPush clients, which federated with the main server, so that both clients could exchange messages with each other.[142] The WhisperPush source code was available under the GPLv3 license.[143] In February 2016, the CyanogenMod team discontinued WhisperPush and recommended that its users switch to Signal.[144] In May 2016, Moxie Marlinspike wrote that federation with the CyanogenMod servers had degraded the user experience and held back development, and that their servers will probably not federate with other servers again.[145]

In May 2016, Moxie Marlinspike requested that a third-party client called LibreSignal not use the Signal service or the Signal name.[145] As a result, on 24 May 2016 the LibreSignal project posted that the project was "abandoned".[146] The functionality provided by LibreSignal was subsequently incorporated into Signal by Marlinspike.[147]

Licensing

The complete source code of the Signal clients for Android, iOS and desktop is available on GitHub under a free software license.[5][6][7] This enables interested parties to examine the code and help the developers verify that everything is behaving as expected. It also allows advanced users to compile their own copies of the applications and compare them with the versions that are distributed by Signal Messenger. In March 2016, Moxie Marlinspike wrote that, apart from some shared libraries that are not compiled with the project build due to a lack of Gradle NDK support, Signal for Android is reproducible.[148] Signal's servers are also open source.[8]

Distribution

Signal is officially distributed through the Google Play store, Apple's App Store, and the official website. Applications distributed via Google Play are signed by the developer of the application, and the Android operating system checks that updates are signed with the same key, preventing others from distributing updates that the developer themselves did not sign.[149][150] The same applies to iOS applications that are distributed via Apple's App Store.[151] As of March 2017, the Android version of Signal can also be downloaded as a separate APK package binary from Signal Messenger's website.[152]

Reception

In October 2014, the Electronic Frontier Foundation (EFF) included Signal in their updated surveillance self-defense guide.[153] In November 2014, Signal received a perfect score on the EFF's secure messaging scorecard;[80] it received points for having communications encrypted in transit, having communications encrypted with keys the provider doesn't have access to (end-to-end encryption), making it possible for users to independently verify their correspondents' identities, having past communications secure if the keys are stolen (forward secrecy), having the code open to independent review (open source), having the security designs well-documented, and having a recent independent security audit.[80] At the time, "ChatSecure + Orbot", Pidgin (with OTR), Silent Phone, and Telegram's optional "secret chats" also received seven out of seven points on the scorecard.[80]

On December 28, 2014, Der Spiegel published slides from an internal NSA presentation dating to June 2012 in which the NSA deemed Signal's encrypted voice calling component (RedPhone) on its own as a "major threat" to its mission, and when used in conjunction with other privacy tools such as Cspace, Tor, Tails, and TrueCrypt was ranked as "catastrophic", leading to a "near-total loss/lack of insight to target communications, presence..."[154][155]

Former NSA contractor Edward Snowden has endorsed Signal on multiple occasions.[65] In his keynote speech at SXSW in March 2014, he praised Signal's predecessors (TextSecure and RedPhone) for their ease of use.[156] During an interview with The New Yorker in October 2014, he recommended using "anything from Moxie Marlinspike and Open Whisper Systems".[157] During a remote appearance at an event hosted by Ryerson University and Canadian Journalists for Free Expression in March 2015, Snowden said that Signal is "very good" and that he knew the security model.[158] Asked about encrypted messaging apps during a Reddit AMA in May 2015, he recommended Signal.[159][160] In November 2015, Snowden tweeted that he used Signal "every day".[64][161]

In September 2015, the American Civil Liberties Union called on officials at the U.S. Capitol to ensure that lawmakers and staff members have secure communications technology.[162] One of the applications that the ACLU recommended in their letter to the Senate Sergeant at Arms and to the House Sergeant at Arms was Signal, writing:

One of the most widely respected encrypted communication apps, Signal, from Open Whisper Systems, has received significant financial support from the U.S. government, has been audited by independent security experts, and is now widely used by computer security professionals, many of the top national security journalists, and public interest advocates. Indeed, members of the ACLU’s own legal department regularly use Signal to make encrypted telephone calls.[163]

In March 2017, Signal was approved by the Sergeant at Arms of the U.S. Senate for use by senators and their staff.[164][165]

Following the 2016 Democratic National Committee email leak, Vanity Fair reported that Marc Elias, the general counsel for Hillary Clinton's presidential campaign, had instructed DNC staffers to exclusively use Signal when saying anything "remotely contentious or disparaging" about Republican presidential nominee Donald Trump.[166][167]

In February 2020, the European Commission has recommended that its staff use Signal.[168] Concurrently with the George Floyd protests, Signal was downloaded 121,000 times in the United States between 25 May and 4 June in 2020.[169] Twitter CEO Jack Dorsey advised the public to download Signal as protests spread in the US.[170]

In July 2020, Signal became the most downloaded app in Hong Kong on both Apple's App Store and Google's Play Store after the passage of the Hong Kong National Security Law.[171]

As of 2020, Signal is one of the contact methods to securely provide tips to major news outlets such as Washington Post,[172] The Guardian,[173] New York Times[174] and Wall Street Journal.[175]

Blocking

  Countries where Signal's domain fronting is enabled by default
  Countries where Signal is blocked (January 2018)

In December 2016, Egypt blocked access to Signal.[176] In response, Signal's developers added domain fronting to their service.[177] This allows Signal users in a specific country to circumvent censorship by making it look like they are connecting to a different internet-based service.[177][178] As of October 2017, Signal's domain fronting is enabled by default in Egypt, the United Arab Emirates, Oman and Qatar.[179]

As of January 2018, Signal is blocked in Iran.[180][181] Signal's domain fronting feature relies on the Google App Engine service.[181][180] This does not work in Iran because Google has blocked Iranian access to GAE in order to comply with U.S. sanctions.[180][182]

In early 2018, Google App Engine made an internal change to stop domain fronting for all countries. Due to this issue, Signal made a public change to use Amazon CloudFront for domain fronting. However, AWS also announced that they would be making changes to their service to prevent domain fronting. As a result, Signal said that they would start investigating new methods/approaches.[183][184] Signal switched from AWS back to Google in April 2019.[185]

Developers and funding

The development of Signal and its predecessors at Open Whisper Systems was funded by a combination of consulting contracts, donations and grants.[186] The Freedom of the Press Foundation acted as Signal's fiscal sponsor.[74][187][188] Between 2013 and 2016, the project received grants from the Knight Foundation,[189] the Shuttleworth Foundation,[190] and almost $3M from the US-Government sponsored Open Technology Fund.[191] Signal is now developed by Signal Messenger LLC, a software company founded by Moxie Marlinspike and Brian Acton in 2018, which is wholly owned by a tax-exempt nonprofit corporation called the Signal Technology Foundation, also created by them in 2018. The Foundation was funded with an initial loan of $50 million from Acton, "to support, accelerate, and broaden Signal's mission of making private communication accessible and ubiquitous."[74][14][192] All of the organization's products are published as free and open-source software.

See also

References

  1. ^ a b c d Greenberg, Andy (July 29, 2014). "Your iPhone Can Finally Make Free, Encrypted Calls". Wired. Archived from the original on January 18, 2015. Retrieved January 18, 2015.
  2. ^ Marlinspike, Moxie (July 29, 2014). "Free, Worldwide, Encrypted Phone Calls for iPhone". Open Whisper Systems. Archived from the original on August 31, 2017. Retrieved January 16, 2017.
  3. ^ a b c d Nonnenberg, Scott (October 31, 2017). "Standalone Signal Desktop". Open Whisper Systems. Archived from the original on February 15, 2020. Retrieved October 31, 2017.
  4. ^ a b "Installing Signal - Signal Support". Archived from the original on February 23, 2020. Retrieved March 20, 2019.
  5. ^ a b c Open Whisper Systems. "Signal-iOS". GitHub. Archived from the original on November 11, 2014. Retrieved January 14, 2015.
  6. ^ a b c Open Whisper Systems. "Signal-Android". GitHub. Archived from the original on December 30, 2015. Retrieved November 5, 2015.
  7. ^ a b c d Open Whisper Systems. "Signal-Desktop". GitHub. Archived from the original on April 8, 2016. Retrieved April 7, 2016.
  8. ^ a b c Open Whisper Systems. "Signal-Server". GitHub. Archived from the original on December 28, 2016. Retrieved November 21, 2016.
  9. ^ a b Signal [@signalapp] (May 1, 2017). "Today's Signal release for Android, iOS, and Desktop includes the ability to send arbitrary file types" (Tweet). Retrieved November 5, 2018 – via Twitter.
  10. ^ a b c d e f Mott, Nathaniel (March 14, 2017). "Signal's Encrypted Video Calling For iOS, Android Leaves Beta". Tom's Hardware. Purch Group, Inc. Retrieved March 14, 2017.
  11. ^ a b Perez, Josh (September 2, 2020). "Release v1.35.1". github.com. Signal. Retrieved September 3, 2020.
  12. ^ a b c d Frosch et al. 2016
  13. ^ a b c Schröder et al. 2016
  14. ^ a b c d Greenberg, Andy (February 21, 2018). "WhatsApp Co-Founder Puts $50M Into Signal To Supercharge Encrypted Messaging". Wired. Condé Nast. Archived from the original on February 22, 2018. Retrieved February 21, 2018.
  15. ^ "Announcing the public beta". Whisper Systems. May 25, 2010. Archived from the original on May 30, 2010. Retrieved January 22, 2015.
  16. ^ Cheredar, Tom (November 28, 2011). "Twitter acquires Android security startup Whisper Systems". VentureBeat. Retrieved December 21, 2011.
  17. ^ Yadron, Danny (July 9, 2015). "Moxie Marlinspike: The Coder Who Encrypted Your Texts". The Wall Street Journal. Retrieved July 10, 2015.
  18. ^ "TextSecure is now Open Source!". Whisper Systems. December 20, 2011. Archived from the original on January 6, 2012. Retrieved January 22, 2015.
  19. ^ "RedPhone is now Open Source!". Whisper Systems. July 18, 2012. Archived from the original on July 31, 2012. Retrieved January 22, 2015.
  20. ^ Yadron, Danny (July 10, 2015). "What Moxie Marlinspike Did at Twitter". Digits. The Wall Street Journal. Archived from the original on March 18, 2016. Retrieved September 27, 2016.
  21. ^ "A New Home". Open Whisper Systems. January 21, 2013. Retrieved March 1, 2014.
  22. ^ Donohue, Brian (February 24, 2014). "TextSecure Sheds SMS in Latest Version". Threatpost. Retrieved July 14, 2016.
  23. ^ Greenberg, Andy (July 29, 2014). "Your iPhone Can Finally Make Free, Encrypted Calls". Wired. Retrieved January 18, 2015.
  24. ^ Evans, Jon (July 29, 2014). "Talk Private To Me: Free, Worldwide, Encrypted Voice Calls With Signal For iPhone". TechCrunch. AOL.
  25. ^ Open Whisper Systems (March 6, 2015). "Saying goodbye to encrypted SMS/MMS". Retrieved March 24, 2016.
  26. ^ Geuss, Megan (March 3, 2015). "Now you can easily send (free!) encrypted messages between Android, iOS". Ars Technica. Retrieved March 3, 2015.
  27. ^ Greenberg, Andy (November 2, 2015). "Signal, the Snowden-Approved Crypto App, Comes to Android". Wired. Condé Nast. Retrieved March 19, 2016.
  28. ^ Franceschi-Bicchierai, Lorenzo (December 2, 2015). "Snowden's Favorite Chat App Is Coming to Your Computer". Motherboard. Vice Media LLC. Retrieved December 4, 2015.
  29. ^ Coldewey, Devin (October 31, 2017). "Signal escapes the confines of the browser with a standalone desktop app". TechCrunch. Oath Tech Network. Retrieved October 31, 2017.
  30. ^ Marlinspike, Moxie (February 14, 2017). "Video calls for Signal now in public beta". Open Whisper Systems. Retrieved February 15, 2017.
  31. ^ Mott, Nathaniel (March 14, 2017). "Signal's Encrypted Video Calling For iOS, Android Leaves Beta". Tom's Hardware. Purch Group, Inc. Retrieved March 14, 2017.
  32. ^ Marlinspike, Moxie; Acton, Brian (February 21, 2018). "Signal Foundation". Signal.org. Retrieved February 21, 2018.
  33. ^ Greenberg, Andy (February 21, 2018). "WhatsApp Co-Founder Puts $50M Into Signal To Supercharge Encrypted Messaging". Wired. Condé Nast. Retrieved February 21, 2018.
  34. ^ Lund, Joshua (November 27, 2019). "Signal for iPad, and other iOS improvements". Signal.org. Signal Messenger. Retrieved December 1, 2019.
  35. ^ Greenberg, Andy (February 14, 2020). "Signal Is Finally Bringing Its Secure Messaging to the Masses". Wired. Condé Nast. Retrieved February 15, 2020.
  36. ^ Lund, Joshua (August 12, 2020). "Accept the unexpected: Message requests are now available in Signal". signal.org. Signal Messenger. Retrieved September 3, 2020.
  37. ^ Lund, Joshua (August 13, 2020). "A new platform is calling: Help us test one-to-one voice and video conversations on Signal Desktop". signal.org. Signal Messenger. Retrieved September 3, 2020.
  38. ^ Perez, Josh (September 2, 2020). "Release v1.35.1". github.com. Signal. Retrieved September 3, 2020.
  39. ^ a b Porter, Jon (December 15, 2020). "Signal adds support for encrypted group video calls". The Verge. Vox Media. Retrieved December 18, 2020.
  40. ^ a b c d Wiener, Anna (October 19, 2020). "Taking Back Our Privacy : Moxie Marlinspike, the founder of the end-to-end encrypted messaging service Signal, is "trying to bring normality to the Internet."". The New Yorker. Archived from the original on October 27, 2020. Retrieved October 27, 2020.
  41. ^ a b "Announcing the public beta". Whisper Systems. May 25, 2010. Archived from the original on May 30, 2010. Retrieved January 22, 2015.
  42. ^ a b c Garling, Caleb (December 20, 2011). "Twitter Open Sources Its Android Moxie | Wired Enterprise". Wired. Archived from the original on December 22, 2011. Retrieved December 21, 2011.
  43. ^ "Company Overview of Whisper Systems Inc". Bloomberg Businessweek. Retrieved March 4, 2014.
  44. ^ Greenberg, Andy (May 25, 2010). "Android App Aims to Allow Wiretap-Proof Cell Phone Calls". Forbes. Archived from the original on January 21, 2012. Retrieved February 28, 2014.
  45. ^ Cheredar, Tom (November 28, 2011). "Twitter acquires Android security startup Whisper Systems". VentureBeat. Archived from the original on December 12, 2011. Retrieved December 21, 2011.
  46. ^ Yadron, Danny (July 9, 2015). "Moxie Marlinspike: The Coder Who Encrypted Your Texts". The Wall Street Journal. Archived from the original on July 12, 2015. Retrieved July 10, 2015.
  47. ^ Greenberg, Andy (November 28, 2011). "Twitter Acquires Moxie Marlinspike's Encryption Startup Whisper Systems". Forbes. Archived from the original on December 14, 2011. Retrieved December 21, 2011.
  48. ^ Garling, Caleb (November 28, 2011). "Twitter Buys Some Middle East Moxie | Wired Enterprise". Wired. Archived from the original on December 22, 2011. Retrieved December 21, 2011.
  49. ^ Aniszczyk, Chris (December 20, 2011). "The Whispers Are True". The Twitter Developer Blog. Twitter. Archived from the original on October 24, 2014. Retrieved January 22, 2015.
  50. ^ "TextSecure is now Open Source!". Whisper Systems. December 20, 2011. Archived from the original on January 6, 2012. Retrieved January 22, 2015.
  51. ^ Pachal, Pete (December 20, 2011). "Twitter Takes TextSecure, Texting App for Dissidents, Open Source". Mashable. Archived from the original on March 7, 2014. Retrieved March 1, 2014.
  52. ^ "RedPhone is now Open Source!". Whisper Systems. July 18, 2012. Archived from the original on July 31, 2012. Retrieved January 22, 2015.
  53. ^ a b "A New Home". Open Whisper Systems. January 21, 2013. Archived from the original on April 29, 2013. Retrieved March 1, 2014.
  54. ^ a b c d Donohue, Brian (February 24, 2014). "TextSecure Sheds SMS in Latest Version". Threatpost. Archived from the original on February 15, 2017. Retrieved July 14, 2016.
  55. ^ a b Mimoso, Michael (July 29, 2014). "New Signal App Brings Encrypted Calling to iPhone". Threatpost. Archived from the original on January 18, 2015. Retrieved January 25, 2015.
  56. ^ a b Evans, Jon (July 29, 2014). "Talk Private To Me: Free, Worldwide, Encrypted Voice Calls With Signal For iPhone". TechCrunch. AOL. Archived from the original on June 4, 2016. Retrieved June 25, 2017.
  57. ^ Lee, Micah (March 2, 2015). "You Should Really Consider Installing Signal, an Encrypted Messaging App for iPhone". The Intercept. Archived from the original on March 3, 2015. Retrieved March 3, 2015.
  58. ^ Geuss, Megan (March 3, 2015). "Now you can easily send (free!) encrypted messages between Android, iOS". Ars Technica. Archived from the original on March 3, 2015. Retrieved March 3, 2015.
  59. ^ Open Whisper Systems (March 6, 2015). "Saying goodbye to encrypted SMS/MMS". Archived from the original on August 24, 2017. Retrieved March 24, 2016.
  60. ^ a b c Rottermanner et al. 2015, p. 3
  61. ^ BastienLQ (April 20, 2016). "Change the name of SMSSecure". GitHub (pull request). SilenceIM. Archived from the original on February 23, 2020. Retrieved August 27, 2016.
  62. ^ "TextSecure-Fork bringt SMS-Verschlüsselung zurück". Heise (in German). April 2, 2015. Archived from the original on November 19, 2018. Retrieved July 29, 2015.
  63. ^ "SMSSecure: TextSecure-Abspaltung belebt SMS-Verschlüsselung wieder". Der Standard (in German). April 3, 2015. Archived from the original on November 20, 2018. Retrieved August 1, 2015.
  64. ^ a b Greenberg, Andy (November 2, 2015). "Signal, the Snowden-Approved Crypto App, Comes to Android". Wired. Condé Nast. Archived from the original on January 26, 2018. Retrieved March 19, 2016.
  65. ^ a b Franceschi-Bicchierai, Lorenzo (December 2, 2015). "Snowden's Favorite Chat App Is Coming to Your Computer". Motherboard. Vice Media LLC. Archived from the original on December 16, 2016. Retrieved December 4, 2015.
  66. ^ Coldewey, Devin (April 7, 2016). "Now's your chance to try Signal's desktop Chrome app". TechCrunch. AOL Inc. Archived from the original on October 21, 2019. Retrieved May 5, 2016.
  67. ^ Marlinspike, Moxie (September 26, 2016). "Desktop support comes to Signal for iPhone". Open Whisper Systems. Archived from the original on July 7, 2017. Retrieved September 26, 2016.
  68. ^ Coldewey, Devin (October 31, 2017). "Signal escapes the confines of the browser with a standalone desktop app". TechCrunch. Oath Tech Network. Archived from the original on May 14, 2019. Retrieved October 31, 2017.
  69. ^ a b c d Perlroth, Nicole; Benner, Katie (October 4, 2016). "Subpoenas and Gag Orders Show Government Overreach, Tech Companies Argue". The New York Times. The New York Times Company. Archived from the original on January 24, 2020. Retrieved October 4, 2016.
  70. ^ a b Kaufman, Brett Max (October 4, 2016). "New Documents Reveal Government Effort to Impose Secrecy on Encryption Company" (Blog post). American Civil Liberties Union. Archived from the original on July 25, 2017. Retrieved October 4, 2016.
  71. ^ a b "Grand jury subpoena for Signal user data, Eastern District of Virginia". Open Whisper Systems. October 4, 2016. Archived from the original on August 29, 2017. Retrieved October 4, 2016.
  72. ^ a b Marlinspike, Moxie (February 14, 2017). "Video calls for Signal now in public beta". Open Whisper Systems. Archived from the original on March 15, 2017. Retrieved February 15, 2017.
  73. ^ Marlinspike, Moxie (March 13, 2017). "Video calls for Signal out of beta". Open Whisper Systems. Archived from the original on March 15, 2017. Retrieved July 17, 2017.
  74. ^ a b c d Marlinspike, Moxie; Acton, Brian (February 21, 2018). "Signal Foundation". Signal.org. Archived from the original on February 16, 2020. Retrieved February 21, 2018.
  75. ^ a b Greenberg, Andy (February 14, 2020). "Signal Is Finally Bringing Its Secure Messaging to the Masses". Wired. Condé Nast. Archived from the original on February 14, 2020. Retrieved February 15, 2020.
  76. ^ "Twitter CEO Jack Dorsey says download Signal as US protests gain steam". indiatimes.com. The Economic Times. June 5, 2020. Retrieved November 3, 2020.
  77. ^ a b Nierenberg, Amelia (June 12, 2020). "Signal Downloads Are Way Up Since the Protests Began". The New York Times. Archived from the original on June 25, 2020.
  78. ^ Lyngaas, Sean (June 4, 2020). "Signal aims to boost protesters' phone security at George Floyd demonstrations with face-blurring tool". CyberScoop. Archived from the original on June 14, 2020. Retrieved June 14, 2020.
  79. ^ Lund, Joshua (November 1, 2017). "Expanding Signal GIF search". Open Whisper Systems. Archived from the original on September 23, 2019. Retrieved November 9, 2017.
  80. ^ a b c d "Secure Messaging Scorecard. Which apps and tools actually keep your messages safe?". Electronic Frontier Foundation. November 4, 2014. Archived from the original on July 28, 2016. Retrieved August 27, 2016.
  81. ^ a b c d e Rottermanner et al. 2015, p. 5
  82. ^ "Archived copy". Archived from the original on June 22, 2018. Retrieved June 22, 2018.{{cite web}}: CS1 maint: archived copy as title (link)
  83. ^ a b Rottermanner et al. 2015, p. 9
  84. ^ a b "Screen Lock". support.signal.org. Signal. n.d. Archived from the original on February 15, 2020. Retrieved November 22, 2018.
  85. ^ a b c d Greenberg, Andy (October 11, 2016). "Signal, the Cypherpunk App of Choice, Adds Disappearing Messages". Wired. Condé Nast. Archived from the original on October 12, 2016. Retrieved October 11, 2016.
  86. ^ a b Marlinspike, Moxie (October 11, 2016). "Disappearing messages for Signal". Open Whisper Systems. Archived from the original on June 13, 2017. Retrieved October 11, 2016.
  87. ^ a b c Lee, Micah (June 22, 2016). "Battle of the Secure Messaging Apps: How Signal Beats WhatsApp". The Intercept. First Look Media. Archived from the original on February 19, 2017. Retrieved September 6, 2016.
  88. ^ "How do I know if my message was delivered or read?". Signal Support Center. Signal Messenger. Archived from the original on January 29, 2020. Retrieved February 22, 2019.
  89. ^ "Typing Indicators". Signal Support Center. Signal Messenger. Archived from the original on February 23, 2019. Retrieved February 22, 2019.
  90. ^ O'Flaherty, Kate. "Signal Will Now Blur Protesters' Faces: Here's How It Works". Forbes. Archived from the original on June 4, 2020. Retrieved June 5, 2020.
  91. ^ Vincent, James (June 4, 2020). "Signal announces new face-blurring tool for Android and iOS". The Verge. Archived from the original on June 4, 2020. Retrieved June 5, 2020.
  92. ^ Yeo, Amanda. "Signal's new blur tool will help hide protesters' identities". Mashable. Archived from the original on June 5, 2020. Retrieved June 5, 2020.
  93. ^ "Blur tools for Signal". signal.org. Archived from the original on June 5, 2020. Retrieved June 5, 2020.
  94. ^ a b Kolenkina, Masha (November 20, 2015). "Will any phone number work? How do I get a verification number?". Open Whisper Systems. Archived from the original on January 16, 2017. Retrieved December 20, 2015.
  95. ^ a b c d e Lee, Micah (September 28, 2017). "How to Use Signal Without Giving Out Your Phone Number". The Intercept. Archived from the original on January 22, 2020. Retrieved February 25, 2018.
  96. ^ a b "Troubleshooting multiple devices". support.signal.org. Signal Messenger LLC. Archived from the original on December 20, 2019. Retrieved March 20, 2019.
  97. ^ "Allow different kinds of identifiers for registration · Issue #1085 · signalapp/Signal-Android". GitHub. Archived from the original on February 15, 2020. Retrieved February 25, 2018.
  98. ^ "Discussion: A proposal for alternative primary identifiers". Signal Community. May 24, 2018. Archived from the original on June 28, 2020. Retrieved June 26, 2020.
  99. ^ a b "Signal Blog: Secure Value Recovery". signal.org. Archived from the original on June 19, 2020. Retrieved June 26, 2020.
  100. ^ "Signal Blog: Introducing Signal PINs". signal.org. Archived from the original on June 19, 2020. Retrieved June 27, 2020.
  101. ^ "Discussion: Technology Preview for secure value recovery". Signal Community. December 19, 2019.
  102. ^ "Tweet by Signal". Twitter. Archived from the original on December 24, 2019. Retrieved June 27, 2020.
  103. ^ "Tweet by Matthew Green". Twitter. December 19, 2019. Archived from the original on December 19, 2019. Retrieved June 26, 2020.
  104. ^ "Second Tweet by Matthew Green". Twitter. December 19, 2019. Archived from the original on December 19, 2019. Retrieved June 27, 2020.
  105. ^ "Third Tweet by Matthew Green". Twitter. June 9, 2020. Archived from the original on June 9, 2020. Retrieved June 27, 2020.
  106. ^ "Registration Lock". support.signal.org. Signal Messenger LLC. Archived from the original on November 14, 2019. Retrieved March 20, 2019.
  107. ^ a b c Marlinspike, Moxie (February 20, 2017). "Support for using Signal without Play Services". GitHub. Open Whisper Systems. Archived from the original on August 4, 2017. Retrieved February 24, 2017.
  108. ^ Kolenkina, Masha (February 25, 2016). "Why do I need Google Play installed to use Signal? How can I get Signal APK?". Open Whisper Systems. Archived from the original on April 2, 2016. Retrieved October 13, 2016.
  109. ^ Marlinspike, Moxie (March 6, 2015). "Saying goodbye to encrypted SMS/MMS". Open Whisper Systems. Archived from the original on August 24, 2017. Retrieved December 20, 2015.
  110. ^ "Can I send SMS/MMS with Signal?". support.signal.org. Signal Messenger LLC. Archived from the original on September 17, 2018. Retrieved March 20, 2019.
  111. ^ Marlinspike, Moxie (November 17, 2016). "Safety number updates". Open Whisper Systems. Archived from the original on July 17, 2017. Retrieved July 17, 2017.
  112. ^ a b Kolenkina, Masha. "Restoring messages on Signal Android". Signal.org. Open Whisper Systems. Archived from the original on July 31, 2018. Retrieved April 2, 2018.
  113. ^ "Encrypted backup". Signal Community (Internet forum). August 16, 2017. Archived from the original on February 23, 2020. Retrieved April 2, 2018.
  114. ^ "Media Not Exporting to XML #1619". GitHub. July 17, 2014. Retrieved December 21, 2017.
  115. ^ Marlinspike, Moxie (February 26, 2018). "Support for full backup/restore to sdcard". GitHub. Open Whisper Systems. Archived from the original on February 23, 2020. Retrieved April 2, 2018.
  116. ^ "Your next upgrade deserves an upgrade". signal.org. June 9, 2020. Archived from the original on August 7, 2020. Retrieved August 17, 2020.
  117. ^ Unger et al. 2015, p. 241
  118. ^ a b c d Unger et al. 2015, p. 239
  119. ^ Pauli, Darren. "Auditors find encrypted chat client TextSecure is secure". The Register. Archived from the original on November 4, 2014. Retrieved November 4, 2014.
  120. ^ a b Brook, Chris (November 10, 2016). "Signal Audit Reveals Protocol Cryptographically Sound". Threatpost. Kaspersky Lab. Archived from the original on February 14, 2017. Retrieved November 11, 2016.
  121. ^ a b Cohn-Gordon et al. 2016
  122. ^ Rösler, Paul; Mainka, Christian; Schwenk, Jörg (2017). "More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema" (PDF). Archived (PDF) from the original on November 19, 2019. Retrieved November 1, 2019. {{cite journal}}: Cite journal requires |journal= (help)
  123. ^ a b Lund, Joshua (January 11, 2018). "Signal partners with Microsoft to bring end-to-end encryption to Skype". Open Whisper Systems. Archived from the original on February 2, 2020. Retrieved January 17, 2018.
  124. ^ Marlinspike, Moxie (May 18, 2016). "Open Whisper Systems partners with Google on end-to-end encryption for Allo". Open Whisper Systems. Archived from the original on January 22, 2020. Retrieved August 22, 2018.
  125. ^ "Moxie Marlinspike - 40 under 40". Fortune. Time Inc. 2016. Archived from the original on February 3, 2017. Retrieved October 6, 2016.
  126. ^ Marlinspike, Moxie (July 8, 2016). "Facebook Messenger deploys Signal Protocol for end to end encryption". Open Whisper Systems. Archived from the original on July 1, 2017. Retrieved May 10, 2017.
  127. ^ Gebhart, Gennie (October 3, 2016). "Google's Allo Sends The Wrong Message About Encryption". Electronic Frontier Foundation. Archived from the original on August 30, 2018. Retrieved August 20, 2018.
  128. ^ a b Marlinspike, Moxie (July 17, 2012). "Encryption Protocols". GitHub. Archived from the original on September 5, 2015. Retrieved January 8, 2016.
  129. ^ Greenberg, Andy (February 14, 2017). "The Best Encrypted Chat App Now Does Video Calls Too". Wired. Condé Nast. Archived from the original on February 15, 2017. Retrieved February 15, 2017.
  130. ^ a b c "Privacy Policy". Signal Messenger LLC. May 25, 2018. Archived from the original on June 24, 2018. Retrieved June 24, 2018.
  131. ^ a b c Moxie Marlinspike (January 3, 2013). "The Difficulty Of Private Contact Discovery". Open Whisper Systems. Archived from the original on March 4, 2016. Retrieved January 14, 2016.
  132. ^ Rottermanner et al. 2015, p. 4
  133. ^ Marlinspike, Moxie (September 26, 2017). "Technology preview: Private contact discovery for Signal". Open Whisper Systems. Archived from the original on September 28, 2017. Retrieved September 28, 2017.
  134. ^ Greenberg, Andy (September 26, 2017). "Signal Has a Fix for Apps' Contact-Leaking Problem". Wired. Condé Nast. Archived from the original on September 27, 2017. Retrieved September 28, 2017.
  135. ^ Frosch et al. 2016, p. 7
  136. ^ "Signal >> Blog >> Technology preview: Sealed sender for Signal". Signal.org. October 29, 2018. Archived from the original on November 24, 2018.
  137. ^ Brandom, Russell (July 29, 2014). "Signal brings painless encrypted calling to iOS". The Verge. Archived from the original on February 3, 2015. Retrieved January 26, 2015.
  138. ^ Moxie Marlinspike (May 5, 2014). "Private Group Messaging". Open Whisper Systems. Archived from the original on July 14, 2014. Retrieved July 9, 2014.
  139. ^ Moxie Marlinspike (February 24, 2014). "The New TextSecure: Privacy Beyond SMS". Open Whisper Systems. Archived from the original on February 24, 2014. Retrieved February 26, 2014.
  140. ^ Andy Greenberg (December 9, 2013). "Ten Million More Android Users' Text Messages Will Soon Be Encrypted By Default". Forbes. Archived from the original on March 4, 2014. Retrieved February 28, 2014.
  141. ^ Seth Schoen (December 28, 2013). "2013 in Review: Encrypting the Web Takes A Huge Leap Forward". Electronic Frontier Foundation. Archived from the original on February 1, 2014. Retrieved March 1, 2014.
  142. ^ a b Moxie Marlinspike (December 9, 2013). "TextSecure, Now With 10 Million More Users". Open Whisper Systems. Archived from the original on February 25, 2014. Retrieved February 28, 2014.
  143. ^ CyanogenMod (January 7, 2014). "android_external_whispersystems_WhisperPush". GitHub. Archived from the original on June 28, 2015. Retrieved March 26, 2015.
  144. ^ Sinha, Robin (January 20, 2016). "CyanogenMod to Shutter WhisperPush Messaging Service on February 1". Gadgets360. NDTV. Archived from the original on October 11, 2016. Retrieved January 23, 2016.
  145. ^ a b Edge, Jake (May 18, 2016). "The perils of federated protocols". LWN.net. Archived from the original on September 14, 2016. Retrieved July 5, 2016.
  146. ^ Le Bihan, Michel (May 24, 2016). "README.md". GitHub. LibreSignal. Archived from the original on June 27, 2017. Retrieved November 6, 2016.
  147. ^ "Support for using Signal without Play Services · signalapp/Signal-Android@1669731". GitHub. Archived from the original on February 15, 2020. Retrieved January 3, 2020.
  148. ^ Marlinspike, Moxie (March 31, 2016). "Reproducible Signal builds for Android". Open Whisper Systems. Archived from the original on May 15, 2017. Retrieved March 31, 2016.
  149. ^ Marlinspike, Moxie (February 12, 2013). "moxie0 commented Feb 12, 2013". GitHub. Archived from the original on January 10, 2018. Retrieved October 13, 2016.
  150. ^ "Sign Your App". Android Studio. Archived from the original on December 28, 2019. Retrieved October 13, 2016.
  151. ^ "About Code Signing". Apple Developer. Apple. September 13, 2016. Archived from the original on November 7, 2017. Retrieved October 13, 2016.
  152. ^ "Signal Android APK". Open Whisper Systems. Archived from the original on February 16, 2020. Retrieved March 14, 2017.
  153. ^ "Surveillance Self-Defense. Communicating with Others". Electronic Frontier Foundation. October 23, 2014. Archived from the original on November 8, 2014. Retrieved January 25, 2015.
  154. ^ SPIEGEL Staff (December 28, 2014). "Prying Eyes: Inside the NSA's War on Internet Security". Der Spiegel. Archived from the original on January 24, 2015. Retrieved January 23, 2015.
  155. ^ "Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not" (PDF). Der Spiegel. December 28, 2014. Archived (PDF) from the original on October 8, 2018. Retrieved January 23, 2015.
  156. ^ Eddy, Max (March 11, 2014). "Snowden to SXSW: Here's How To Keep The NSA Out Of Your Stuff". PC Magazine: SecurityWatch. Archived from the original on March 16, 2014. Retrieved March 16, 2014.
  157. ^ "The Virtual Interview: Edward Snowden - The New Yorker Festival". YouTube. The New Yorker. October 11, 2014. Retrieved May 24, 2015.
  158. ^ Cameron, Dell (March 6, 2015). "Edward Snowden tells you what encrypted messaging apps you should use". The Daily Dot. Archived from the original on April 11, 2015. Retrieved May 24, 2015.
  159. ^ Yuhas, Alan (May 21, 2015). "NSA surveillance powers on the brink as pressure mounts on Senate bill – as it happened". The Guardian. Archived from the original on May 24, 2015. Retrieved May 24, 2015.
  160. ^ Beauchamp, Zack (May 21, 2015). "The 9 best moments from Edward Snowden's Reddit Q&A". Vox Media. Archived from the original on May 24, 2015. Retrieved May 24, 2015.
  161. ^ Barrett, Brian (February 25, 2016). "Apple Hires Lead Dev of Snowden's Favorite Messaging App". Wired. Condé Nast. Archived from the original on February 29, 2016. Retrieved March 2, 2016.
  162. ^ Nakashima, Ellen (September 22, 2015). "ACLU calls for encryption on Capitol Hill". The Washington Post. Nash Holdings LLC. Archived from the original on October 3, 2015. Retrieved September 22, 2015.
  163. ^ Macleod-Ball, Michael W.; Rottman, Gabe; Soghoian, Christopher (September 22, 2015). "The Civil Liberties Implications of Insecure Congressional Communications and the Need for Encryption" (PDF). Washington, DC: American Civil Liberties Union. pp. 5–6. Archived (PDF) from the original on September 22, 2015. Retrieved September 22, 2015.
  164. ^ Whittaker, Zack (May 16, 2017). "In encryption push, Senate staff can now use Signal for secure messaging". ZDNet. CBS Interactive. Archived from the original on July 19, 2017. Retrieved July 20, 2017.
  165. ^ Wyden, Ron (May 9, 2017). "Ron Wyden letter on Signal encrypted messaging". Documentcloud. Zack Whittaker, ZDNet. Archived from the original on June 6, 2017. Retrieved July 20, 2017.
  166. ^ Bilton, Nick (August 26, 2016). "How the Clinton Campaign Is Foiling the Kremlin". Vanity Fair. Condé Nast. Archived from the original on August 29, 2016. Retrieved September 1, 2016.
  167. ^ Blake, Andrew (August 27, 2016). "Democrats warned to use encryption weeks before email leaks". The Washington Times. The Washington Times, LLC. Archived from the original on September 1, 2016. Retrieved September 1, 2016.
  168. ^ "EU Commission to staff: Switch to Signal messaging app". Politico EU. February 20, 2020. Archived from the original on February 20, 2020. Retrieved February 20, 2020.
  169. ^ Molla, Rani (June 3, 2020). "From Citizen to Signal, the most popular apps right now reflect America's protests". Vox. Archived from the original on June 7, 2020. Retrieved June 7, 2020.
  170. ^ "Twitter CEO Jack Dorsey says download Signal as US protests gain steam". The Economic Times. Bennett, Coleman & Co. Ltd. Indo-Asian News Service. June 5, 2020. Archived from the original on June 7, 2020. Retrieved June 7, 2020.
  171. ^ Lee, Timothy B. (July 8, 2020). "Hong Kong downloads of Signal surge as residents fear crackdown". Ars Technica. Archived from the original on July 11, 2020. Retrieved July 12, 2020.
  172. ^ "How to share documents and news tips with Washington Post journalists". Washington Post. Archived from the original on June 4, 2020. Retrieved June 5, 2020.
  173. ^ Hoyland, Luke (September 19, 2016). "How to contact the Guardian securely". The Guardian. ISSN 0261-3077. Archived from the original on June 2, 2020. Retrieved June 5, 2020.
  174. ^ "Tips". The New York Times. December 14, 2016. ISSN 0362-4331. Archived from the original on June 9, 2020. Retrieved June 5, 2020.
  175. ^ "WSJ.com Secure Drop". www.wsj.com. Archived from the original on July 24, 2020. Retrieved June 5, 2020.
  176. ^ Cox, Joseph (December 19, 2016). "Signal Claims Egypt Is Blocking Access to Encrypted Messaging App". Motherboard. Vice Media LLC. Archived from the original on June 29, 2017. Retrieved July 20, 2017.
  177. ^ a b Marlinspike, Moxie (December 21, 2016). "Doodles, stickers, and censorship circumvention for Signal Android". Open Whisper Systems. Archived from the original on December 28, 2016. Retrieved July 20, 2017.
  178. ^ Greenberg, Andy (December 21, 2016). "Encryption App 'Signal' Fights Censorship with a Clever Workaround". Wired. Condé Nast. Archived from the original on July 11, 2017. Retrieved July 20, 2017.
  179. ^ "SignalServiceNetworkAccess.java". GitHub. Open Whisper Systems. Archived from the original on January 15, 2018. Retrieved October 5, 2017.
  180. ^ a b c Frenkel, Sheera (January 2, 2018). "Iranian Authorities Block Access to Social Media Tools". The New York Times. Archived from the original on January 16, 2018. Retrieved January 15, 2018.
  181. ^ a b "Domain Fronting for Iran #7311". GitHub. January 1, 2018. Retrieved January 15, 2018.
  182. ^ Brandom, Russell (January 2, 2018). "Iran blocks encrypted messaging apps amid nationwide protests". The Verge. Vox Media. Archived from the original on March 22, 2018. Retrieved March 23, 2018.
  183. ^ Marlinspike, Moxie (May 1, 2018). "A letter from Amazon". signal.org. Open Whisper Systems. Archived from the original on January 3, 2019. Retrieved January 10, 2019.
  184. ^ Gallagher, Sean (May 2, 2018). "Amazon blocks domain fronting, threatens to shut down Signal's account". Ars Technica. Condé Nast. Archived from the original on January 24, 2019. Retrieved January 23, 2019.
  185. ^ Parrelli, Greyson (April 4, 2019). "Attempt to resolve connectivity problems for some users". GitHub. Signal Messenger LLC. Retrieved May 2, 2019.
  186. ^ O'Neill, Patrick (January 3, 2017). "How Tor and Signal can maintain the fight for freedom in Trump's America". CyberScoop. Scoop News Group. Archived from the original on September 17, 2017. Retrieved September 16, 2017.
  187. ^ Timm, Trevor (December 8, 2016). "Freedom of the Press Foundation's new look, and our plans to protect press freedom for 2017". Freedom of the Press Foundation. Archived from the original on February 2, 2017. Retrieved January 25, 2017.
  188. ^ "Signal". Freedom of the Press Foundation. Archived from the original on March 20, 2018. Retrieved January 31, 2018.
  189. ^ "TextSecure". Knight Foundation. Retrieved January 5, 2015.
  190. ^ "Moxie Marlinspike". Shuttleworth Foundation. Archived from the original on November 15, 2016. Retrieved January 14, 2015.
  191. ^ "Open Whisper Systems". Open Technology Fund. Archived from the original on March 2, 2019. Retrieved March 1, 2019.
  192. ^ "Signal Technology Foundation". Nonprofit Explorer. Pro Publica Inc. Retrieved June 7, 2019.

Bibliography

Further reading