Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I’ve always assumed signal was a honeypot. They publish some source code but obviously we can’t verify the actual code running on iOS or (I assume) Android devices am I right? It seems like publishing open source could be a smoke screen. When they push code to devices they could link in alternate libraries that do whatever they want. They may even be able to push special code to targeted phones, avoiding detection by security researchers.


If this is your threat model, you can sideload the app instead of installing from the app store. This way, you can verify that you have the same app as everyone else and have not fallen victim to a supply chain attack.

Ensuring you received an unmodified phone without a nefarious operating system or baseband is probably harder.


> If this is your threat model, you can sideload the app instead of installing from the app store.

Not on iOS.


If they'd care to publish it on F-Droid they'd have reproducible builds. But alas they don't.


> They publish some source code but obviously we can’t verify the actual code running on iOS or (I assume) Android devices am I right?

No, they have reproducible builds.

Everything else you said apply even more to other apps, not sure why you think Signal is more suspicious in that regard. But with reproducible builds and the .apk they have on their website, you can check that the source matches it every time you update, which is not something you can do with most other apps.


> they have reproducible builds.

Ah, I see on Android they do. Not iOS according to an open github issue since 2015.

I am suspicious of signal because everyone says "use Signal it is secure" and it is popularly known for this. Because of this reputation for security, users will get comfortable and talk about their illicit activity, which makes it an attractive target for power brokers the world over. Every app could have this problem, but Signal is the one everyone keeps saying is secure, so it's the place people will spill their secrets.

Reproducible builds on android look cool, but I wonder if there are other threat models on Android than dishonest builds of the program itself.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: