this post was submitted on 26 Jun 2023
634 points (100.0% liked)

Technology

37739 readers
624 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve:

  • Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.

  • Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).

  • Signal: date and time of account creation and date of last connection.

  • Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.

  • Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.

  • Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).

  • WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.

  • WhatsApp: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups.

  • Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.

TL;DR Signal is the messaging system that provides the least information to investigators.

(page 2) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 7 points 1 year ago (27 children)

Here's my foolproof method of not having any issue with the FBI: Don't do illegal stuff.

[–] [email protected] 7 points 1 year ago (2 children)

Tell that to trans people in Florida, or people seeking abortion healthcare on Texas

load more comments (2 replies)
[–] [email protected] 3 points 1 year ago (1 children)
load more comments (1 replies)
load more comments (25 replies)
[–] [email protected] 7 points 1 year ago

well this isn't as eye opening as I thought it would be. But thank you for the summary, really!

[–] [email protected] 7 points 1 year ago (4 children)

Whilst enlightening, it's kinda also useless. Let's be honest the majority of endusers use a particular app, in the main, because its most likely what everyone else in their friend group uses.

In my case WhatsApp, I'd struggle to get all my friends and family to change at this point.

[–] [email protected] 5 points 1 year ago

Took me a moment, but I converted most close contacts to Telegram. Not Meta-infested and solid apps including desktop.

It gets easier the more you already have.

[–] [email protected] 3 points 1 year ago (1 children)

In my case, I was running phone apps on an iPod Touch, and it couldn't run WhatsApp. So I convinced a core group of friends to get on Signal back Snowden rec'd it. And the way networks operate, it spread out from there.

load more comments (1 replies)
[–] [email protected] 3 points 1 year ago

You don’t “have to” use apps that compromise your security. If you really want to switch to better practices you can and can still thrive. I got and persuaded my whole company and friend groups off of bad apps. It’s possible.

load more comments (1 replies)
[–] [email protected] 6 points 1 year ago

damn this is pretty interesting. thanks for sharing.

[–] [email protected] 6 points 1 year ago

Great to see ever-mounting proof that end-to-end encryption works! This is why I'm on Matrix.

[–] [email protected] 5 points 1 year ago (2 children)

It seems like Signal, Telegram, and Threema are the best for now. Signal provides the least information, but for the majority of people, the stuff from Telegram are things the government already know, and I'm not sure how useful the Threema information is.

[–] [email protected] 4 points 1 year ago

I read it as Threema being about as secure as Signal if you don't give them your phone number & email and use the Libre version without Google push notifications.

[–] [email protected] 4 points 1 year ago

Just BC tele doesn't share data with FBI... Does mean they don't share with fsb.

[–] [email protected] 4 points 1 year ago (1 children)

Anyone use Session messenger? It doesn't need a phone number unlike Signal.

[–] [email protected] 4 points 1 year ago (1 children)

I've been using session as my family chat. The only thing I dislike is its connection to Oxen. But it makes an interesting case for resistance to Sybil attacks. But that's not really in my threat model for family messages lol. I'm mostly happy we moved the fuck away from messenger. I'll probably move them to matrix, but I gotta wait a bit before switching them again lol

In terms of usability, it's not hard to set up and has been very stable for the 1.5 years we've been using it. Even getting my less tech savvy family on it was pretty easy.

load more comments (1 replies)
[–] [email protected] 4 points 1 year ago

Ah the infamous wizardry of the backdoor in encryption discussion.

load more comments
view more: ‹ prev next ›