Hacker News new | past | comments | ask | show | jobs | submit login

I meant at the server. We have no way to know that is running there.



The point of end-to-end encrypted messaging is not having to care about what the server is running, which is why the threat models for most academic cryptographic research on these things is "assume a compromised server", and, if that gets you real compromises, the protocol is considered broken.


End to end encryption protects content. It doesn't protect things like information about who is talking to who. For that you need something like an onion network. As already mentioned, Briar uses Tor for that. Signal claims to not collect such information but my point is that we have no way to know what they collect. Claims don't count for anything for these sorts of things..


How can the server collect data you aren't sending to it?


The server is open source too. You could download it and run your own server, afaik.


Signal occasionally drops something that could be the server code.

When they were working on their cryptocurrency they didn't release anything for over a year.


isn't that what the e2e encryption is for?

I guess they could collect metadata of course




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: