Even State Department-funded Human Rights Watch admits that authorities combine legal and illegal methods to obtain convictions: https://text.hrw.org/report/2018/01/09/dark-side/secret-origins-evidence-us-criminal-cases

Combining dragnet surveillance with device hacking is intended in the design of both tools. Hence, State Department-funded Signal dupes you into handing over your identity as part of the population-centric mapping. In custody, your phone will be hacked when it is taken away if it’s important.

https://xcancel.com/hannahcrileyy/status/2034273723667161480#m

  • floquant@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    0
    ·
    9 days ago

    Sorry but both points are irrelevant, nonprofit foundations can still be forced to turn over user information. That is part of following the law so nothing that would need to be hidden to auditors, unless you were talking about encryption audits which is completely besides the point

    • syzygy@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      9 days ago

      What data is there for Signal to turn over? Can you prove that they’re keeping messages or logs on their servers that have ‘disappeared’ from all the associated devices?

      • Dessalines@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        9 days ago

        Your entire social network graphs, and timestamped message history.

        No one can “prove” signal doesn’t store everything. If you give me ssh access to their server, then I can verify. Otherwise it’s “just trust me bro”.

            • parzival@lemmy.org
              link
              fedilink
              arrow-up
              0
              ·
              8 days ago

              Its the largest part that matters, because if they don’t have that, they cannot secretly snoop into everyone’s plans (and share that info with ice/dns/etc.)

        • Tinidril@midwest.social
          link
          fedilink
          English
          arrow-up
          0
          ·
          8 days ago

          If you give me ssh access to their server, then I can verify. Otherwise it’s “just trust me bro”.

          What do you think an independent autit does?

      • WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        8 days ago

        the irrededeemable fact that you are using it, which matters because the government now just targets all the signal users. they can’t read your messages, so they are applying guilt by association.

    • xthexder@l.sw0.com
      link
      fedilink
      arrow-up
      0
      ·
      9 days ago

      The audits determined they don’t have any user information to provide. You can see this in previous government requests where the only thing provided was a timestamp of last connection to the network.