Here’s what he said in a post on his telegram channel:

🤫 A story shared by Jack Dorsey, the founder of Twitter, uncovered that the current leaders of Signal, an allegedly “secure” messaging app, are activists used by the US state department for regime change abroad 🥷

🥸 The US government spent $3M to build Signal’s encryption, and today the exact same encryption is implemented in WhatsApp, Facebook Messenger, Google Messages and even Skype. It looks almost as if big tech in the US is not allowed to build its own encryption protocols that would be independent of government interference 🐕‍🦺

🕵️‍♂️ An alarming number of important people I’ve spoken to remarked that their “private” Signal messages had been exploited against them in US courts or media. But whenever somebody raises doubt about their encryption, Signal’s typical response is “we are open source so anyone can verify that everything is all right”. That, however, is a trick 🤡

🕵️‍♂️ Unlike Telegram, Signal doesn’t allow researchers to make sure that their GitHub code is the same code that is used in the Signal app run on users’ iPhones. Signal refused to add reproducible builds for iOS, closing a GitHub request from the community. And WhatsApp doesn’t even publish the code of its apps, so all their talk about “privacy” is an even more obvious circus trick 💤

🛡 Telegram is the only massively popular messaging service that allows everyone to make sure that all of its apps indeed use the same open source code that is published on Github. For the past ten years, Telegram Secret Chats have remained the only popular method of communication that is verifiably private 💪

Original post: https://t.me/durov/274

  • 乇ㄥ乇¢ㄒ尺ㄖ@infosec.pub
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    5 months ago

    Yeah, he needs to fix his broken secret chat feature first… I think it’s broken on purpose…

    After seeing his interview with Tucker Carlson, I’m 100% sure the guy has some really dark agenda…

  • winterayars@sh.itjust.works
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    I don’t think i care what Jack Dorsey says that isn’t backed up independently. Even if he’s right i just don’t trust him.

    • Dessalines@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      You shouldn’t need to trust open source, it should be independently verifiable. Unfortunately that’s not possible with either signal or telegram, as there’s no way to tell what server code they’re running.

      • delirious_owl@discuss.online
        link
        fedilink
        arrow-up
        0
        ·
        5 months ago

        If encryption happens client side then it doesn’t matter.

        Its where the server is open but the client is closed that we need to worry, as is the case with Beeper

        • ForgotAboutDre@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          5 months ago

          Closed sources server (even open source with no verification of the code running on the server) means it’s possible the server records who you talk to, when, where and the size of the messages. This can be useful to sell to advertisers.

          • Dark Arc@social.packetloss.gg
            link
            fedilink
            English
            arrow-up
            0
            ·
            5 months ago

            Cloud source server or open source server, you can’t know what server their running.

            Pavel’s whole argument here is basically the same thing for the client; “you can’t verify the build in the app store matches what’s in the source code, so you have no way of knowing it’s actually what you’re auditing.”

  • MrSoup@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Still got server-side code closed source and by default messages are not encrypted.

    • Nate@programming.dev
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      Not sure if you’re referring to telegram or signal. If you’re referring to signal:

      Is it private? Can I trust it? - Signal Support

      Signal conversations are always end-to-end encrypted, which means that they can only be read or heard by your intended recipients. Privacy isn’t an optional mode — it’s just the way that Signal works. Every message, every call, every time.

      The complete source code for the Signal clients and the Signal server is available on GitHub. This enables interested parties to examine the code for security and correctness.

      • MrSoup@lemmy.zip
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        5 months ago

        Having server-side source code open can help into finding not on purpose backdoors. But yes, no can verify that’s the same exact version used by the actual servers.

        • Dark Arc@social.packetloss.gg
          link
          fedilink
          English
          arrow-up
          0
          ·
          5 months ago

          That’s fair … especially in the case of something Telegram like where the server is a major portion of the security model (for non-secret chats).

          For truly private E2EE chats though the attacks on Telegram’s lack of an open source server side (and Signal’s presence of one) is fairly meaningless. If the client E2EE is correct and you’re using a reproducible build the server, and even any MITM (man in the middle), shouldn’t matter.

  • resetbypeer@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    5 months ago

    Dorsey isn’t that the guy who fell into the anti vacation rabbit hole and backed JRFK Jr ? I mean let’s be honest. If these guys are concerned then I am pretty sure it’s safe.

    • InternetCitizen2@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      It is an eye raiser, but it is also somewhat of a red herring. Tor is a very solid privacy browser that started as a government project; not sure if they are still funded today. Nothing is ever going to be a perfect solution (cat and mouse game), but it does strike me that Telegram is more concerned about features than it is about privacy.

      • FIST_FILLET@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        5 months ago

        oh damn, didn’t know about tor’s history either! thank you for the relief. faith restored cautiously

    • tcit@beehaw.org
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      Wait till you hear where the Tor money comes from. Funding is not a direct cause of issues.

      • FIST_FILLET@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        5 months ago

        just learned through another reply, thank you for putting my mind more at ease brothers 🤝

    • Fushuan [he/him]@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      It’s encrypted though?

      You are trusting their server security and them as a company, sure, but it is encrypted against the server for sure.

      It’s not as good as ir could be but that’s no reason to spread misinformation.

      • delirious_owl@discuss.online
        link
        fedilink
        arrow-up
        0
        ·
        5 months ago

        But extremely hard to use to the point that nobody uses them. I send a secret chat to someone and they write me back in the unencrypted chat.

        It shouldn’t be possible to send anything unencrypted

        • efstajas@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          5 months ago

          Tbf not all the chats being E2E encrypted is a UX compromise. It makes Telegram a lot nicer to use across devices and allows just accessing your messages from anywhere without needing your phone to be on. Plus no need to back up chats etc. because they’re all just on the server. As opposed to secret chats, which of course are bound to one particular device and can only be accessed from there.

          I’m all for E2E by default but I must say I actually like the idea of having a choice in this particular case.

          • delirious_owl@discuss.online
            link
            fedilink
            arrow-up
            0
            ·
            5 months ago

            There’s no reason for secret chsts to not be stored on the server and to not be synced to all your devices. We’ve had double ratchet for a while. Telegram rolling their own crypto is dumb for many reasons

            • efstajas@lemmy.world
              link
              fedilink
              arrow-up
              0
              ·
              5 months ago

              Correct me if I’m wrong, but even with double ratchet, retrieving and decrypting the message history is tricky / impossible, no? Afaik signal does allow you to receive new messages on multiple “linked devices”, but a new linked device doesn’t have access to any messaging history.

                • efstajas@lemmy.world
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  5 months ago

                  From a privacy POV, sure, not trying to argue that. Just saying that Telegram does have a bunch of features like that that wouldn’t really work if all chats were always E2E encrypted, so there’s a reason that it’s opt-in. Whether it’s a good one or not is up to you to decide for yourself.

                  Though I definitely think that Telegram could do a much better job explaining the trade-off, especially in a world where many major messengers are always e2e encrypted, and people somewhat expect it to be the default.

      • ReversalHatchery@beehaw.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        5 months ago

        Secret chats only. With their own, in-house encryption, that, if I remember correctly, the apps don’t use according to the specifications.

        Maybe I’m mixing up mtproto 1 and 2 with that second part, though.

        • dsemy@lemm.ee
          link
          fedilink
          English
          arrow-up
          0
          ·
          5 months ago

          I don’t mind in-house encryption (the Signal protocol didn’t just appear out of nowhere either), however the latter part is worrying.

          In any case, I personally don’t trust Signal or Telegram.

            • toastal@lemmy.ml
              link
              fedilink
              arrow-up
              0
              ·
              5 months ago

              The best is to not trust the centralized server of either of these platforms. Set up your own XMPP server & gives these the boot.

                • toastal@lemmy.ml
                  link
                  fedilink
                  arrow-up
                  0
                  ·
                  5 months ago

                  XMPP is battle-tested* and thriving*

                  I don’t think you know how many commercial use cases are relying on XMPP, nor how much the community has been working on updates. Older technologies tend to have maturity is spec but also in implementations where the servers are robust & already at the point of optimization over chasing features. We see this with how little specs it takes to run a server & have Conversation forks on Android have some of the best battery life & data plan usage in the chat space. The network is massively decentralized too… unlike Matrix where almost everyone is on Matrix.org or a server provided/hosted by Matrix.org giving them all the metadata.

            • dsemy@lemm.ee
              link
              fedilink
              English
              arrow-up
              0
              ·
              5 months ago

              Molly still depends on Signal’s centralized servers.

              Best solution I know of currently is SimpleX, though Veilid (and VeilidChat by extension) also seem promising, though it might take a while for those to be usable.

  • kellenoffdagrid❓️@lemmy.sdf.org
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Saw someone post that City Journal article on mastodon a couple days ago and I’m amazed that so few people picked that the City Journal and the article’s author are basically puppets of the Manhattan Institute, a conservative think tank. I know most people aren’t tuned to look out for think tank propaganda but it came off as really obviously FUD-y and unsubstantiated.

      • biscuitswalrus@aussie.zone
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        5 months ago

        Telegram isn’t encrypting chats (only secret chats).

        As far as reproducible builds telegram has got instructions and caveats or excuses around builds for the same issues signal does: https://core.telegram.org/reproducible-builds#reproducible-builds-for-ios

        Both easily make Android reproducible builds. This Twitter message is a rock being thrown in a glass house, knowing most people who consume Twitter like it’s a firehose, won’t swallow the nuance of the details.

        I don’t even, not to complete lengths.

      • onlooker@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        5 months ago

        I don’t know about reproducible builds, but Telegram has a slew of other problems. For example, they advertise that your messages are “heavily encrypted”, but this feature is restricted to secret chats which is NOT the default method of communication and they use their own weird-ass algorhythm called ProtoMT instead of one of many existing algorhythms which have been audited and verified. Not to mention you need to give them your phone number to use the app.

  • NotMyOldRedditName@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    You don’t need a backdoor in signal to bypass its encryption.

    All you need is to exploit the phone and wait for them to open or use signal.

    If you think your phone is safe from the NSA or similar services, I got some bad news for you.

    • emergencyfood@sh.itjust.works
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      All you need is to exploit the phone and wait for them to open or use signal.

      Physical access is root access. But just because you can’t make something NSA-proof dosen’t mean you can’t make it bloody difficult to break into.

      • NotMyOldRedditName@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        5 months ago

        There’s been enough zero day remote exploits that there’s bound to be more.

        Pretty sure there’s more than 1 about receiving an SMS and the payload rooting the phone and you not even knowing it happened. At least 1 but I think 2 or more.

        Something about a malicious image also rooting a phone.

        It goes on and on and phones don’t always get security updates.

        You can do your best, but then longer you use a given phone the higher the risk. That’s why people switch out phones frequently when doing shady or important shit

  • WolfLink@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Go read the GitHub issue. The main difficulty in implementing reproducible builds is the code signing Apple requires as well as other tweaks Apple makes to modify the binary from what the dev submits to what gets downloaded from the App Store. Note that Android already has reproducible builds. Also the reason the GitHub issue was closed wasn’t “refusal” to implement the feature, they wanted to move the discussion to their forums.

      • Thetimefarm@lemm.ee
        link
        fedilink
        arrow-up
        0
        ·
        5 months ago

        Who knows how apple decides to do anything? There may be some really stupid arbitrary reason apple modifies signal but not telegram just because apple insists on being difficult. If you don’t trust apple don’t use an iPhone and just download it on android.