Oh wow, that is surprisingly bad.
Especially signals response.
But it didnât surprise me, because to earlier different issues like the Desktop one being less secure, they also just replied with thats not their Problem.
If you market yourself as a privacy and security messenger then you would expect them to take these issues serious.
Signal be like:
Signal instantly dismissed my report, saying it wasnât their responsibility and it was up to users to hide their identity
(source)
The president of Signal, Meredith Whittaker, stated on Twitter that itâs not within the softwareâs scope to protect users from such a level of compromise, where attackers have local access to the target systems.
(source)
We disclosed our findings to the Signal organization on October 20, 2020, and received an answer on October 28, 2020. In summary, they state that they do not treat a compromise of long-term secrets as part of their adversarial model. Therefore, they do not currently plan to mitigate the described attack or implement one of the proposed countermeasures.
(source)
Then when the fuck will they care about known vulnerabilities such as these?
I think itâs fine for Signal to have a very well-defined scope and stick with it, but at the same time itâs hard to excuse a privacy-focused provider making use of a CDN that has enough points of presence to enable this sort of side-channel attack. Thereâs really no winning for them though
Disappointing to see all affected parties playing the blame game. I wonder if SimpleX chat is affected because Iâm getting sick of Signalsâ attitude towards these kinds of issues.
Personally, I donât see what you expect Signal to do except use a CDN with fewer endpoints. And if they did that, then messages would load slower.
Signal already defaults to not relaying calls, which means that for calls between contacts, your IP is directly exposed to the other party. This is done for performance, quality, and cost-saving reasons.
If youâre worried about protecting your IP from websites you connect to, including Cloudflare and other CDNs, then this is a good advertisement for using a VPN or Tor.
Note that if you use a VPN in the default setting of âRecommendedâ, âFastestâ, or similar, then this may not do much against this specific issue. Youâll connect from your IP to the nearest VPN IP with capacity and then to the nearest CDN entry point.
Maybe the biggest takeaway is that users should always assume that the IP address that they are using to access online resources can be discovered (or estimated) by more parties than they may expect, and to take steps to protect it accordingly.
@phnx SimpleX uses server routing to help mitigate against things like this, but even they suggest using Orbot.
Aside from the discovery, Iâm very impressed with the age of the bounty hunter and the work quality.
Kudos and all success to them.
Unfortunate that this is the case, but I do somewhat expect this from Cloudflare. Theyâve done a lot of work towards making the internet a worse place generally. Thankful that this kid was able to discover the exploit and notified all involved.
Letâs leave discussion on the morality of Cloudflare in a different thread please
Iâm confused where you got the idea that I expect anything from Signal. What I said was that âIâm getting sick of their attitude towards these kinds of issues.â Signal is welcome to continue considering these issues out of scope, just as I am free to take issue with that and go elsewhere (such as SimpleX chat). I am disappointed that Signalâs position as the âgold-standardâ of private messengers has led to stagnation and a poor security culture within their organisation.
From their response in this case, call relaying is also beyond the scope of Signal since it is âup to users to hide their identityâ. Their stance on this is also wildly inconsistent. Link previews are a good example. They are either disabled or enabled with link previews generated on the senderâs client. Why bother if not to protect the recipient from leaking their IP to the website (and by extension potentially the sender) in zero-clicks?
A sane suggestion when you have users like journalists who cannot be expected to have a masterâs degree in computer science. For some users, these things matter, and even if Signal isnât going to fix it, an adequate warning couldnât hurt.
I think thereâs a distinction that needs to be made about what guarantees Signal actually gives you, because I donât think thatâs clear from this report (but it is very clear from Signalâs documentation).
- Nobody can see what is being said, except the participating devices in the conversation. This is where end-to-end encryption comes in.
- Once a message has reached the other end, itâs fair game. E2EEâs job is done once itâs reached the other end.
- The encryption key always ratchets forward to ensure a key is only used once, thereby limiting the impact of a compromise.
Thatâs pretty much it. There are some nuances (like, if you do a GIF search, they try to hide who is searching for what), but remember that Signal was originally just a means to encrypt SMS messages.
Signal doesnât promise anonymity.
Signal doesnât promise how data is secured on your device after the end-to-end encryption has done its job. If youâre worried about that, use your OSâs full disk encryption features with a secure passphrase. Also, pay attention to whatâs happening with NIST and their Accordion Mode workshops; a lot of this will directly be applied to Android device encryption in the future.
Signal has a lot of faults, but they donât falsely advertise their features.
I guess this is another win for carrier grade NAT /s
Well, this is why/another reason you use VPNs and enable multihop for good measure if you want.
Hope Signal expands their scope a bit to do a little more of such tangential issues as well.
Well, I donât agree with most of their excuses about not implementing some feature due to X reasons, take for example, local database encryption. Moxie (ex-signal dev) didnât want to implement it because he believed that âit will be stored in memory forever at first unlockâ, but Molly dev proved him wrong. There are multiple features that Signal just refuses to implement when it is entirely possible and will vastly improve userâs privacy or security.
Molly kept adding such features while Signal deliberately didnât do anything remarkable at all other than cryptography (which I respect btw), it is just a part of what makes messenger secure, there are a lot of other attack vectors you should be putting into account and mitigate when you are providing people with a whole instant messaging app and not just providing cryptographic primitives.
Hereâs a list of what features Molly have & going to have: Recommend Molly alongside Signal - #11 by jerm.
Some similar attack:
Link to Paper.
https://xcancel.com/SimpleXChat/status/1881781006404874692#m
No, we donât use Cloudflare, and media uploads are distributed across multiple network servers, so this attack wonât apply.
File servers do observe user IP addresses, but the user will be warned prior to downloading the files from untrusted file servers.
This limitation will be removed this year - file downloads will be proxied by trusted servers in all cases.
SimpleX Chat not affected.