Wouldn’t you agree Signal claiming it hides the sender information with technical means, without doing anything about the IP-addresses, would be a LOT more misleading?
Signal can’t just see your IP address, they can at will, associate every ciphertext with recipient information with your IP address, to tell who talks to who, when, how much, and in which order. It can also infer group membership information based on tightly grouped 1:1 messages sent to each recipient.
It’s important Signal doesn’t process the sender information inside the server, that halves information that gets written on disk and message cache, and makes the stored ciphertexts even less valuable as it only has information about to whom a ciphertext is addressed. At most it shows who’s popular. That’s great. I don’t deny that at all.
But the only difference between that and full record of who talks to whom, how much, when etc, is an internal policy decision to not write the source IP address, reception timestamp etc as metadata for those ciphertexts.
Privacy by design is
-
Proactive not reactive; preventive not remedial
-
Privacy as the default setting
-
Privacy embedded into design
-
Full functionality – positive-sum, not zero-sum
-
End-to-end security – full lifecycle protection
-
Visibility and transparency – keep it open
-
Respect for user privacy – keep it user-centric
Here, points 1, 2, 3, 5 and 7 all point towards the same what end-to-end encryption is for content privacy: Something that’s done by the user (proactive), that is done by default, that is part of design, that is end-to-end == user to user, and that is user-centric (no weaseling out, and enforcing that behavior for the app so that it’s outside your control).
If the IP-addresses negate the sealed sender, Signal isn’t metadata-private by default. Signal can be dragged from hair into being metadata-private by design, by using Tor, burner phone, and prepaid SIM in a country that doesn’t check ID upon purchase. But that’s too many hoops for overwhelming majority of people.
Contrast that with Cwtch that bundles Tor, that connects to Tor automatically, spins up Onion Service automatically, creates peer-to-peer connection to contact through five proxies that all mask IP address of previous node. That’s metadata-privacy by design.
Signal is absolutely fine, they don’t advertise mechanisms that aren’t there. They communicate their threat model clearly, and the app comes across as something with state-of-the-art content privacy. That’s what they’re known for.
My original gripe was about the language. About blanket statement of something not being private at all because it lacks metadata privacy. If you’re going to call something private only if it offers both, you’re pressed to be upfront about the definition at least until it’s common language to split privacy into metadata and content privacy, and mean both by privacy.
Related issue right now is people have this silly conception of privacy vs anonymity being the categories, where to them privacy incorrectly means E2EE, and anonymity is the only metadata privacy they care about, without realizing you usually can’t have anonymity without E2EE since that’s what’s hiding your college saying “Good morning John Smith! –” So those people would read the article to mean Signal has no functional E2EE which is the polar opposite of truth. Signal pioneers in that field. EDIT: No offense @lyricism, just noticed you made the distinction above. I think it’s really good you’re trying to make a distinction between types of privacy, I just disagree on the hierarchy of terms.