←back to thread

295 points mdhb | 1 comments | | HN request time: 0.206s | source
Show context
bsimpson ◴[] No.43560742[source]

One nice side effect of Signal's importance for governmental/military use is that it helps keep it free for civilian use. They can't mandate a backdoor for something other parts of the government rely on to be secure.

I once heard a great anecdote to that effect, and to my embarrassment I can't recall the details to repeat here.

(And yes, I understand that there are limits on what is appropriate to share with civilian hardware on a civilian network, but the truth stands that part of the reason there's not a push to breach encryption in the US like there is in the UK is because Signal is relied upon even by the government when they need a private channel on civilian hardware.)

replies(9): >>43560773 #>>43560780 #>>43560782 #>>43560939 #>>43560995 #>>43561150 #>>43561233 #>>43561254 #>>43561325 #
deelowe ◴[] No.43560773[source]

> They can't mandate a backdoor for something other parts of the government rely on to be secure.

Why not? It wouldn't be difficult to have a backdoor in the civilian use-case that's disabled for government use.

replies(3): >>43560809 #>>43561110 #>>43561722 #
richardw ◴[] No.43561110[source]

Now the task of an adversary is to simply enable the backdoor rather than create it from scratch. The people using Signal for this are doing it on their own devices, so now you have multiple problems.

Eg how to get non technical people to know when they’re using the civilian version.

Alternative crazy universe: Just use the tech that was created for the government and does all the right things.

replies(2): >>43562491 #>>43578378 #
1. moshun ◴[] No.43562491[source]

But then you’re required to archive the discussions for the public to access. That’s much worse for these people than foreign agents (and journalists apparently) listening in and taking notes.