Does that mean that other apps like signal for example have back doors?
Do criminals have a knowledge of exploits in the recommended messaging apps?
You’re missing the #1 reason organized criminals prefer their own service. To have trusted staff who control everything — the servers, code development & deployment — whom can’t be ordered by a court to shut off access to individuals at any time, or provide metadata, eavesdrop, etc.
The weakest link with legal services like Signal is that they can be compelled by law enforcement, the judicial system, and government… That’s an enormous risk for any organized crime operation. Even a minimal amount of metadata collection can do a lot of damage, especially if it’s analyzed over months/years, and especially when performed by an advanced persistent threat actor like a nation state.
I disagree, stupid self developed systems leak so much more, I think the number 1 reason is, surprise surprise, stupid people.
Also plenty of criminals and organized crime also use standard tools like telegram (which is way worse then signal)
I think you’re both right. I think the non-stupid people with successful self-developed systems simply aren’t talked about, because they don’t get caught, because they’re not stupid.
It probably depends on the level of the criminals and organized crime groups. I saw this Youtube video a couple weeks ago that talks about the history of how organized crime groups were using encrypted communication https://www.youtube.com/watch?v=gigIOc_0PKo (And how they were honey-potted by the FBI to use an FBI-hosted service, lol)
Organized crime groups that make 100s of millions should be capable enough to hire skilled developers and sysops to host self-managed services. At some point if they make enough money, investing in self-managed communication becomes preferable over using telegram or signal.
There are multi million companies that get hacked left and right, money does not mean intelligent security measures.
Also, best option is the big ones, anyone who wants real security and privacy should use something that already exists. Sure, maybe not signal (even though for anything less then a state actor it is plenty) but there are plenty of self-hosted or decentralized communication apps out there.
Anyone who builds their own app is very likely making a bad decision.
Just a reminder that one of the most wanted man in the world by the most capable state in the world (Snowden) is using signal
Theoretically signal only has your phone number and time of sign up which means theoretically it shouldn’t matter if the legal system asks them for information.
Yea and if a nation-state knows your phone number, they can track your exact whereabouts in real-time. Let’s not pretend like we know better than them about what information matters :)
…yeah and if they went to signal to ask about you they’re going to provide signal your phone number as it’s the only identifier they have in their system…so the nation state already had that to begin with, it isn’t sensitive info despite what it can be used for.
… theoretically. In practice if the NSA used a secret court order that banned them from talking about it and made them update the app to reveal plaintext for one particular person, I don’t see how they could get out of that (other than by breaking the law and risking jail).
I think the chances of that are very small though.
There is legislation in Australia that allows precicely this. Then 5 eyes or Interpol or whatever for everyone else.
…that’s a terrifying but also plausible prospect. Guess it’s a reason not to use the published app and instead build it yourself.
Lets put it this way: There are criminals that use whatsup, twitter, and the like for communication. They don’t really last for some reason. Then there are those who use a special, commercial system. They might fail if they fall for traps like EncroChat (or however that was spelled). Then there are those who try to set up their own system, but lack the capabilities and talent for that. And last but not least are those groups you have not heard from in the news. They do have proper infosec.
I’ve heard of criminals using MMORPG DM’s to communicate back in the day, not sure what happened to those guys.
Another way to stay under the radar. IIRC there was a case where information was passed on an image board by means of using random-looking filenames that actually encoded messages.
No, but by making their own they can ensure there isn’t one. Or something like that.
All they really need is a program that turns cleartext into ciphertext and back, an open communication channel to transmit ciphertext, a secure way to exchange keys, and good operational security. There are plenty of cybersecurity experts with good skills and flexible morals, except NK and Russia probably pay better than the local meth lord.
Your average criminal is not making their own and have to trust some third party regardless. Law enforcement agencies have been known to have wide spread honey pot secure messaging apps before.
Yes. Most are likely still on provenly compromised platforms like whatsapp or telegram.
Because they’re not stupid and understand that government agencies could have a finger in the pie for any publicly available software in some way/shape/form? Paranoia keeps them in business longer.