An official FBI document dated January 2021, obtained by the American association “Property of People” through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata (“Pen Register”) or connection data retention law (“18 USC§2703”). Here, in essence, is the information the FBI says it can retrieve:

  • Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.

  • Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).

  • Signal: date and time of account creation and date of last connection.

  • Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.

  • Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.

  • Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).

  • WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.

  • WhatsApp: the targeted person’s basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time (“Pen Register”); message content can be retrieved via iCloud backups.

  • Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.

TL;DR Signal is the messaging system that provides the least information to investigators.

  • @Napain
    link
    English
    1611 months ago

    i love how telegram isn’t even encrypted or anything but they just ghost the authorities

    • @__forward__@lemm.ee
      link
      fedilink
      English
      1111 months ago

      To clarify because this is always a point of confusion whenever the topic comes up. Telegram is, of course, transport encrypted. Someone listening on the wire cannot read your data. It is not end-to-end encrypted, meaning Telegram can always read your messages and can, in principle, give anyone access.

      • @ookees@beehaw.org
        link
        fedilink
        English
        4
        edit-2
        11 months ago

        That’s not entirely true. Telegram’s one on one secret chat is end to end encrypted. As well as one on one voice and video calls. Group chats are not end to end encrypted.

        Additionally Telegram does have an auto delete features built in for all of its chat types. So while I can’t entirely rule out that Telegram could have a backup of a chat somewhere, you have a bit more piece of mind if you turn on the auto delete feature.

        • @__forward__@lemm.ee
          link
          fedilink
          English
          211 months ago

          Thanks for the clarification I should have mentioned this. Especially for calls it is actually relevant but I feel like very few people actually use secret chats.

      • @locness3@discuss.tchncs.de
        link
        fedilink
        English
        211 months ago

        It’s worrying how Telegram says “all your chats are protected with strong encryption” while this is just standard stuff nowadays (wasn’t when Telegram came out, to be fair). While it’s technically true, it’s almost sure to be misinterpreted and have it sound like it’s equal to actual e2ee software

    • @ehrenschwan@feddit.de
      link
      fedilink
      English
      1
      edit-2
      11 months ago

      Not in Germany apparently. (Taken from another comment by @tram1@programming.dev in this thread) For people that can’t read german, they gave information to the BKA which is similar to the FBI.

    • @TemporaryBoyfriend@lemmy.ca
      link
      fedilink
      English
      111 months ago

      This is why I prefer cloud services outside US jurisdiction, and refuse to use anything based in the USA - like iCloud. National Security Letters are a thing, and even massive companies like Apple can’t fight them.