• marcuse1w
    link
    fedilink
    arrow-up
    2
    ·
    3 years ago

    Ok, out of interest, how does this work?

    You (as aggressor) scan all your known mobile numbers agains let’s say Signal and discover that some numbers use Signal. That I understand. But now what? Unless you are the company Signal you would not have access to further data, or ?

      • Palaress@lemmy.161.social
        link
        fedilink
        arrow-up
        2
        ·
        3 years ago

        Sure you can easily get further data by for example asking the phone companies for cell-tower log-in location and times. This you can then narrow down against your list of Signal using suspects and either remotely infect their phones with a trojan or simply snatch up the hardware at a “random” police check and access the already decrypted messages with identifiable phone-numbers of all the group-members.

        What the fuck? Sure, you could also just being tortured till you tell them everything you know, but fking tracing over cell companies is not a security flaw in an app.

        They could also just as well decrypt your self hosted emails that are cached on your device.

          • Palaress@lemmy.161.social
            link
            fedilink
            arrow-up
            2
            ·
            3 years ago

            What does having Signal installed has to do with tracking down and installing a Trojan?

            I don’t think that they will track only track you down for using Signal, and if they are they still will install a Trojan even without Signal installed on your phone.