Signal Group Chat
-
@stacksofplates said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@jaredbusch said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Hey, If I'm misunderstanding something, please correct me.
Exactly how hard is to to get someone’s email Fred’s versus hacking the phone network?
I couldn't tell you - but when NIST goes so far as to tell people to stop using SMS for 2FA, that tells you just how bad it must be.
You can receive a phone call. It doesn't have to be SMS.
And again, that doesn't change the fact that it's a one time code. You would notice immediately if someone registered the code before you. What good does intercepting it do?
would you? would a normal person? It seems like a normal person would say - huh, it's broke, fuck it.. I'll use something else.
-
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@jaredbusch said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Hey, If I'm misunderstanding something, please correct me.
Exactly how hard is to to get someone’s email Fred’s versus hacking the phone network?
I couldn't tell you - but when NIST goes so far as to tell people to stop using SMS for 2FA, that tells you just how bad it must be.
You can receive a phone call. It doesn't have to be SMS.
yeah yeah - you guys are saying that since this is a near real time setup, it's less of an issue... sure, there is that, but from a pure security situation, it's still not good.
I'm saying it's just as bad either way. Email accounts are attacked ALL of the time.
-
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@jaredbusch said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Hey, If I'm misunderstanding something, please correct me.
Exactly how hard is to to get someone’s email Fred’s versus hacking the phone network?
I couldn't tell you - but when NIST goes so far as to tell people to stop using SMS for 2FA, that tells you just how bad it must be.
You can receive a phone call. It doesn't have to be SMS.
yeah yeah - you guys are saying that since this is a near real time setup, it's less of an issue... sure, there is that, but from a pure security situation, it's still not good.
I'm saying it's just as bad either way. Email accounts are attacked ALL of the time.
But short of either a breach to the email hoster or figuring out the password, email is much more difficult to breach than the phone system (according to reports - I don't have first hand knowledge) for skilled hackers.
-
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@jaredbusch said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Hey, If I'm misunderstanding something, please correct me.
Exactly how hard is to to get someone’s email Fred’s versus hacking the phone network?
I couldn't tell you - but when NIST goes so far as to tell people to stop using SMS for 2FA, that tells you just how bad it must be.
You can receive a phone call. It doesn't have to be SMS.
And again, that doesn't change the fact that it's a one time code. You would notice immediately if someone registered the code before you. What good does intercepting it do?
would you? would a normal person? It seems like a normal person would say - huh, it's broke, fuck it.. I'll use something else.
So you've introduced this magical person that is using a chat app because of it's security, but would just not notice that the code they just received doesn't work.
And if they get a message saying they've already used this code, that's a pretty dead giveaway.
-
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@jaredbusch said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Hey, If I'm misunderstanding something, please correct me.
Exactly how hard is to to get someone’s email Fred’s versus hacking the phone network?
I couldn't tell you - but when NIST goes so far as to tell people to stop using SMS for 2FA, that tells you just how bad it must be.
You can receive a phone call. It doesn't have to be SMS.
And again, that doesn't change the fact that it's a one time code. You would notice immediately if someone registered the code before you. What good does intercepting it do?
would you? would a normal person? It seems like a normal person would say - huh, it's broke, fuck it.. I'll use something else.
So you've introduced this magical person that is using a chat app because of it's security, but would just not notice that the code they just received doesn't work.
LOL magical person - now you're kidding right? many people use an app not because of security but because their associates/family, etc are using it. So I tell all of my friends and family who could care less about security to use it.. they try, they fail.. they go back to FB chat.. in the meantime I could possibly be tricked into thinking they actually made it, at least for a short time, because I, as the one wanting security, should be confirming those users.
But now we've taken this to a farce'ish level, mainly because we know that the common user doesen't care about security, those needing/wanting it likely have to use other means to get it anyway.
Let's just move on and use it here at ML.
-
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@jaredbusch said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Hey, If I'm misunderstanding something, please correct me.
Exactly how hard is to to get someone’s email Fred’s versus hacking the phone network?
I couldn't tell you - but when NIST goes so far as to tell people to stop using SMS for 2FA, that tells you just how bad it must be.
You can receive a phone call. It doesn't have to be SMS.
yeah yeah - you guys are saying that since this is a near real time setup, it's less of an issue... sure, there is that, but from a pure security situation, it's still not good.
I'm saying it's just as bad either way. Email accounts are attacked ALL of the time.
But short of either a breach to the email hoster or figuring out the password, email is much more difficult to breach than the phone system (according to reports - I don't have first hand knowledge) for skilled hackers.
Again, only if you use cell, not VoIP.
Also, I don't buy that from the number of times peoples email accounts are breached. Things like MITM from non-HTTPS pages in an email to that specific account (if you don't think something is wrong from a 2FA code, you won't be paying attention to HTTPS), security questions, etc. You don't need to "breach the email provider".
-
@Dashrender i have no idea where the hell you are trying to go with this.
You are mixing up a couple of things and calling it all stupid.
Yes, @scottalanmiller has this dislike for things that require a telephone. It is a downside to both Telegram and Signal. With Telegram, once you are connected, which requires a phone number, you can create a username and only give that out. People who find you by username never get you telephone number.
I have not looked into the details of Signal yet to see how it functions at this level.
You have my number install Signal, I will show up as I have it setup.
-
So if I'm registered on Signal with my phone number, as I am now, how is someone going to use my phone number to intercept my messages? Would they have to hack in to T-Mobile reroute things?
I feel like I can trust that more than the security of my email account.
-
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Not thrilled they are bootstrapping connections via phone numbers!
As scott has mentioned before.. phone numbers are entirely to easy to spoof, they can change because of moves or any reason (granted number mobility has reduced this a lot).
I would have much rather seen this use email addresses.
Email addresses are just as easy to “spoof”. I don’t see a difference in that area.
eh? How do you spoof an email? unless you have the credentials for the email account, you can't gain access to that. But the phone system has shown how easily SS7 can be broken to intercept phone calls and text messages intended for the true person, but instead come to an attacker. That's why 2FA should not use SMS messages as a factor.
Sure if you're not using VoIP. However I'd argue that the work it takes to leverage that is the same amount of work it takes to gain access to an email address. It also prevents things like generic bots from creating accounts.
My issue is that in much of the world, phone numbers change hands all the time. So using it for security is a fundamental problem. You might get a new phone number every time you cross a border. It's tied to a physical SIM card, often with zero security.
-
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@jaredbusch said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Hey, If I'm misunderstanding something, please correct me.
Exactly how hard is to to get someone’s email Fred’s versus hacking the phone network?
I couldn't tell you - but when NIST goes so far as to tell people to stop using SMS for 2FA, that tells you just how bad it must be.
You can receive a phone call. It doesn't have to be SMS.
yeah yeah - you guys are saying that since this is a near real time setup, it's less of an issue... sure, there is that, but from a pure security situation, it's still not good.
I'm saying it's just as bad either way. Email accounts are attacked ALL of the time.
That's totally different. It requires hacking. You don't even need to hack phone numbers to have an issue. Phone numbers change hands as part of the INTENDED use case. Emails identify a person, phone numbers identify a device. It's a fundamentally flawed system akin to using social security numbers as identification - it's simply not an identifying item.
-
@tim_g said in Signal Group Chat:
So if I'm registered on Signal with my phone number, as I am now, how is someone going to use my phone number to intercept my messages? Would they have to hack in to T-Mobile reroute things?
I feel like I can trust that more than the security of my email account.
That's not what I said.
-
@tim_g said in Signal Group Chat:
So if I'm registered on Signal with my phone number, as I am now, how is someone going to use my phone number to intercept my messages? Would they have to hack in to T-Mobile reroute things?
What if they get your SIM card? And, sorry, but I worked a job where they intercepted all phone calls and texts both for employees and the employees of GE who shared the building. Phone calls are not secured, nor are phone accounts. It's "whoever has physical access to the SIM card or the cellular node."
In the real world, I've known thousands of people with their phone calls and texts intercepted most of the time, and that was just the parts we knew about. It's now public that the police intercept that, too.
There is no need to hack T-Mobile or do anything crazy. Phones simply don't have that security to need to work around.
-
@scottalanmiller said in Signal Group Chat:
@tim_g said in Signal Group Chat:
So if I'm registered on Signal with my phone number, as I am now, how is someone going to use my phone number to intercept my messages? Would they have to hack in to T-Mobile reroute things?
What if they get your SIM card? And, sorry, but I worked a job where they intercepted all phone calls and texts both for employees and the employees of GE who shared the building. Phone calls are not secured, nor are phone accounts. It's "whoever has physical access to the SIM card or the cellular node."
In the real world, I've known thousands of people with their phone calls and texts intercepted most of the time, and that was just the parts we knew about. It's now public that the police intercept that, too.
There is no need to hack T-Mobile or do anything crazy. Phones simply don't have that security to need to work around.
Safety numbers are generated with every contact and of this happens it alerts you to the change...
-
At least they notify you - I thought I heard somewhere that they didn't notify of number changes unless you enabled that feature.
-
The main reason for me not liking the use of phone number validation is that phone number validation can be intercepted without the knowledge of the person in any way. Email compromise generally require the user to mess up on some way - i.e. being phished or the email vendor being hacked.
-
Regarding the use of phone numbers, they idea behind whisper system products was always to provider security on top of telco networks.
So TextSecure integrated with google to encrypt and decrypt actual text messages. RedPhone did the same for calls.
Signal goes beyond that. But it provides an entirely integrated diaper experience if you turn it on.
There is also an option you can enable if you are in a country and need to circumvent government censorship.
-
@scottalanmiller said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Not thrilled they are bootstrapping connections via phone numbers!
As scott has mentioned before.. phone numbers are entirely to easy to spoof, they can change because of moves or any reason (granted number mobility has reduced this a lot).
I would have much rather seen this use email addresses.
Email addresses are just as easy to “spoof”. I don’t see a difference in that area.
eh? How do you spoof an email? unless you have the credentials for the email account, you can't gain access to that. But the phone system has shown how easily SS7 can be broken to intercept phone calls and text messages intended for the true person, but instead come to an attacker. That's why 2FA should not use SMS messages as a factor.
Sure if you're not using VoIP. However I'd argue that the work it takes to leverage that is the same amount of work it takes to gain access to an email address. It also prevents things like generic bots from creating accounts.
My issue is that in much of the world, phone numbers change hands all the time. So using it for security is a fundamental problem. You might get a new phone number every time you cross a border. It's tied to a physical SIM card, often with zero security.
You can change your number just like telegram. That has nothing to do with a 2FA code.
-
@scottalanmiller said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@stacksofplates said in Signal Group Chat:
@dashrender said in Signal Group Chat:
@jaredbusch said in Signal Group Chat:
@dashrender said in Signal Group Chat:
Hey, If I'm misunderstanding something, please correct me.
Exactly how hard is to to get someone’s email Fred’s versus hacking the phone network?
I couldn't tell you - but when NIST goes so far as to tell people to stop using SMS for 2FA, that tells you just how bad it must be.
You can receive a phone call. It doesn't have to be SMS.
yeah yeah - you guys are saying that since this is a near real time setup, it's less of an issue... sure, there is that, but from a pure security situation, it's still not good.
I'm saying it's just as bad either way. Email accounts are attacked ALL of the time.
That's totally different. It requires hacking. You don't even need to hack phone numbers to have an issue. Phone numbers change hands as part of the INTENDED use case. Emails identify a person, phone numbers identify a device. It's a fundamentally flawed system akin to using social security numbers as identification - it's simply not an identifying item.
Again you can change your number. What Dash is talking about is exactly the same because he is talking about hacking SS7.
-
In my original signal project we used DNS instead of phone numbers.
andy.signal.org was my handle and you could call or text me there for example.
Also @Dashrender there was email support sometime ago for Signal setup and I’m not sure why it went away.
If you let Signal do so it will integrate with your phone like hangouts or iMessage/FaceTime - on it encrypts everything.
-
@bigbear said in Signal Group Chat:
Signal goes beyond that. But it provides an entirely integrated diaper experience if you turn it on.
Did you really mean to say diaper? If so, I have no idea what that means in this context.