I have a question about push notification token privacy. However, since the Matrix chat was quite confused by my question, I would like to clarify two things:
- Even though I am using Signal in my example, this is not an app-specific question.
- This threat is not about push notification content, but about the push token (identifier) itself.
My understanding is that if a company is legally required by the police to hand over push tokens that the app has registered with Google (let's say Signal), then that information can be used to identify the Google account. In this way, a Signal user could be identified via Google account information matched by the push token.
You can read more about this practice here: https://www.washingtonpost.com/technology/2024/02/29/push-notification-surveillance-fbi/
Now to my questions:
1) Is the method as I describe the police process (first getting push tokens, then matching with Google to get account information) correct?
2) How can someone protect themselves from this?
2.1) The obvious way would be not to use Google Play Services or to separate apps into a secondary free Google profile. However, profiles are more of an identity separation, and push notifications are great for many apps.
Therefore, I would like to know if it is possible to disable push notifications for an individual app within the same profile. My understanding is that this is not currently possible on GrapheneOS, but the app communication restriction toggle that the GrapheneOS team is currently working on would allow this. Is this correct?
2.2) Are there other ways to protect against this privacy threat?
3) What do you think about defending against this attack via an anonymous Google account? I think this would not be sufficient as there could be other apps connected to the user's identity that could be matched via the push token (like Signal push token legal request > Google account (anonymous) > other app connections to that Google account > other identity leaking app > user identification.
In other words, even if the requested application is not tied to the user's identity in the first place, and the Google Account itself is anonymous, other connected applications could still leak the user's identity. For example, a super-private app connects to a super-anonymous Google Account via push tokens, but the Google Account also has a push token from a dating app with the user's picture, name, and GPS location.
Thanks for your thoughts and feedback!