Would subpoenas count as 'working with the government'?
I expect Signal to answer subpoenas, after all.
Would subpoenas count as 'working with the government'?
I expect Signal to answer subpoenas, after all.
03046512336612478855 Sounds like the scrapeable data is plausibly just:
Signal - phone # used on signup
If you have my phone number, and I have not marked it as hidden from search in my Signal account settings, then the phone number can be looked up by anyone from within the Signal app – The presence of a Signal account associated with a phone number can be established that way. But Signal doesn't otherwise publicly publish a list of phone numbers.
fid02
Good to know, thx
raccoondad they're in no position to issue subpoena or in any way be part of such process so no, it does not relate.
Signal complies with government requests , however , they likely can't provide much metadata.
Interestingly though, the FBI recently suggested to U.S. citizens to use signal app do to Chinese hacking of SMS network.
03046512336612478855 However it was surprising for me to see Signal and Proton on the list.
Does anyone know - what kind of data from Signal or Proton is harvestable like this?Hopefully its just a single field like:
"has phone # registered on Signal - yes/no"
or
"list of proton addresses registered on other services"
ProtonMail does have a public HKPS keyserver that distributes public PGP keys associated with accounts. It generates dummy entries to dissuade casual scraping, but importing a dummy key into gpg fails. So it does not surprise me seeing another entity attempt to enumerate it for 'research'.
fid02 which is why you should only use the number to sign up in Signal, and thereafter use a nickname, hiding your number from those outside of your circle
locked Signal complies with government requests , however , they likely can't provide much metadata.
Yes. They have released documentation before of what their response to a subpoena looks like.
Just another data broker