fid02
Good to know, thx
Signal and ProtonMail appear on list of sites used for govt surveillance tool
raccoondad they're in no position to issue subpoena or in any way be part of such process so no, it does not relate.
Signal complies with government requests , however , they likely can't provide much metadata.
Interestingly though, the FBI recently suggested to U.S. citizens to use signal app do to Chinese hacking of SMS network.
03046512336612478855 However it was surprising for me to see Signal and Proton on the list.
Does anyone know - what kind of data from Signal or Proton is harvestable like this?Hopefully its just a single field like:
"has phone # registered on Signal - yes/no"
or
"list of proton addresses registered on other services"
ProtonMail does have a public HKPS keyserver that distributes public PGP keys associated with accounts. It generates dummy entries to dissuade casual scraping, but importing a dummy key into gpg fails. So it does not surprise me seeing another entity attempt to enumerate it for 'research'.
fid02 which is why you should only use the number to sign up in Signal, and thereafter use a nickname, hiding your number from those outside of your circle
locked Signal complies with government requests , however , they likely can't provide much metadata.
Yes. They have released documentation before of what their response to a subpoena looks like.
Just another data broker