I remember a time when visiting a website that opens a javacript dialog box asking for your name so the message “hi <name entered>” could be displayed was baulked at.

Why does signal want a phone number to register? Is there a better alternative?

  • @mikael@lemmy.ml
    link
    fedilink
    1302 months ago

    Because they’re building a private, not anonymous, instant messenger. They’ve been very open about this.

    • Autonomous User
      link
      fedilink
      English
      7
      edit-2
      2 months ago

      Our phone numbers are not private from them.

      Despite this, escaping WhatsApp and Discord, anti-libre software, is more important.

    • Autonomous User
      link
      fedilink
      English
      8
      edit-2
      2 months ago

      Our phone numbers are not private from them.

      Despite this, escaping WhatsApp and Discord, anti-libre software, is more important.

      • @devfuuu@lemmy.world
        link
        fedilink
        English
        24
        edit-2
        2 months ago

        It’s libre software. Go host the server and change the clients to connect to your custom server and distribute to the users you need.

        • @ganymede@lemmy.ml
          link
          fedilink
          2
          edit-2
          2 months ago

          edit: nvm i re-read what you wrote

          i agree it does mostly fulfill the criteria for libre software. perhaps not in every way to the same spirit as other projects, but that is indeed a separate discussion.

          h̶o̶w̶ ̶m̶a̶n̶y̶ ̶c̶o̶m̶m̶u̶n̶i̶t̶i̶e̶s̶ ̶a̶r̶e̶ ̶d̶o̶i̶n̶g̶ ̶t̶h̶a̶t̶ ̶r̶i̶g̶h̶t̶ ̶n̶o̶w̶?̶ ̶i̶ ̶s̶u̶s̶p̶e̶c̶t̶ ̶y̶o̶u̶ ̶m̶a̶y̶ ̶b̶e̶ ̶d̶r̶a̶s̶t̶i̶c̶a̶l̶l̶y̶ ̶u̶n̶d̶e̶r̶s̶t̶a̶t̶i̶n̶g̶ ̶t̶h̶e̶ ̶b̶a̶r̶r̶i̶e̶r̶s̶ ̶f̶o̶r̶ ̶t̶h̶a̶t̶.̶ ̶b̶u̶t̶ ̶w̶o̶u̶l̶d̶ ̶b̶e̶ ̶d̶e̶l̶i̶g̶h̶t̶e̶d̶ ̶t̶o̶ ̶b̶e̶ ̶p̶r̶o̶v̶e̶n̶ ̶w̶r̶o̶n̶g̶.̶.̶.̶

  • @Xanza@lemm.ee
    link
    fedilink
    English
    55
    edit-2
    2 months ago

    So, you’re going to get two schools of thought on this, and one of them is wrong. Horrendously wrong. For perspective, I was a certified CEHv7, so take that for what its worth.

    There’s a saying in security circles “security through obscurity isn’t security,” which is a saying from the 1850s and people continually attempt to apply the logic to today’s standards and it’s–frankly stupid–but just plain silly. It generally means that if you hide the key to your house under the floor mat, there’s no point to having the lock, because it doesn’t lend you any real security and that if you release the schematics to security protocols and/or devices (like locks), it makes them less secure. And in this specific context, it makes sense and is an accurate statement. Lots of people will make the argument that F/OSS is more secure because it’s openly available and many will make the argument that it’s less secure. But each argument is moot because it deals with software development and not your private data. lol.

    When you apply the same logic to technology and private data it breaks down tremendously. This is the information age. With a persons phone number I can very likely find their home address or their general location. Registered cell phones will forever carry with them the city in which they were activated. So if I have your phone number, and know your name is John Smith, I can look up your number and see where it was activated. It’ll tell me “Dallas, Texas” and now I’m not just looking for John Smith, I’m looking for John Smith in Dallas, Texas. With successive breakdowns like this I will eventually find your home address or at the very least your neighborhood.

    The supposition made by Signal (and anyone who defends this model) is that generally anyone with your private number is supposed to have it and even if they do, there’s not much they can do with it. But that’s so incredibly wrong it’s not even funny in 2025.

    I’ve seen a great number of people in this thread post things like “privacy isn’t anonymity and anonymity isn’t security,” which frankly I find gobstopping hilarious from a community that will break their neck to suggest everyone run VPNs to protect their online identity as a way to protect yourself from fingerprinting and ad tracking.

    It frankly amazes me. Protecting your data, including your phone number is the same as protecting your home address and your private data through redirection from a VPN. I don’t think many in this community would argue against using a VPN. But why they feel you should shotgun your phone number all over the internet is fucking stupid, IMO, or that you should only use a secure messaging protocol to speak to people you know, and not people you don’t know. It’s all just so…stupid.

    They’ll then continue to say that you should only use Signal to talk to people you know because “that’s what its for!” as if protecting yourself via encryption from compete fucking strangers has no value all of a sudden. lol

    You have to be very careful in this community because there are a significant number of armchair experts which simply parrot the things that they’ve read from others ad-nauseam without actually thinking about the basis of what they’re saying.

    OK. That’s my rant. I’m ready for your downvote.

    • @Manalith@midwest.social
      link
      fedilink
      172 months ago

      The only thing I’ll tack onto this is that with the introduction of Signal usernames, you still have to give Signal your number to verify that at least on some level, you probably are a real person. As someone with 5 different phone numbers, probably doesn’t stop spam as much as they’d hoped, but more than they feared, but at least now you don’t have to give that Craigslist guy who uses Signal your phone number, just your username. Is that the best method? I dunno, but but it is something.

      • @Xanza@lemm.ee
        link
        fedilink
        English
        132 months ago

        I was unaware of this change, and it’s perfectly acceptable. No one has any ground to lambast Signal for requiring phone numbers to get an account. I think that’s a perfectly reasonable spam mitigation technique. The issue is having to shotgun your phone number to every Howard and Susan that you want to use Signal to communicate with.

        This was honestly the only thing holding me back from actually using Signal. I’ll likely register for an account now.

        • poVoq
          link
          fedilink
          72 months ago

          If you are even remotely involved in any activist type of things, you certainly don’t want this US government honeypot have your phone-number and device id.

          • @Jason2357@lemmy.ca
            link
            fedilink
            1
            edit-2
            2 months ago

            At least in theory, this is mitigated. The signal activation server sees your phone number, yes. If you use Signal, the threat model doesn’t protect you from someone with privileged network or server access learning that you use Signal (just like someone with privileged network access can learn you use tor, or a vpn, etc).

            But the signal servers do not get to see the content of your group messages, nor the metadata about your groups and contacts. Sealed sender keeps that private: https://signal.org/blog/sealed-sender/

            You would obviously want to join those groups with a user Id rather than your phone number, or a malicious member could out you. It’s not the best truly anonymous chat platform, but protection from your specific threat model is thought through.

            edit: be sure to go to Settings > Privacy > Phone Number. By default anyone who already has your phone number can see you use signal (used for contact discovery, this makes sense to me for all typical uses of Signal), and in a separate setting, contacts and groups can see your phone number. You will absolutely want to un-check that one if you follow my suggestion above.

            • poVoq
              link
              fedilink
              12 months ago

              There are some mitigations in place, yes, but Sealed Sender on a centralized platform is snake-oil as someone with server access can easily do a timing attack and discover who communicated with whom.

              • @Jason2357@lemmy.ca
                link
                fedilink
                12 months ago

                That a timing attack could be successful is not a given. It’s a possibility, yes, but there is very likely sufficient mixing happening to make that unrealistic or unreliable. An individual doesn’t create much traffic, and thousands are using the server constantly. Calling it a honeypot or claiming the phone number and device is are available is a stretch.

                Timing attacks can work in tor when you are lucky enough to own both the entrance and exit node for an individual because very few people will be using both, and web traffic from an individual is relatively heavy and constant to allow for correlation.

                • poVoq
                  link
                  fedilink
                  12 months ago

                  A timing attack is extremely realistic when you control one of the end devices which is a common scenario if a person gets arrested or their device compromised. This way you can then identify who the contacts are and with the phone number you can easily get the real name and movement patterns.

                  This is like the ideal setup for law inforcement, and it is well documented that honeypot “encrypted” messengers have been set up for similar purposes before. Signal was probably not explicitly set up for that, but the FBI for sure has an internal informant that could run those timing attacts.

        • @MDCCCLV@lemmy.ca
          link
          fedilink
          English
          12 months ago

          Spam accounts are clearly the biggest factor for not letting anyone just sign up with an email. Although getting a new email without a phone verification is getting increasingly hard now.

  • /home/pineapplelover
    link
    fedilink
    362 months ago

    Bots. If it makes you feel better, you can disable other people finding you via phone number and just give them your username. All messages are private.

    • @0101100101@programming.devOP
      link
      fedilink
      English
      72 months ago

      But the police request the meta data of all messages from your phone number that the company has and they’re required by law to give them it.

      • /home/pineapplelover
        link
        fedilink
        47
        edit-2
        2 months ago

        These are all the court orders Signal has complied to and details all the information they give up

        https://signal.org/bigbrother/

        TLDR; they only give the last time the account connected to Signal servers and the time of account registration or re-registration

      • @devfuuu@lemmy.world
        link
        fedilink
        English
        23
        edit-2
        2 months ago

        You should go properly read the requests from law enforcement they have received and exactly what information it contains. It’s public. Then evaluate if it matters for yur threat model. Security doesn’t exist in a vaccum.

      • plz1
        link
        fedilink
        English
        112 months ago

        They can “request” it all day long. Signal doesn’t store them beyond the time needed to deliver to the end user device, and while (temporarily) stored, it’s encrypted in a way Signal’s service cannot read.

        • @0101100101@programming.devOP
          link
          fedilink
          English
          1
          edit-2
          2 months ago

          huh? so the phone number is encrypted in a way that can’t be read, but an sms is sent to the phone? … a separate company sends the text on behalf of signal? so that separate company logs the phone number, the timestamp and who knows what else.

          • @xthexder@l.sw0.com
            link
            fedilink
            62 months ago

            Signal doesn’t use SMS anymore, and all messages are sent over encrypted Internet protocol. Any servers in between won’t see the phone number, it’s not needed to deliver the message, it’s using an IP address at that point and the entire message metadata is encrypted. Signal is the only one that can see the phone numbers, which they use to identify multiple clients as a single user and route messages accordingly.

          • plz1
            link
            fedilink
            English
            22 months ago

            Signal doesn’t use SMS at all, once you have enrolled. The phone number is used to validate people and exclude bots, during registration. As others have noted, you can hide your number from other users, as well.

        • @CosmicTurtle0@lemmy.dbzer0.com
          link
          fedilink
          English
          6
          edit-2
          2 months ago

          Messages are e2e encrypted. Metadata is not encrypted.

          Edit: I feel the need to qualify this statement. Metadata about your connection may be encrypted at rest but is decryptable given that signal is released metadata to authorities with a warrant/subpoena.

  • XenGi
    link
    fedilink
    English
    352 months ago

    One of the design goals is that they don’t have a user database, so governments etc can’t knock down their door demanding anything. By using phone numbers your “contacts” are not on their servers but local on your phone.

    • 𝘋𝘪𝘳𝘬
      link
      fedilink
      172 months ago

      But your phone number is, and thus every agency can get your full name and address and location.

    • @rirus@feddit.org
      link
      fedilink
      English
      42 months ago

      That’s WRONG they have a Database of every Phone number registered to them and metadata like the last time they logged in. You send all your contacts numbers to signal so they can respond who is also using Signal.

    • @0101100101@programming.devOP
      link
      fedilink
      English
      42 months ago

      During registration they want a phone number to send a verification code. I know I am me. They don’t need to verify that.

      • @krimson@lemmy.world
        link
        fedilink
        34
        edit-2
        2 months ago

        They do. Otherwise anyone can register with your phone number and start messaging as if they were you.

        If you want more privacy you’d need something like Simplex.

        • @IttihadChe@lemmy.ml
          link
          fedilink
          English
          22 months ago

          They need to verify using a phone number because otherwise other people could sign up using your phone number and pretend to be you? What?

          They can only sign up using your phone number if they do require a phone number. If they didn’t ask for a phone number then how would people sign up using your phone number?

  • @pwalker@discuss.tchncs.de
    link
    fedilink
    27
    edit-2
    2 months ago

    The amount of trolls in this thread that either try to spew false information intentionally or just have no idea what they are talking about is insane.

    If you are worried about what data (including your phone number) law enforcement can recieve (if they have your specific user ID, which is not equal to your phone number) from the Signal company check this: https://propertyofthepeople.org/document-detail/?doc-id=21114562 Tldr: It’s the date of registration and last time user was seen online. No other information, Signal just doesn’t have any other and this is by design.

    If you want to know more about how they accomplish that feat you can check out the sealed sender feature: https://nerdschalk.com/what-is-sealed-sender-in-signal-and-should-you-enable-it/

    or the private contact discovery system: https://signal.org/blog/private-contact-discovery/

    Also as Signal only requires a valid phone number for registration you might try some of these methods (not sure if they still work): https://theintercept.com/2024/07/16/signal-app-privacy-phone-number/

    • Arthur Besse
      link
      fedilink
      English
      6
      edit-2
      2 months ago

      False.

      edit: it’s funny how people downvoting comments about signal’s sealed sender being a farce never even attempt to explain what its threat model is supposed to be. (meaning: what attacks, with which adversary capabilities specifically, is it designed to prevent?)

      • Autonomous User
        link
        fedilink
        English
        4
        edit-2
        2 months ago

        Downvoted as you let them bait you. Escaping WhatsApp and Discord, anti-libre software, is more important.

        • Arthur Besse
          link
          fedilink
          English
          8
          edit-2
          2 months ago

          Downvoted as you let them bait you. Escaping WhatsApp and Discord, anti-libre software, is more important.

          I don’t know what you mean by “bait” here, but…

          Escaping to a phone-number-requiring, centralized-on-Amazon, closed-source-server-having, marketed-to-activists, built-with-funding-from-Radio-Free-Asia (for the specific purpose of being used by people opposing governments which the US considers adversaries) service which makes downright dishonest claims of having a cryptographically-ensured inability to collect metadata? No thanks.

          (fuck whatsapp and discord too, of course.)

              • Autonomous User
                link
                fedilink
                English
                22 months ago

                Escaping WhatsApp and Discord, anti-libre software, is most important part.

            • Arthur Besse
              link
              fedilink
              English
              3
              edit-2
              2 months ago

              When it’s libre software, we’re not banned from fixing it.

              Signal is a company and a network service and a protocol and some libre software.

              Anyone can modify the client software (though you can’t actually distribute modified versions via Apple’s iOS App Store, for reasons explained below) but if a 3rd party actually “fixed” the problems I’ve been talking about here then it really wouldn’t make any sense to call that Signal anymore because it would be a different (and incompatible) protocol.

              Only Signal (the company) can approve of changes to Signal (the protocol and service).

              Here is why forks of Signal for iOS, like most seemingly-GPLv3 software for iOS, cannot be distributed via the App Store

              Apple does not distribute GPLv3-licensed binaries of iOS software. When they distribute binaries compiled from GPLv3-licensed source code, it is because they have received another license to distribute those binaries from the copyright holder(s).

              The reason Apple does not distribute GPLv3-licensed binaries for iOS is because they cannot, because the way that iOS works inherently violates the “installation information” (aka anti-tivozation) clause of GPLv3: Apple requires users to agree to additional terms before they can run a modified version of a program, which is precisely what this clause of GPLv3 prohibits.

              This is why, unlike the Android version of Signal, there are no forks of Signal for iOS.

              The way to have the source code for an iOS program be GPLv3 licensed and actually be meaningfully forkable is to have a license exception like nextcloud/ios/COPYING.iOS. So far, at least, this allows Apple to distribute (non-GPLv3!) binaries of any future modified versions of the software which anyone might make. (Legal interpretations could change though, so, it is probably safer to pick a non-GPLv3 license if you’re starting a new iOS project and have a choice of licenses.)

              Anyway, the reason Signal for iOS is GPLv3 and they do not do what NextCloud does here is because they only want to appear to be free/libre software - they do not actually want people to fork their software.

              Only Signal (the company) is allowed to give Apple permission to distribute binaries to users. The rest of us have a GPLv3 license for the source code, but that does not let us distribute binaries to users via the distribution channel where nearly all iOS users get their software.

      • @pwalker@discuss.tchncs.de
        link
        fedilink
        2
        edit-2
        2 months ago

        it’s being answered in the github thread you linked. Sorry that this is not enough for you but it’s enough for most people: “For people who are concerned about this sort of thing, you can enable sealed sender indicators in the settings”

        • Arthur Besse
          link
          fedilink
          English
          7
          edit-2
          2 months ago

          it’s being answered in the github thread you linked

          The answers there are only about the fact that it can be turned off and that by default clients will silently fall back to “unsealed sender”.

          That does not say anything about the question of what attacks it is actually meant to prevent (assuming a user does “enable sealed sender indicators”).

          This can be separated into two different questions:

          1. For an adversary who does not control the server, does sealed sender prevent any attacks? (which?)
          2. For an adversary who does control the server, how does sealed sender prevent that adversary from identifying the sender (via the fact that they must identify themselves to receive messages, and do so from the same IP address)?

          The strongest possibly-true statement i can imagine about sealed sender’s utility is something like this:

          For users who enable sealed sender indicators AND who are connecting to the internet from the same IP address as some other Signal users, from the perspective of an an adversary who controls the server, sealed sender increases the size of the set of possible senders for a given message from one to the number of other Signal users who were online from behind the same NAT gateway at the time the message was sent.

          This is a vastly weaker claim than saying that “by design” Signal has no possibility of collecting any information at all besides the famous “date of registration and last time user was seen online” which Signal proponents often tout.

    • Autonomous User
      link
      fedilink
      English
      5
      edit-2
      2 months ago

      This shows they do not need our phone numbers but they still demand it.

      Despite this, escaping WhatsApp and Discord, anti-libre software, is more important.

      • @Undertaker@feddit.org
        link
        fedilink
        22 months ago

        No it doesn’t. What is a need? It is for troll and spam and bot protection. How does the links show that there is no need for it?

  • irotsoma
    link
    fedilink
    252 months ago

    Reduce spam bot accounts and other malware, as well as to allow for user discovery so you can find your contacts more easily. It’s not designed to be an anonymous service, just a private one.

    • Hemingways_Shotgun
      link
      fedilink
      English
      132 months ago

      It’s not designed to be an anonymous service, just a private one.

      I think this needs to be said a lot more often and a lot louder. Anonymous and private are NOT necessarily the same thing, nor should the expectation be that they are. Both have a purpose.

  • Ardens
    link
    fedilink
    English
    202 months ago

    I think it’s important to remember de difference between being private and being anonymous. Signal IS private. It’s not anonymous. The same is true for many other apps/services.

    Personally I like to be private. I don’t really need to be anonymous.

  • @coconut@programming.dev
    link
    fedilink
    English
    192 months ago

    If you want to be mainstream a) you can’t have spammers, scammers, and all the other scum of the earth and b) finding your contacts in the app HAVE TO be plug and play. Literally no normie will bother adding with usernames or whatever.

    • Autonomous User
      link
      fedilink
      English
      3
      edit-2
      2 months ago

      finding your contacts

      Wrong, it is not optional, does not stop spam and the worst way to try.

      Do not let this derail us. Escaping to libre software is the best return on investment.

  • @moreeni@lemm.ee
    link
    fedilink
    English
    182 months ago

    It’s focused on ensuring there is no middleman between you and the other party, but it does not have a goal to provide anonymous messaging. Sadly.

          • Sonalder
            link
            fedilink
            22 months ago

            End-to-end encryption have been designed so that a “middleman” such as Signal can’t read your conversation. Signal goes even further by encrypting metadata protecting other information such as who you’re talking too and at what time (some technical and targeted attack could however determined these).

            In asymetrical cryptography we tend to assume that what we call middleman is a third-party placed between the two peers during the public key exchanges (such as handshake). Signal is indeed a middleman on the infrastructure level but the software has been designed to protect you from middlemen having access to the raw, unencrypted data.

            That say if you don’t verify your peer’s public key it’s not impossible that someone has done a man-in-the-middle attack and that you’re sending message to him and he’s rerouting them to your peer, etc… However this is unrealistic for the average person.

            So even if it’s not a p2p infrastructure but some centralized servers we can assume that there is no middleman thanks to e2ee.

            • @coconut@programming.dev
              link
              fedilink
              English
              12 months ago

              You can’t just write three paragraphs (that contain half-truth, half-misinformation) about how Signal is the middleman and then conclude “you can assume there’s no middleman”. You can’t assume that. Signal is the middleman. There’s no arguments to be made against this. Signal doesn’t claim they aren’t the middleman either.

      • @moreeni@lemm.ee
        link
        fedilink
        English
        42 months ago

        Of course. Sorry, but I meant no middleman as in minifying the role of the server in your messahing. Signal’s goal is to ensure the server cannot have access to your messages and its only role is to receive and send data.

    • @rirus@feddit.org
      link
      fedilink
      English
      32 months ago

      THATS WRONG! Signal Server can just do a man in the middle as you try connecting to your contact for the first time. You need to verify the fingerprint manually which is not very obvious and present in the UI. In SimpleX.chat you automatically verify the fingerprint, as its the way to establish the chat to your contact and is included in the way you distribute the contact to you.

  • Autonomous User
    link
    fedilink
    English
    17
    edit-2
    2 months ago

    Signal is not perfect but we control its app, libre software. See SimpleX Chat.

    Escaping WhatsApp and Discord, anti-libre software, is more important.

      • Célia
        link
        fedilink
        English
        102 months ago

        What SimpleX, Signal, or any app like this need first and foremost is traction, as new users generate more new users. One of Signal’s goals is usability (usually achieved by being simple, as in no complexity for the end user). In my opinion SimpleX lacks that. This is the same reason Signal needs a phone number: populating your contact list with users already on the platform

        • Autonomous User
          link
          fedilink
          English
          4
          edit-2
          2 months ago

          reason Signal needs a phone number: populating your contact list

          Wrong, it is not optional.

          Despite this, escaping WhatsApp and Discord, anti-libre software, is more important.

      • foremanguy
        link
        fedilink
        32 months ago

        You can go to Simplex (for sure a lot of people here already done it) but if only privacy nerds get to this place this is not a great solution. We (I’m talking about us using Lemmy and chatting on SimpleX) must convince people, starting by friends and family to stop using these fucking socials then at this point SimpleX will be considered as a viable alternative

      • Oniononon
        link
        fedilink
        English
        12 months ago

        Because the entire point of using communication programs is to communicate with people other than yourself.

      • Autonomous User
        link
        fedilink
        English
        1
        edit-2
        2 months ago

        Escaping WhatsApp and Discord, anti-libre software, is more important.

  • basic daydreams
    link
    fedilink
    122 months ago

    as I see it, Signal tried to fit that privacy gap for a standard centralised messenger, if you think about it, that might have made it easier to non-tech-savvy people to adopt it (even if it was as a request from a contact), decentralisation is not remotely appealing to them