<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mfwoods</title><link>https://news.ycombinator.com/user?id=mfwoods</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 20:54:20 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mfwoods" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mfwoods in "The Signal Server repository has not been updated since April 2020"]]></title><description><![CDATA[
<p>That's true, and in that sense it doesn't really matter if they publish the server source or not (although they really should continue to do so). What does matter is that the client was designed with a possible malicious server in mind so you don't <i>have</i> to trust the code the server is running.</p>
]]></description><pubDate>Thu, 04 Mar 2021 19:17:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=26346841</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=26346841</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26346841</guid></item><item><title><![CDATA[New comment by mfwoods in "The Signal Server repository has not been updated since April 2020"]]></title><description><![CDATA[
<p>No. The clients are open source, and (at least on Android) you are able to verify that the source on Github is the same that was used to compile the client on Google Play with reproducible builds [1].<p>And even if the servers turn out to be malicious, the clients are designed to expose as little metadata as possible with things like private contact discovery[2], sealed sender[3] and private groups[4]. It's not perfect, but the data a malicious server could collect is limited.<p>[1] <a href="https://github.com/signalapp/Signal-Android/tree/master/reproducible-builds" rel="nofollow">https://github.com/signalapp/Signal-Android/tree/master/repr...</a><p>[2] <a href="https://signal.org/blog/private-contact-discovery/" rel="nofollow">https://signal.org/blog/private-contact-discovery/</a><p>[3] <a href="https://signal.org/blog/sealed-sender/" rel="nofollow">https://signal.org/blog/sealed-sender/</a><p>[4] <a href="https://signal.org/blog/signal-private-group-system/" rel="nofollow">https://signal.org/blog/signal-private-group-system/</a></p>
]]></description><pubDate>Thu, 04 Mar 2021 19:08:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=26346714</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=26346714</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26346714</guid></item><item><title><![CDATA[New comment by mfwoods in "The Signal Server repository has not been updated since April 2020"]]></title><description><![CDATA[
<p>But you can verify that the source they publish on Github is the same that was used to built the Google Play version with reproducible builds[1]. Also, Android apps are fairly easy to decompile. They are very likely to get caught if they publish an update with a backdoor.<p>[1] <a href="https://github.com/signalapp/Signal-Android/tree/master/reproducible-builds" rel="nofollow">https://github.com/signalapp/Signal-Android/tree/master/repr...</a></p>
]]></description><pubDate>Thu, 04 Mar 2021 18:56:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=26346550</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=26346550</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26346550</guid></item><item><title><![CDATA[New comment by mfwoods in "Signal is finally bringing its secure messaging to the masses"]]></title><description><![CDATA[
<p>It's not, once linked the desktop client can be used independently of your phone.</p>
]]></description><pubDate>Fri, 14 Feb 2020 20:34:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=22330130</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=22330130</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22330130</guid></item><item><title><![CDATA[New comment by mfwoods in "Signal is finally bringing its secure messaging to the masses"]]></title><description><![CDATA[
<p>> Can I use Signal from desktop only?<p>Yes, the desktop client functions independently from the phone client once linked (so not like whatsapp that proxies everything through your phone).<p>> Can I create an account from desktop?<p>Technically yes, but you either need to compile the desktop client yourself[0] and miss some features or use something like signal-cli[1] to act as the main client. So it's not supported (yet?).<p>> Is my account independent of any specific device?<p>The first client that registers acts as the main client, so no. But it might get easier to restore access on a different device without using backups with the secure value recovery[2] stuff they are working on.<p>> Can I use Signal on multiple computers at the same time with correct credentials?<p>It's possible to link and use several desktop clients at the same time.<p>[0] <a href="https://github.com/signalapp/Signal-Desktop/blob/development/CONTRIBUTING.md#setting-up-standalone" rel="nofollow">https://github.com/signalapp/Signal-Desktop/blob/development...</a><p>[1] <a href="https://github.com/AsamK/signal-cli" rel="nofollow">https://github.com/AsamK/signal-cli</a><p>[2] <a href="https://signal.org/blog/secure-value-recovery/" rel="nofollow">https://signal.org/blog/secure-value-recovery/</a></p>
]]></description><pubDate>Fri, 14 Feb 2020 20:34:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=22330121</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=22330121</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22330121</guid></item><item><title><![CDATA[New comment by mfwoods in "Why Telegram is insecure (2015)"]]></title><description><![CDATA[
<p>Because there is no end to end encryption (other than some very limited temporary one on one chats that only work between two mobile devices) which means the server can (and does) read and store all your messages. Getting access to your full chat history is as simple as intercepting a single text, because the server has access to your plain text messages.<p>They might do some form of encryption to store the messages, but this is meaningless when they also have access to the keys and can decrypt any message whenever they want.</p>
]]></description><pubDate>Sun, 06 Jan 2019 15:43:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=18838827</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=18838827</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18838827</guid></item><item><title><![CDATA[New comment by mfwoods in "Why Telegram is insecure (2015)"]]></title><description><![CDATA[
<p>Not necessarily. But storing them in plain text on the server and all history accessible just by hijacking a phone number (or a single text message) is, considering the alternatives, don't you agree?</p>
]]></description><pubDate>Sun, 06 Jan 2019 14:15:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=18838395</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=18838395</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18838395</guid></item><item><title><![CDATA[New comment by mfwoods in "Why Telegram is insecure (2015)"]]></title><description><![CDATA[
<p>I assume they removed it because they don't want anyone to use old insecure code. The RedPhone server hasn't been used for years now and was replaced with a better implementation.<p>You're right there's no official support on their server, but there are some unofficial guides on their community forums on how to set it up. Also, GCM is not a hard dependency. On Android it will fall back to using only websockets (and no GCM) when Google Play Services is not installed since some time. What other features have they removed without replacement?</p>
]]></description><pubDate>Sun, 06 Jan 2019 14:06:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=18838348</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=18838348</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18838348</guid></item><item><title><![CDATA[New comment by mfwoods in "Why Telegram is insecure (2015)"]]></title><description><![CDATA[
<p>Only the encryption layer of the protocol is the same, they are not really compatible otherwise.<p>I assume it's a design trade-off when you have E2EE and don't store any messages on the server. With Signal (and I assume Wire) you have to register each device and each device needs to manage its keys. Every message is send multiple times, once for each device, and each device has an independent message queue on the server. That's why you only get the messages from after you registered the device.<p>Whatsapp doesn't have to do any of that and can just keep the keys on one device.</p>
]]></description><pubDate>Sun, 06 Jan 2019 14:02:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=18838332</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=18838332</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18838332</guid></item><item><title><![CDATA[New comment by mfwoods in "Why Telegram is insecure (2015)"]]></title><description><![CDATA[
<p>> not proxying through your phone which Signal used to do and maybe still does<p>This is what Whatsapp does. Signal never did and has real multi-device support.<p>> and the Signal server is closed source<p>It's not: <a href="https://github.com/signalapp/Signal-Server" rel="nofollow">https://github.com/signalapp/Signal-Server</a></p>
]]></description><pubDate>Sun, 06 Jan 2019 12:59:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=18838101</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=18838101</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=18838101</guid></item><item><title><![CDATA[New comment by mfwoods in "Standalone Signal Desktop"]]></title><description><![CDATA[
<p>Just because it's on a keyserver doesn't mean it's trustworthy. Keyservers do no verification of any kind on the keys they host.<p>If you(r system) trust the certificate that <a href="https://updates.signal.org/" rel="nofollow">https://updates.signal.org/</a> is using, you should be confident that you are getting the correct keys.<p>(You shouldn't trust a stranger on the internet, but I am getting the same keys when I download them.)</p>
]]></description><pubDate>Fri, 03 Nov 2017 13:33:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=15619044</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=15619044</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15619044</guid></item><item><title><![CDATA[New comment by mfwoods in "Standalone Signal Desktop"]]></title><description><![CDATA[
<p>You can build it yourself from source. While it's true that the debug version uses different servers, the functionality is there and can probably be enabled in a production build with little modifications.<p>This might get you started: <a href="https://github.com/WhisperSystems/Signal-Desktop/blob/d1f7f5ee8c1111c2b12a2870c64a830ca0f4fd04/js/views/app_view.js#L90" rel="nofollow">https://github.com/WhisperSystems/Signal-Desktop/blob/d1f7f5...</a></p>
]]></description><pubDate>Tue, 31 Oct 2017 23:53:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=15597781</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=15597781</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15597781</guid></item><item><title><![CDATA[New comment by mfwoods in "Standalone Signal Desktop"]]></title><description><![CDATA[
<p>You're right, I clarified it a little.</p>
]]></description><pubDate>Tue, 31 Oct 2017 23:48:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=15597753</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=15597753</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15597753</guid></item><item><title><![CDATA[New comment by mfwoods in "Standalone Signal Desktop"]]></title><description><![CDATA[
<p>You still need a phone with a registered Signal on iOS or Android initially to activate the desktop version (sorry if that wasn't clear), but you can turn your phone off after.<p>Edit: It actually has the option to register without smartphone, but it's only enabled in the debug versions.</p>
]]></description><pubDate>Tue, 31 Oct 2017 22:21:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=15597106</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=15597106</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15597106</guid></item><item><title><![CDATA[New comment by mfwoods in "Standalone Signal Desktop"]]></title><description><![CDATA[
<p>For those that don't want to enable Javascript, these are the hidden Linux instructions:<p><pre><code>  $ curl -s https://updates.signal.org/desktop/apt/keys.asc | sudo apt-key add -
  $ echo "deb [arch=amd64] https://updates.signal.org/desktop/apt xenial main" | sudo tee -a /etc/apt/sources.list.d/signal-xenial.list
  $ sudo apt update && sudo apt install signal-desktop</code></pre></p>
]]></description><pubDate>Tue, 31 Oct 2017 22:18:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=15597080</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=15597080</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15597080</guid></item><item><title><![CDATA[New comment by mfwoods in "Standalone Signal Desktop"]]></title><description><![CDATA[
<p>Signal Desktop works without having your phone turned on. It acts like a full, independent client after linking it to your smartphone app (unlike WhatsApp, which does require your phone to be turned on).</p>
]]></description><pubDate>Tue, 31 Oct 2017 22:14:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=15597053</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=15597053</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15597053</guid></item><item><title><![CDATA[New comment by mfwoods in "New Skype Update Is Horrible"]]></title><description><![CDATA[
<p>> Also, video chat has been in beta since March 2017.<p>Video chat actually came out of beta in March [0]. The beta was released in February.<p>[0] <a href="https://whispersystems.org/blog/signal-video-calls/" rel="nofollow">https://whispersystems.org/blog/signal-video-calls/</a></p>
]]></description><pubDate>Mon, 03 Jul 2017 21:37:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=14691584</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=14691584</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14691584</guid></item><item><title><![CDATA[New comment by mfwoods in "Facebook Messenger begins testing end-to-end encryption using Signal Protocol"]]></title><description><![CDATA[
<p>Actually, Signal works without routing the messages trough your phone. Instead they use a browser extension to store the keys client side, which acts as a full client with its own, separate keypair.<p>You could even register only the browser, without having a smartphone at all.</p>
]]></description><pubDate>Fri, 08 Jul 2016 15:00:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=12055988</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=12055988</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12055988</guid></item><item><title><![CDATA[New comment by mfwoods in "One week of OpenSSL cleanup"]]></title><description><![CDATA[
<p>I don't think they intend to contribute back to the original OpenSSL code base, but see this as a OpenBSD only fork.</p>
]]></description><pubDate>Sun, 20 Apr 2014 16:27:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=7617357</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=7617357</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7617357</guid></item><item><title><![CDATA[New comment by mfwoods in "Glow-in-the-dark roads make debut in Netherlands"]]></title><description><![CDATA[
<p>That's because there is no video. It's a sound fragment to which they added a single photo (not a render) to make it a video (why? no idea).</p>
]]></description><pubDate>Mon, 14 Apr 2014 02:46:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=7584265</link><dc:creator>mfwoods</dc:creator><comments>https://news.ycombinator.com/item?id=7584265</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7584265</guid></item></channel></rss>