SIGNAL- And Why .GOV Hates It

Guest Post by Capitalist Eric

Part of working for a large company is that you sometimes get protesters- environmentalists, Antifa, BLM and their ilk.  And the large company I work for takes security seriously, and monitors for upcoming protests, and makes corresponding changes in access to facilities, monitors perimeter security of the campus, works with local law enforcement, and even hires former .gov employees to manage those security efforts.  By these circumstances, I happened to attend a security briefing last month, regarding upcoming protests, given by a retired FBI manager, who apparently managed a couple of different offices on the East Coast.

The lecture was pretty standard stuff, all considered, but there came a part of the presentation when he was discussing the security efforts for monitoring said groups.  First bullet-point was that they used the app known as “Signal.”  He went further to explain that they had no way to crack it, no matter what they tried, so they didn’t even bother to.  Second point was that the work-around was to get infiltrators into said organizations, who (unlike the FBI agents who instigated the Governor Whitmer kidnapping “plot”) would pretend to be loyal supporters, always supporting the cause, mouthing the platitudes but otherwise not doing anything to arouse suspicion that the insiders were actually moles.  They would do what was necessary to become part of all key leaderships comms channels on Signal, so the FBI could have a direct pipeline to all communications and planning efforts.

At one point he was flat-out laughing, saying that they had more agents inside the leadership comms channels than actual members of the respective groups, and they didn’t have a clue.

This presentation, and other discussions, started me down the rabbit-hole, to learn more about the actual .gov surveillance efforts of groups that might pose a threat the .gov agenda.  It also made me question why Signal was considered “unbreakable” to the FBI (or more accurately, the NSA), and whether this was in fact true.

And finally, it made me realize that everyone needs to understand this subject, so as to have secure, PRIVATE communications, and why it matters.

BIG BROTHER IS WATCHING…

To begin with, everything you do using the internet or cell phones, is recorded and stored at NSA data centers, like the Utah one below:

Now, you may say, “what do I care, I’m not doing anything illegal!”  The problem is that Joe Biden (spit!) has designated that anyone who doesn’t toe the line- especially on subjects such as the Afghanistan withdrawal, the Russia/Ukraine conflict, COVID or stolen elections- is a domestic terrorist, and is subject to prosecution.  That means if they pick you out of the crowd of people discussing these subjects – for any reason or no reason at all- you have no rights.  NONE.  In summary, anyone who the government targets can expect no better treatment than the detainees of Gitmo.  This is why the J6 defendants are horribly treated, and railroaded in sham trials; they have no rights.

According to the ACLU,

The NSA intercepts and copies private communications in bulk while they are in transit, and then searches their contents using tens of thousands of keywords associated with NSA targets. These targets, chosen by intelligence analysts, are never approved by any court, and the limitations that do exist are weak and riddled with exceptions.

This is done as part of Section 702 of the Foreign Intelligence Surveillance Act, or FISA.  The operational program is called “Prism,” and was revealed by Edward Snowden in 2013.

Subsequent analyses revealed that the program really was aimed at foreigners on foreign soil, but that some Americans did get swept up in the gigantic data-suck. This occurred mainly as an unavoidable consequence of internet technology, though it was sometimes the result of bureaucratic overstepping, not so much by the NSA, but rather by the FBI.

This is possible because computer memory is cheap; a 20 Terabyte computer hard drive can be had for $360 currently at Amazon.  The US government has taken advantage of the cheap memory, and built multiple NSA spy data centers in Hawaii, Colorado, Texas, Georgia, and Maryland, all interconnected by dedicated fiberoptic lines in a single, secure data cloud.  The data-storage capabilities of these facilities are staggering, as this article details of the Utah facility:

This data-storage facility for the US intelligence community is designed to store data estimated at over a zettabyte, though its actual capacity is classified. Its purpose is to support the Comprehensive National Cybersecurity Initiative. A zettabyte (ZB) is 1,000 exabytes (EB). Each EB is equal to 1,000 petabytes (PB). A PB is equal to 1,000 terabytes (TB). The average personal computer today has a capacity of 1 TB with a ZB of data representing 100 million personal computers’ data capacity.

Additionally, the total amount of data created, captured, copied, and consumed globally is forecasted to increase rapidly, from 64 ZB in 2020 to more than 180 ZB by 2025—a far cry from the 2 ZB created in 2010.

How Are Large Amounts of Data Managed?

The huge amount of data can only be searched by the powerful, water-cooled HPE/Cray supercomputers at the data center. All these systems require 65 megawatts of electricity, costing about $40 million per year. The facility is estimated to use 1.7 million gallons of water per day for cooling both the supercomputers and the servers that store the data on solid-state drives. Solid-state drives have no moving parts and use a fraction of the power and water for cooling that spinning-disk hard drives require.

The high-availability, fault-tolerant system has no single point of failure. Data is striped across virtual disk arrays and mirrored for instant failover.

In the article, is a key aspect of about the NSA spy data centers:

Redundant ping, power, and pipe guarantee availability of the information to or from any device, with 256-bit advanced encryption standard (AES) on the fly and at rest, with permission, providing protection for all data. It would take hundreds of years for the mighty Cray system to break a single instance of 256 AES encryption.” [emphasis added]

HOW many years, you might ask?

This is why .GOV uses AES-256 bit encryption for their own completely secure communications.

NSA Data Collection and Storage Limitations

The data collected by the NSA (and used by the FBI for domestic surveillance) is stored for up to one year.  Despite the 1-year limitation, the amount of data hoovered-up is simply too massive for humans to meaningfully analyze, to make actionable intelligence of; this is the domain for AI-driven systems to interconnect individual data points to turn into a comprehensible picture.  But even AI systems have their limits, due to required compute power and bandwidth, and so they are focused on to targets (individuals) who somehow gain the attention of the Federal government, for whatever reason.

Once a target is designated, all data gathered on that person for the past year is assembled, and analyzed.  Then everyone you have communicated with, in any way, is designated a target, and all of their data is gathered and analyzed.  And everyone they communicated with, in any way, is designated a target, and the same thing happens.  This is the “Two-Hop Rule,”  as the ACLU again describes:

If, for example, a surveillance target has talked to 200 different people in the last 18 months (a low estimate based on our informal sampling), also if each of who 200 people has including called or being called via 200 different people, when a two-hop request would dry skyward records relations to 40,000 people. And it only gets worse if ready of the numbers in the first hop belongs to a high-volume caller—like a pizza shop, an advertise company, or a hospital.

It is painfully obvious point that the US government is at war with any Americans who don’t obey.  It is equally obvious that the US government relies almost exclusively on electronic intelligence, or ELINT.  The store all data for future use; as soon as they notice you for committing a crime, or perhaps because you speak out to vocally against the current agenda, they pull that data, and prosecute you for a crime, whether you committed one or not.

The ONLY way to stop the government from scooping up you and everyone you know, is to use encrypted communications.

There is only one option:  Signal.  Signal messages are encrypted with the Signal Protocol (formerly known as the TextSecure Protocol). The protocol combines the Double Ratchet Algorithm, prekeys, and an Extended Triple Diffie–Hellman (X3DH) handshake.   It uses Curve25519, AES-256, and HMAC-SHA256 as primitives.

In this article, “Is Signal safe? We asked security experts about the messaging app and your data,” several points out that “the most important privacy tool on Signal is end-to-end encryption….  which ensures that no one (not even Signal) can intercept and read your messages…   Signal’s encryption, in particular, is powered by the app’s own open source Signal Protocol and adds an additional layer of security to almost every communication you hold over the app, from one-on-one messages and group chats to voice calls, video calls and even stickers…   ”

This would be the AES-256 encryption that our most powerful computers could not break for hundreds of years, for a single Signal message.  Essentially, if you use Signal as your only means of communication, within 12-18 months, the government no longer has any means of recording your comms, and the old data is too stale to be of any use.  For this reason alone, it is foolish to use any other communications platform, whether for voice, text or email. 

Further from the same article,

“Out of the three apps, Signal has the best reputation for security and privacy using published encryption that has been thoroughly scrutinised and without any incentive to capture your personal information”, said Searchlight Security CTO and co-founder, Dr. Gareth Owenson.

“WhatsApp is safe in that it uses the same secure encryption as Signal but is owned by Facebook – a company which has historically monetised personal information (principally for advertising). WhatsApp has recently come under criticism for attempting to expand the amount of data shared with Facebook”.

Telegram has a more trustworthy reputation than WhatsApp and offers more features than Signal, but this has earned the app some unsavoury users.

“Telegram has a reputation as a secure messaging app but this is largely due to the feature set it offers rather than the strong encryption”, explained Dr. Owenson.

“Research by Royal Holloway recently found vulnerabilities in the cryptography used by Telegram. Telegram is also popular amount darkweb criminals and other malicious actors due to its perceived security”.

RECAP

To summarize the revelations from the retired FBI agent and my subsequent month of research, here are my take-aways regarding Signal:

  1. Due to its end-to-end 256-bit dynamic encryption, Signal is unbreakable with current technology, for texts and voice or video calls.  There’s no way around this for .gov actors.  Obviously .GOV actors do not advertise this fact…
  2. The Signal servers and organization themselves cannot break the encryption of any messages any more than .gov can.
  3. .Gov demands of Signal for user data will only tell the last time a particular user logged in, nothing more, because the system is purposefully built that way.
  4. All electronic transmissions- including Signal- will be captured by the NSA spy data centers.  However, with insufficient technology for many years- possibly decades – away from being able to crack even one Signal message, all they’ll have is recordings of gibberish; unintelligible and impossible to unlock.
  5. The only avenue for .gov actors to read communications within Signal is by infiltration into your circle, whatever that may be.
  6. Therefore, ONLY allow people on to the private channels that you would trust with your life.  Vetting is absolutely essential.  Public channels, not such a big deal.  (This was a key reason why the “Oath Keepers” people were hammered by .gov, they were crawling with .gov snitches.)
  7. To date, this is the only viable secure messaging system that I’m aware of, without any shady ownership or technical details (like WhatsApp being owned by that paragon of virtue, Mark Zuckerfuck).
  8. Signal can be used for teleconferencing, sending or sharing of documents, and everything you would get from a Zoom or MS Teams platform, with the exception of online presentations.  It represents a secure alternative to email platforms which may be subpoenaed by .gov agents if they go on a fishing expedition.
  9. Final point, set your messages inside of Signal to “disappear” after a short period of time, after which they’re permanently deleted.  (Failure to have this basic security measure is the other key reason why the “Oath Keepers” people were hammered by .gov.)

I apologize to readers, for restating the same points, almost to the point of being pedantic. But taking back your privacy is the first step, and the biggest step, to fighting back against a corrupt government.

The threat that Big Brother has, able to read your emails, chats and listen to your phone calls, creates what courts call a “chilling” effect; groups can’t plan responses to tyrannical government actions without the fear that a “Fed” is listening to everything you do.  That’s whole point, to keep us scared from saying what we think, organizing any kind of meaningful response, keep us scared and suspicious of our neighbors. Indeed, entire Western empire relies almost exclusively on their surveillance capabilities across the electronic spectrum.

Isn’t it time you took that away from them?!? 

We need to have the ability to say what we really think, without .gov punishing us for saying what we think.

Download Signal, and take the first step…  to taking back your privacy.

As an Amazon Associate I Earn from Qualifying Purchases
-----------------------------------------------------
It is my sincere desire to provide readers of this site with the best unbiased information available, and a forum where it can be discussed openly, as our Founders intended. But it is not easy nor inexpensive to do so, especially when those who wish to prevent us from making the truth known, attack us without mercy on all fronts on a daily basis. So each time you visit the site, I would ask that you consider the value that you receive and have received from The Burning Platform and the community of which you are a vital part. I can't do it all alone, and I need your help and support to keep it alive. Please consider contributing an amount commensurate to the value that you receive from this site and community, or even by becoming a sustaining supporter through periodic contributions. [Burning Platform LLC - PO Box 1520 Kulpsville, PA 19443] or Paypal

-----------------------------------------------------
To donate via Stripe, click here.
-----------------------------------------------------
Use promo code ILMF2, and save up to 66% on all MyPillow purchases. (The Burning Platform benefits when you use this promo code.)
Click to visit the TBP Store for Great TBP Merchandise
Subscribe
Notify of
guest
33 Comments
GNL
GNL
July 25, 2023 2:56 pm

This is 100% true?

Brewer55
Brewer55
  GNL
July 25, 2023 3:48 pm

Come on, Glock. You’ve been here a long time. Is ANYTHING in this world 100%?
If you read the long article Capitalist Eric based his essay on the meeting with a former FBI agent AND, his own research into Signal.

I will add one thing that I posted on his site that has not yet, as of this writing, been replied to.

A few years ago I belonged to a group (I’m leaving it nameless but, it has chapters/groups all over the US) of conservative minded individuals. At the time that I was a member, Signal was the app of choice for secure communications. There was a group that was set up for the local chapter here in GA. Well, after a month or so in this group a RUMINT (rumor intelligence) started circulating that Signal could be compromised. It was said that Jack Dorsey, the former owner of Twitter, had provided some of the seed money to start Signal. Because of this, the US operation for this group moved to Telegram. (Telegram is rumored to have a back door to the alphabet agencies too!).
Note: for reasons I won’t go into here, I left that group after a few months.

What is actually true, I can’t say. I don’t know if the Dorsey/Signal rumor is true, or not.

For mail services, I personally use ProtonMail. It’s said that it is not 100% secure either.

It is good to be skeptical, and careful, in this time of ‘good is bad; bad is good’. We are in an upside down world.

Anonymous
Anonymous
  Brewer55
July 25, 2023 7:42 pm

It’s a 501c, no mention of that in article.

https://projects.propublica.org/nonprofits/display_990/824506840/12_2019_prefixes_82-86%2F824506840_201812_990_2019121216951146

I’m still trying to find out what 3 letter agency funded this thing.

America is a Tijuana Donkey Show
America is a Tijuana Donkey Show
  Brewer55
July 25, 2023 9:46 pm

I will never trust any tech. I believe we are possibly entering another dark ages.

Anonymous
Anonymous
  Brewer55
July 26, 2023 12:36 am

RUMINT? You expect people to take that seriously?

k31
k31
  GNL
July 26, 2023 12:34 am

I think it is a thesis in psyop techniques.

Anonymous
Anonymous
July 25, 2023 2:57 pm

First Signal Can now only sent messages to others with signal
Second to take back our privacy, We also need the following anonymous messages that do not do not require accounts.
Blockchain programs to use for things like browsing, torrenting, messaging. No more bio identify. and decentralized networks and programs.

The real one and only, soon to change Caitlyn Jenn
The real one and only, soon to change Caitlyn Jenn
  Anonymous
July 25, 2023 9:47 pm

I could be wrong, due to the basic fact that I’m not a tech whiz, but to my simple logic, if either major phone language (Android or IOS) allows an app on THEIR devices, it only makes sense to me that they can see everything you do with said app.

anonr
anonr

The end-to-end encryption of an app stops at the application. If a device is compromised, what is displayed on the screen and typed into the device is unencrypted and can be recorded.

SecurityGuy
SecurityGuy
  Anonymous
July 26, 2023 7:15 pm

Take a look at Session – it requires physical vetting exchanged via QR or exchange of identity, however Session does not require bio identity it is infact decentralized. Still vetting security/privacy commitment. Looks promising.

Ben Lurken
Ben Lurken
July 25, 2023 3:28 pm

Maybe all TBP comments should be on Signal

Brewer55
Brewer55
July 25, 2023 3:55 pm

A few articles to ponder.

https://www.foxbusiness.com/technology/jack-dorsey-announces-he-will-give-grant-1-million-per-year-signal-app

Does Twitter own Signal? Well, No. Here is all you need to know

https://www.techcircle.in/2022/12/14/jack-dorsey-to-give-1-mn-per-year-to-signal-app/

comment image?ssl=1

NJroute22
NJroute22
July 25, 2023 4:04 pm

Yeah, I’m on the “If it sounds too good to be true” fence at this point. Who needs to talk to anyone on their phones anyway?

Do wop diddy
Do wop diddy
July 25, 2023 4:07 pm

I figure anything typed into a computer or a phone is intercepted. I bet I am on a lot of lists and so are most who visit TBP.

anon a moos
anon a moos
  Do wop diddy
July 25, 2023 8:31 pm

I identify as not being on any lists.

TN Patriot
TN Patriot
  Do wop diddy
July 25, 2023 9:01 pm

If you are not on a list, you are not doing things properly.

Anonymous
Anonymous
July 25, 2023 4:10 pm

Abolish the state and we won’t have to try so hard (and in vain) to be secretive. The billions ultimately enable their handful of jailors. Simple arithmetic fixes this:

Overthrowing the State

Our Greatest Earthly Enemy

NJroute22
NJroute22
  Anonymous
July 25, 2023 4:28 pm

I agree – but give up when I try to envision how exactly to summon the necessary numbers to accomplish this. Sadly, I think we’ll only have enough “power in numbers” when it is either too ugly or too late.

YourAverageJoe
YourAverageJoe
July 25, 2023 4:36 pm

Wouldn’t using Signal be a red flag to the communists that you are in rebellion?

k31
k31
  YourAverageJoe
July 26, 2023 12:43 am

Very perspicacious, Joe.

Eud
Eud
July 25, 2023 4:57 pm

No way Google copies and alerts whomever wants alerting everytime the SIGNAL app is downloaded.

No way do those ones then activate synchronized monitoring via:
●Your car wifi.
●Your wifi router.
●Your smartwatch.
●Fitbit
●Wifi DVD player.
●Wifi Fridge
●Wifi A/C
●Wifi video games.
●Wifi TV
●Alexa
●Your Credit Cards
●Your bank accounts
●Your online purchases
●You online website visits.
●Satcams passing over your location.
●Facebark, tiptom, zipzorp, flimflam and every other idiotic social media app,
●All the family and friends on your contact list, and their bank accounts, jobs, online activity etc.
●Your employer and all their data.
●Your school and all their data.

I posit one of the top ways to draw negative attention from the Borg is trying to hide stuff from the Borg.

The real one and only, soon to change Caitlyn Jenn
The real one and only, soon to change Caitlyn Jenn
  Eud
July 25, 2023 9:49 pm

You forgot toaster. I’m joking, or am I?

MrLiberty
MrLiberty
  Eud
July 25, 2023 9:52 pm

Everything gets scooped up…to be used against you at a later date…or against your friends.

Eud
Eud
  MrLiberty
August 11, 2023 10:57 pm

NOTICE:
Fortunately eveything I say is merely an observant suggestion based on the evidence presented and timepass supposition.

Paleocon
Paleocon
July 25, 2023 5:39 pm

Government AI scraping of Twitter makes “X” unprofitable because all that bandwidth costs money.

Steve Z.
Steve Z.
July 25, 2023 5:55 pm

I’m just going to live my life and the BASTARDS know what I think of them.
The govt is so inept I don’t fear it.
Your chances of getting caught up in anything is roughly a million to one.
Why rearrange you life for those cocksuckers….Fuk em’

Arizona Bay
Arizona Bay
July 25, 2023 6:30 pm

I personally use Signal and have for some time. Do I think it is 100% secure…nope. But, I do think it is more secure than anything involving Zuckerbucks or regular SMS texting. I know for fact it is not because when Tucker said as much when the Putin interview never happened. He said NSA had all of his Signal texts with his producer already. I will look for that link and post it if I can find it.

https://www.tiktok.com/@proud_oif_veteran/video/7209371612238417195

Jim N
Jim N
July 25, 2023 7:56 pm

This is an interesting read and something to ponder. However, I noticed about halfway thru it that the grammar went all to hell. I visited the source website and the grammatical issues were there as well. I don’t understand why that would be unless Capitalist Eric is a ‘bot or if maybe the original article was not written in English and had to be run through a translator.

Capitalist Eric
Capitalist Eric
  Jim N
July 26, 2023 12:35 pm

I’m no bot. I just quoted extensively from published articles that are linked, so you can see for yourself. Their grammar- as you will see for yourself- sucks.

It’s actually typical for engineering/technical types to be good in their respective fields, but have atrocious writing skills…

FYI
FYI
July 25, 2023 8:40 pm

The security of SIGNAL has been in doubt for quite some time:

Court Docs Show FBI Can Intercept Encrypted Messages From Deep State-Backed ‘Signal’ App

The real one and only, soon to change Caitlyn Jenn
The real one and only, soon to change Caitlyn Jenn
July 25, 2023 9:42 pm

I have the Signal app and no one else in my circle seems to, but I’m willing to bet it absolutely can be hacked. If nothing else, they’d go directly to the source and make em an offer they couldn’t refuse. In fact, it further wouldn’t surprise me if Signal is a government built app.

lamont cranston
lamont cranston
July 26, 2023 12:38 am

Phleeeeze. Staying “gray” is the better (best?) option.

TCS
TCS
  lamont cranston
July 26, 2023 8:25 am

Or just never say anything you aren’t willing to own.