It’s paywalled for me so can’t see this all. But does this mean signal, rcs and other encrypted messages are being logged? Kind of defeats the purpose of privacy based use cases if so
A push notification, from a technical standpoint, is just a way to wake up an app. It doesn’t have to contain any information.
So when you get a message, the messaging service sends a push notification through Apple/Google, which is a way of saying “Hey messaging app, wake up”. The app then starts running in the background on your phone, connects to it’s server, asks if there is anything new to know about, and the server tells it about a new message, if any. This can then generate a notification on your phone, but importantly what you are seeing in the notification did not come through Apple/Google, all that did was the “Hey messaging app, wake up!”.
If authorities then request this data from Apple/Google, all they can see is the times at which your messaging app was asked to wake up. Not whether any message was actually received, or what it contained, or from who. Because all that never touched Apple/Google’s systems, not even in an encrypted form.
That being said, some data can be sent directly through the Apple/Google system along with the wake up message, so it’s not impossible that some apps include some metadata there. In theory they shouldn’t. For example simple marketing notifications or ads often are just included with the push, because it’s simple to do.
all they can see is the times at which your messaging app was asked to wake up. Not whether any message was actually received, or what it contained, or from who.
I don’t know, are they? As far as we know they could only get unsent notifications, which are obviously still with Apple/Google because the target phone is offline and so they couldn’t be delivered yet. Which would explain why they only got thousands of them, not billions.
Signal is E2EE. While it does use notifications, there is no meaningful unencrypted content in them. The content of the notification you see is decrypted on-device.
Yes, these are not “private” services, they are “secure messaging” services. Commonly confused issue. Privacy requires controlling the communication infrastructure. Security only requires controlling the items being shared.
Yes. 100%. Some app creators will encrypt the contents but I don’t think they can encrypt the metadata.
Even the most “private” of companies like Signal and Proton don’t provide any alternative either. Third-party fork Molly adds UnifiedPush support to Signal.
PSA: We’ve received questions about push notifications. First: push notifications for Signal NEVER contain sensitive unencrypted data & do not reveal the contents of any Signal messages or calls–not to Apple, not to Google, not to anyone but you & the people you’re talking to.
Doesn’t this mean there is nothing to log? You got me confused
They could, very easily, by implementing UnifiedPush. Let the users decide if they want/need to use it. But as of now the only way to do that is by installing a third-party app.
Not necessarily. I’m not some sort of tech genius but she’s using some choice language here:
push notifications for Signal NEVER contain sensitive unencrypted data
metadata is not “contained” in the notification.
When pushed on this she basically changed the subject to “there’s no alternative”:
Another Twitter user pointed out that rather than the exposure of the text, the bigger issue is that “the push gets sent at all, not what’s in it. It lets an attacker identify somebody by when they get messages, messages the attacker may even have sent.”
To this, Whittaker replied, “So this is an issue worth clarifying. It’s not possible [right now] to build a mass [communications] app [without] push notifications, [especially with] calling. This is a problem, we agree.”
I could be misinterpreting these statements but that’s how it reads to me. Seems like encrypting metadata would require Google’s involvement and I’m sure that’s the opposite of what they want.
You are trying to read what isn’t there. Push notifications just don’t contain any messages, at all, in any form, whether you want to call it data or metadata. They are just telling the Signal app to wake up, and then it securely checks with the server what’s up.
The only think authorities are getting then, is the fact your Signal app was told to wake up at time X. Not whether you actually received a message, let alone any information about any messages.
It is confusing the system is called “push notifications”, because it has nothing to do with the actual notifications you are seeing on your phone. It’s just a mechanism to wake up sleeping apps so that they can check up with their server.
It’s paywalled for me so can’t see this all. But does this mean signal, rcs and other encrypted messages are being logged? Kind of defeats the purpose of privacy based use cases if so
A push notification, from a technical standpoint, is just a way to wake up an app. It doesn’t have to contain any information.
So when you get a message, the messaging service sends a push notification through Apple/Google, which is a way of saying “Hey messaging app, wake up”. The app then starts running in the background on your phone, connects to it’s server, asks if there is anything new to know about, and the server tells it about a new message, if any. This can then generate a notification on your phone, but importantly what you are seeing in the notification did not come through Apple/Google, all that did was the “Hey messaging app, wake up!”.
If authorities then request this data from Apple/Google, all they can see is the times at which your messaging app was asked to wake up. Not whether any message was actually received, or what it contained, or from who. Because all that never touched Apple/Google’s systems, not even in an encrypted form.
That being said, some data can be sent directly through the Apple/Google system along with the wake up message, so it’s not impossible that some apps include some metadata there. In theory they shouldn’t. For example simple marketing notifications or ads often are just included with the push, because it’s simple to do.
And why are they collecting that information?
I don’t know, are they? As far as we know they could only get unsent notifications, which are obviously still with Apple/Google because the target phone is offline and so they couldn’t be delivered yet. Which would explain why they only got thousands of them, not billions.
Signal is E2EE. While it does use notifications, there is no meaningful unencrypted content in them. The content of the notification you see is decrypted on-device.
Removed archive link, also paywalled.
:(
Articles Found:
Edit:
Yes, these are not “private” services, they are “secure messaging” services. Commonly confused issue. Privacy requires controlling the communication infrastructure. Security only requires controlling the items being shared.
Yes. 100%. Some app creators will encrypt the contents but I don’t think they can encrypt the metadata.
Even the most “private” of companies like Signal and Proton don’t provide any alternative either. Third-party fork Molly adds UnifiedPush support to Signal.
Doesn’t this mean there is nothing to log? You got me confused
I guess it’s possible to log the fact that a push notification was received and the time of it?
Honestly I would expect Signal to try and take care of this
They could, very easily, by implementing UnifiedPush. Let the users decide if they want/need to use it. But as of now the only way to do that is by installing a third-party app.
Not necessarily. I’m not some sort of tech genius but she’s using some choice language here:
metadata is not “contained” in the notification.
When pushed on this she basically changed the subject to “there’s no alternative”:
https://www.medianama.com/2023/12/223-signal-push-notifications-content-meredith-whittaker/
I could be misinterpreting these statements but that’s how it reads to me. Seems like encrypting metadata would require Google’s involvement and I’m sure that’s the opposite of what they want.
You are trying to read what isn’t there. Push notifications just don’t contain any messages, at all, in any form, whether you want to call it data or metadata. They are just telling the Signal app to wake up, and then it securely checks with the server what’s up.
The only think authorities are getting then, is the fact your Signal app was told to wake up at time X. Not whether you actually received a message, let alone any information about any messages.
It is confusing the system is called “push notifications”, because it has nothing to do with the actual notifications you are seeing on your phone. It’s just a mechanism to wake up sleeping apps so that they can check up with their server.
That’s called metadata.
So why do the authorities want it?
Yes it’s called metadata. I don’t know why they want it.
It’s because it’s used in tandem with other data they collect to profile you. To profile all of us.
Yes, I assume so.