The Trump Administration Accidentally Texted Me Its War Plans U.S. national-security leaders included me in a group chat about upcoming military strikes in Yemen. I didn’t think it could be real. Then the bombs started falling.

By Jeffrey Goldberg

  • ladfrombrad 🇬🇧@lemdro.id
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    9
    ·
    edit-2
    3 days ago

    Are we missing an /s here? Signal is headquartered in the US, and here’s me pondering if they were actually using Telegram instead. Which would’ve been pretty apt.

    I think at this point I’d be better off trying to use WeChat…

    edit: https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger - archive

    For a bit of clarity some are not seeing. Google, sanctioned too. Crazy times.

    • InternetCitizen2@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      3 days ago

      The headquarters are irrelevant. Signal is open source. Its academically dishonest to say they are insecure without pointing to why in the source.

      • zalgotext@sh.itjust.works
        link
        fedilink
        arrow-up
        7
        ·
        3 days ago

        Eh, I think that in the context handling classified information, it’s fair to say Signal is “insecure”, purely because anyone with a phone number can have an account, and can be accidentally added to sensitive conversations.

        You know, like the exact thing that happened in this article.

        Not that that’s Signal’s fault. But the fact that it’s even possible makes Singnal unusable for handling classified information.

        • InternetCitizen2@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          3 days ago

          Fair, but that is not what the comment I am replying to is saying. They are saying Signal is compromised for being based in the US.

      • Boddhisatva@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        3 days ago

        Russia has been sending out specially crafted QR code in phishing attempts. The codes use the Linked Devices feature of Signal. If they can get one of these idiots to scan the code, the hacker’s device will be copied in on all the user’s messages. Now, given how stupid the people in this administration are, how hard do you think it will be, or more likely, how hard it was to to get them to scan such a code?

      • ladfrombrad 🇬🇧@lemdro.id
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        3 days ago

        The headquarters are irrelevant.

        Is it?

        Is that why people trying to protect their privacy use VPN’s/DNS resolvers outside of the US jurisdiction such as Mullvad/Quad9 etc?

        And as stated by someone else if you’re using a personal device with a phone number to share classified information outside of a SCIF, you’ve got to ask yourself if there’s a modicum of “sensibility” in the administration here.

        • InternetCitizen2@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 days ago

          If the data you transmit is properly encrypted it does not matter where it passed and where it is.

          you’ve got to ask yourself if there’s a modicum of “sensibility” in the administration here.

          That is independent of what I am saying about Signal

          • ladfrombrad 🇬🇧@lemdro.id
            link
            fedilink
            English
            arrow-up
            1
            ·
            3 days ago

            It does when you’re sharing nationally classified information with what is a third party, not sanctioned by the administration itself?