Top
Best
New

Posted by keyboardJones 5 days ago

Signal Secure Backups(signal.org)
982 points | 440 commentspage 5
nlitsme 4 days ago|
This seems to be an unfortunate case where a feature has a misleading name.

You already had secure and encrypted backups on your phone, which you could copy and restore, if you remembered to copy them, and write down a very long password.

The new feature is apparently a way for signal to sell cloud services.

I do think cloud based backups are very useful for less technical people. But it does not really matter if your (properly encrypted) signal backup lives on a google drive/apple cloud, or on a cloud service managed by Signal.

Analemma_ 4 days ago||
The encrypted backups do work, but Signal is really, really bad at indicating when and how to make them to use them for restoration. Most non-technical people I know are just resigned to wiping out their Signal history every time they get a new iPhone (and I know two people who abandoned Signal and went back to iMessage because of this), and even I've lost it a couple times.

It leaves sort of a gross taste in my mouth that a paid service is the fix for their unhelpful UX.

noja 4 days ago|||
> You already had secure and encrypted backups on your phone, which you could copy and restore, if you remembered to copy them, and write down a very long password.

Did I? Where? on iOS I don't.

Edit: there is a transfer to a new phone thing, but that only works if the old phone still works. Which makes it not a backup (it's a transfer).

foofoo12 4 days ago|||
> if you remembered to copy them, and write down a very long password

All that BEFORE your phone was stolen/damaged.

aborsy 4 days ago|||
Come on, $2/month is nothing, and doubtful would raise much of “revenue “. That’s a coffee a month.
wer232essf 4 days ago||
[flagged]
conradev 4 days ago||
I believe this service works no differently. Lose that passphrase, lose everything.
SwamyM 4 days ago||
While we are on the topic of Signal, does anyone know if it's possible to have a lock/PIN to open the Signal app itself that's different than your device lock/PIN?

Threema has this feature and it's reassuring to know that people can't open my chats when I hand my phone to someone. Or if I give the device lock/PIN to someone I trust for backup purposes but don't want them to have access to chats themselves.

Last I checked this was not possible with Signal (at least on Android).

JoshTriplett 4 days ago||
https://www.lifewire.com/how-to-set-up-android-guest-mode-47...

https://www.howtogeek.com/806247/how-to-set-up-androids-gues...

yc-kraln 4 days ago||
Sounds like you want Molly
SwamyM 4 days ago||
For anyone else that's not familiar, this is referring to https://molly.im/ which looks like it's a fork of Signal. And looks like it interops with Signal, so you can talk to your regular Signal contacts as well.

That's very interesting.

My only concern with it would be how sustainable it is in the long term. I am using Threema currently, which has a plan for enterprises, so that seems more reliable but it's lacking in features and usability.

palata 4 days ago||
> My only concern with it would be how sustainable it is in the long term.

Another concern should be: can you trust molly? Cryptographers have been auditing Signal... who is auditing molly?

SwamyM 4 days ago||
In addition, it looks like third-party apps (there are a few) that interface with the official Signal client maybe against Signal's TOS. They haven't enforced it yet from what I can see but it's a possibility and that's a fairy large risk IMO.
siva7 4 days ago||
So it's stored on their server? I don't get why they can't simply store it safely on the apple or google user cloud like every other messaging app
Silhouette 4 days ago||
I appreciate Signal and that the Signal developers provide a very useful service to the community for free.

I also know a large number of people who won't use it because it locks your messages up in its own walled garden. People use apps like this precisely because they want to have control over their own communications without any third parties interfering! I have never understood what kind of threat model they think they're protecting against by not letting people take their own backups and store them according to their own preferences. Whatever the reasons it is clearly a deterrent to wider adoption.

This announcement might seem like progress but I doubt it will convince any of the people I know who won't use it because at the end of the day it's still a walled garden. If and when the promise of the comments near the end of the announcement is realised and we can back up our own messages and media freely from our own devices to our own (presumably also secure) backup facilities then it will be much more interesting.

upofadown 4 days ago||
The key is 64 characters? Even if that key is made out of decimal digits that works out to 212 bits. That seems quite excessive for a symmetrical key you are hoping to have a user deal with directly. It appears that the usability of this scheme could be significantly improved by simply using a shorter key.
growse 4 days ago|
What's the specific use case that benefits from a shorter key?

The only interaction I can ever see having with this key is putting it into and taking it out of my password manager....

upofadown 4 days ago||
The article specifically suggests writing the key down in a notebook. A single incorrect digit and the scheme fails much later in a way catastrophic to the user.
whyever 4 days ago||
Signal asks you to repeat the key immediately before even enabling backups. It cannot fail much later unless you modify the digit after the check.
upofadown 4 days ago||
A longer key makes typing a bunch of characters back into the phone much less usable.
b8 4 days ago||
Since phones have a lot of storage, then why not constantly backup locally and overwrite it for newer versions (opt in of course)? Signal already has large operating cost, so a cloud backup with the very low subscription cost is concerning. It would help Signal to get rid of sms registration and move to something less costy.
dheera 4 days ago||
Or just GPG encrypt your messages and store it on some cheap shitcoin's blockchain for free forever storage.
alance 3 days ago|
Is that a real thing?
elvisloops 5 days ago|
I can't believe Signal is doing this.

Signal is known for its cutting-edge cryptographic protocol, but this feature has the effect of throwing that out the window and replacing it with a single static key. If a device with this enabled goes through the whole advanced protocol to receive a message (double ratcheting etc), then turns around and uploads it back to Signal’s servers with a static key, isn't that a roundabout way of replacing all of signal's protocol and its forward secrecy with a static key that has no forward secrecy?

They’re calling it "opt-in," but it doesn't look like that's actually true? You can’t know whether someone you’re talking to -- who may not understand the implications -- has enabled it. In group chats, it looks like a single person turning it on eliminates signal protocol for everyone in the chat.

Based on this post, the only way to actually opt out of this is to force disappearing messages to be enabled for a time under 24 hours for every chat, which is pretty frustrating.

Signal already lags other messengers in reliability, speed, and features. The reason people use it is for its uncompromising security. Shipping something that weakens that foundation undermines the reason people use Signal.

Marsymars 5 days ago||
> They’re calling it "opt-in," but it doesn't look like that's actually true? You can’t know whether someone you’re talking to -- who may not understand the implications -- has enabled it. In group chats, it looks like a single person turning it on eliminates signal protocol for everyone in the chat.

TBF Signal already supports automated key-protected backup (and has for years), it's just stored on-device, but there's no way to know what the other party is doing with that on-device backup.

elvisloops 5 days ago||
There's a big difference to me between storing it on device and someone else's servers.
Marsymars 5 days ago|||
Sure, but you already have no way of knowing which one the other parties in your chats are doing.

I already sync my Signal backups to the cloud, because that's the most practical and time/cost-effective way to have a 3-2-1 backup system for my chats.

elvisloops 5 days ago||
There's a difference between someone in your chats acting adversarially and Signal supporting/encouraging adversarial behavior as part of the way the app works. If Signal published a change to the protocol that removed forward secrecy, we wouldn't consider it a non-event and say "well anyone could screenshot messages anyway," even though that may be true. They're calling this "secure backups," but in truth it appears to reduce security
joshjob42 5 days ago|||
I don't think it's appropriate to call someone you're talking to with disappearing messages turned off making a backup of the conversation so they have the (non-disappearing) message history if they drop their phone in a lake as "adversarial behavior".

If you don't want them to have a history only communicate via disappearing messages.

elvisloops 5 days ago||
This post says disappearing messages are included in the backups. You have to enable disappearing messages with a timer of less than 24 hours to ensure that you can opt out.
joshjob42 4 days ago||
Sure but the backup happens each day and then gets overwritten/deleted when the next days backup happens (which then deletes the disappearing messages that are expiring express the next backup). It just ensures you have access to any messages that you’re supposed to have access to according to the timers on said messages.
elvisloops 4 days ago||
That's not how forward secrecy works. Ciphertext isn't "deleted" unless the key used to encrypt it is also deleted. That's the point of Signal's cutting edge protocol. This undoes all of that.
evbogue 5 days ago|||
I'd also wonder where this shared encryption key for message "backups" is stored. If it's available on all of my devices, I suspect it would be available on other devices as well?
brewdad 4 days ago|||
The article says it is generated on your device and they don't have a copy. Sounds like a public-private keypair where you are responsible for managing the private key.
evbogue 4 days ago||
got it. doesn't Signal already have on-device keys with a session ratchet? why not back those keys up so one can decrypt the entire history on any device?
krior 4 days ago||
afaik the key material is regenerated for every message. new keys can be derived for every subsequent message you send, but only until you get a reply, then a new key exchange takes place. And the key material for message m1 cannot derive keys for the messages that came before m1. If the old key material gets properly deleted then there is only a very small window of compromise. backing up those keys would defeat the purpose of the ratchet.
evbogue 4 days ago||
yes, agreed, and isn't this feature re-encrypting all of the material without a ratchet or asymmetrical boxing?
elvisloops 4 days ago||
Yes, it undoes all of the security features of Signal's encryption protocol.
bilal4hmed 5 days ago|||
I mean it says so right in the blog post

At the core of secure backups is a 64-character recovery key that is generated on your device. This key is yours and yours alone; it is never shared with Signal’s servers. Your recovery key is the only way to “unlock” your backup when you need to restore access to your messages. Losing it means losing access to your backup permanently, and Signal cannot help you recover it. You can generate a new key if you choose. We recommend storing this key securely (writing it down in a notebook or a secure password manager, for example).

evbogue 4 days ago||
i missed that paragraph, thanks for pointing it out. i wonder what algorithm they're using here, and if we could use third party tooling to decrypt these messages on a local computer? it might be a pathway to some cool experimental third-party Signal apps
fsflover 5 days ago|||
Why does it matter if everything is encrypted?
fsflover 4 days ago||
Why am I downvoted? It seems actually encrypted, https://news.ycombinator.com/item?id=45171740
chimeracoder 5 days ago|||
> They’re calling it "opt-in," but it doesn't look like that's actually true? You can’t know whether someone you’re talking to -- who may not understand the implications -- has enabled it. In group chats, it looks like a single person turning it on eliminates signal protocol for everyone in the chat.

People already can export backups of the messages they receive, in plain text, and publish those on the Internet if they way.

Signal's threat model has never included "you are directly messaging an adversarial party and expect to retain control over redistribution of those messages".

3np 5 days ago|||
> Signal's threat model has never included "you are directly messaging an adversarial party and expect to retain control over redistribution of those messages".

On the contrary.

https://signal.org/blog/signal-doesnt-recall/?pubDate=202508...

chimeracoder 4 days ago|||
> On the contrary

Well, no, that doesn't contradict what I said at all. That link isn't about treating the recipient of your messages as an adversarial actor. The recipient can still choose to enable it, if they want to provide Microsoft access to the messages they receive.

x0x0 4 days ago|||
Huh? That is very explicitly about preventing the migration of your signal messages into Windows Recall. Not the threat model you discuss.
elvisloops 5 days ago|||
I think the difference is that this is all happening in the app as a supported flow. If simply enabling a toggle in Signal (likely without understanding the implications) is now considered "adversarial," then I think that's a problem
amluto 5 days ago|||
It seems plausible that the protocol could be designed such that the device doesn’t know the recovery key. The key serves three purposes: (a) identifying the backup when a user tries to restore it, (b) authenticating that user to the restore API, and (c) allowing the user to decrypt the backup.

(a) is much simpler if there is a fixed identifier of a user, but that identifier doesn’t need to be the entire key or even part of it — it could be some derived material.

(b) isn’t strictly required but I would be very uneasy about allowing anyone who stole a user’s device to download even the ciphertext of that user’s future chats. Also, there’s an obvious issue that even the ciphertext reveals something about the amount of activity from the user.

(c) requires that the restoring user hold something like a private key, that said key can be derived using the restore code, and that the user’s device does not know the private key.

One straightforward-ish solution would be for the user’s device to generate, once, a key pair, a user ID, and a backup API key. (The ID and API key could be generated server-side.). The restore key is (user ID, private key). The device retains (user ID, API key, public key). To upload backups, the device establishes a secure session, sends the user ID, proves knowledge of the API key, uploads a backup, and receives a new API key. The old API key is revoked.

This means:

1. The device does not retain the ability to download future backups.

2. A clone of a device (say id the device leaks its secrets somehow) cannot be used to upload new backups on an ongoing basis without being noticed because of the API key rotation.

maqp 4 days ago|||
>Signal is known for its cutting-edge cryptographic protocol, but this feature has the effect of throwing that out the window and replacing it with a single static key

The exfiltration of which is as easy as exfiltration of database on device. You're not running an IDS scanning 100% of your device LTE traffic in case that happens.

>isn't that a roundabout way of replacing all of signal's protocol and its forward secrecy with a static key that has no forward secrecy?

It's opt in. And again exfiltrating the backup key is as easy as exfiltrating your messages from your device.

>You can’t know whether someone you’re talking to -- who may not understand the implications -- has enabled it

You can't know if you're talking to an informant or if your contact is running Android that's receiving security updates or if it's a zero-day on wheels, either. Tech doesn't solve human problems.

elvisloops 4 days ago||
It's not opt in: signal protocol for a group chat is eliminated if one person in the group chat turns this on, whether or not you do. Communicating with someone who acts adversarially is different from Signal itself adding features that are adversarial.
fastest963 4 days ago|||
If you're in a group and someone is backing up the messages, it only affects your messages in that group. All of your other chats are still secure as long as you're not using the backup frature.

You (and Signal) can't control how the recipient handles your messages if you're not using disappearing. They could be copying and pasting your messages or taking screenshots. I don't see how the backup feature is any different.

upofadown 4 days ago||
You can't have forward secrecy for something you want to keep for an indefinite interval. How many Signal users actually achieve forward secrecy anyway? They tend to want to keep their old messages available to them.
More comments...