Secure Messaging is a new innovation for confidential story-sharing and source protection, underpinning the Guardian’s commitment to investigative journalism. The Guardian has published the open source code for this important tech to enable adoption by other media organisations.
How exactly do you think encryption prevents the analysis of seeing when an encrypted message is sent? It feels like you’re trying to waive a magic wand and say “encryption means you’re good!”
Cyber security is not my thing, but my understanding is that you’d still see network traffic - you just wouldn’t know what it says.
Packet data has headers that can identify where it’s coming from and where it’s going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal’s servers use (which is public information), it’s trivial to know when a device is sending/receiving messages with Signal.
This is also why something like Tor manages to circumvent packet sniffing, it’s impossible to know the actual destination because that’s part of the encrypted payload that a different node will decrypt and forward.
Timing of messages. They can’t tell what you send, but can tell when
No they can’t.
E: if someone wants to provide evidence to the contrary instead of just downvoting and moving on, please, go ahead.
It’s called traffic analysis
It’s called encryption
I run a cryptography forum
Encryption doesn’t hide data sizes unless you take extra steps
How exactly do you think encryption prevents the analysis of seeing when an encrypted message is sent? It feels like you’re trying to waive a magic wand and say “encryption means you’re good!”
Cyber security is not my thing, but my understanding is that you’d still see network traffic - you just wouldn’t know what it says.
Packet data has headers that can identify where it’s coming from and where it’s going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal’s servers use (which is public information), it’s trivial to know when a device is sending/receiving messages with Signal.
This is also why something like Tor manages to circumvent packet sniffing, it’s impossible to know the actual destination because that’s part of the encrypted payload that a different node will decrypt and forward.