Hacker News new | past | comments | ask | show | jobs | submit login

I feel bad for the Signal devs. If they weren't personally targets for state level actors before, they are now.

Say what you want about the usability of DoD home grown solutions, but it was a military system backed up by military budgets and guns - civilians are less likely to be collateral damage in an attack against these systems.

Now, all the civilians using Signal are potential splash damage casualties in a military conflict.

I also suspect Signal does not have the budget, staffing, or desire to serve as a front line soldier in a cyber war; but this exposes them to military-grade risks, whether they like it or not.






Given it's usage in the past, Signal and it's developers have definitely been a target before now. Not to mention by law enforcement and forensic companies like Cellebrite, which lead to them hitting back in a rather amusing blog post a while back:

https://signal.org/blog/cellebrite-vulnerabilities/




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: