Hacker News new | past | comments | ask | show | jobs | submit login

There's no way for Signal to prevent any piece of code that can make a TCP connection and speak its protocol from using the service.





While that's true even in the general case (through reverse engineering), it's especially true in the case of Signal because it's open source.

There are libraries for interacting with Signal services (one from Signal themselves), here is a CLI tool that uses a patched official library: <https://github.com/AsamK/signal-cli>


Why not require keys signed with Signal's private key?



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: