The scariest part of this recent news is that TM Signal seem(ed) to be interoperable. People using TM Signal could interact with actual Signal users. How are you to know whether or not your groups have people using bastardized versions of Signal? Are things like Session interoperable with Signal?
At the moment you can’t. The only realistic way I could see that happening is the the server would check the app digital signature and refuse the app from communicating with the official infrastructure if it didn’t match.
deleted by creator
Yeah, I use the molly fork because there’s features I like about it. I’d be sad if I couldn’t use it anymore. :(
deleted by creator
I’m not totally sure signal has it, but I like the ram shredding and socks proxy. I know molly isn’t fit for everyone’s threat model but those two features I do like to see so I use it instead; I’ve not run into any issues with it.
Even then, nothing stops the client from lying to the server.
That’s the point of digitally signing the app, to ensure its authenticity and integrity. TM and others wouldn’t be able to resign the modified app with the Signal Foundation signature.
EDIT: Yeah after thinking more about it it’s not a trivial problem, as you need to assume that the endpoint is inherently untrusted.
It’s actually possible in a way:
https://en.m.wikipedia.org/wiki/SafetyNet
But you necessarily need to limit the devices and operating systems that are allowed. No custom ROMs, no root access, etc.
It’s bullshit and breaks open computing as a concept.
Fuck Safetynet and Play Integrity.
Isn’t that just delegating trust to a third party, e.g. here Google? It’s not as if Google was somehow immune to 0 days.
deleted by creator