Here’s a relevant stack exchange question. Regarding what an ISP can learn. Of note, everybody is ceding that the ISP can tell you’re using signal, and they’ve moved on to whether or not they’d be able to fingerprint your usage patterns.
No they can’t.
papertowels@mander.xyz 12 hours ago
Natanael@infosec.pub 1 day ago
It’s called traffic analysis
Ulrich@feddit.org 23 hours ago
It’s called encryption
ICastFist@programming.dev 22 hours ago
Packet data has headers that can identify where it’s coming from and where it’s going to. The contents of the packet can be securely encrypted, but destination is not. So long as you know which IPs Signal’s servers use (which is public information), it’s trivial to know when a device is sending/receiving messages with Signal.
This is also why something like Tor manages to circumvent packet sniffing, it’s impossible to know the actual destination because that’s part of the encrypted payload that a different node will decrypt and forward.
Ulrich@feddit.org 18 hours ago
Wouldn’t you have to have some sort of MITM to be able to inspect that traffic?
papertowels@mander.xyz 22 hours ago
How exactly do you think encryption prevents the analysis of seeing when an encrypted message is sent?
Natanael@infosec.pub 22 hours ago
I run a cryptography forum
Encryption doesn’t hide data sizes unless you take extra steps
Roughknite@lemm.ee 18 hours ago
How dumb are you? Like someone said the point is they can see the fact that you sent a secured message period. Not with the guardian app though. Pretty easy to comprehend so I am confused why you are acting so stupid.
Ulrich@feddit.org 18 hours ago
The entire point of the article in the OP is that you can send secured messages with The Guardian app. 🤦♂️