12 comments

  • vaylian2 hours ago
    previous discussion: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46600839">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46600839</a>
  • kfreds25 minutes ago
    It’s exciting to hear that Moxie and colleagues are working on something like this. They definitely have the skills to pull it off.<p>Few in this world have done as much for privacy as the people who built Signal. Yes, it’s not perfect, but building security systems with good UX is hard. There are all sorts of tradeoffs and sacrifices one needs to make.<p>For those interested in the underlying technology, they’re basically combining reproducible builds, remote attestation, and transparency logs. They’re doing the same thing that Apple Private Cloud Compute is doing, and a few others. I call it system transparency, or runtime transparency. Here’s a lighting talk I did last year: <a href="https:&#x2F;&#x2F;youtu.be&#x2F;Lo0gxBWwwQE" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;Lo0gxBWwwQE</a>
    • stavros22 minutes ago
      I don&#x27;t know, I&#x27;d say Signal <i>is</i> perfect, as it maximizes &quot;privacy times spread&quot;. A solution that&#x27;s more private wouldn&#x27;t be as widespread, and thus wouldn&#x27;t benefit as many people.<p>Signal&#x27;s achievement is that it&#x27;s very private while being extremely usable (it just works). Under that lens, I don&#x27;t think it could be improved much.
      • maqp7 minutes ago
        &gt;Signal&#x27;s achievement is that it&#x27;s very private while being extremely usable (it just works).<p>Exactly. Plus it basically pioneered the multi-device E2EE. E.g., Telegram claimed defaulting to E2EE would kill multi-client support:<p>&quot;Unlike WhatsApp, we can allow our users to access their Telegram message history from several devices at once thanks to our built-in instant cloud sync&quot;<p><a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20200226124508&#x2F;https:&#x2F;&#x2F;tgraph.io&#x2F;Why-Isnt-Telegram-End-to-End-Encrypted-by-Default-08-14" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20200226124508&#x2F;https:&#x2F;&#x2F;tgraph.io...</a><p>Signal just did it, and in a fantastic way given that there&#x27;s no cross device key verification hassle or anything. And Telegram never caught up.
  • frankdilo1 hour ago
    I do wonder what models it uses under the hood.<p>ChatGPT already knows more about me than Google did before LLMs, but would I switch to inferior models to preserve privacy? Hard tradeoff.
  • lrvick1 hour ago
    What he did with messaging... So he will centralize all of it with known broken SGX metadata protections, weak supply chain integrity, and a mandate everyone supply their phone numbers and agree to Apple or Google terms of service to use it?
    • rcxdude36 minutes ago
      The issue being there&#x27;s not really a credible better option. Matrix is the next best, because they do avoid the tie-in to phone numbers and such, but their cryptographic design is not so great (or rather, makes more tradeoffs for usability and decentralisation), and it&#x27;s a lot buggier and harder to use.
    • pousada55 minutes ago
      Do you know a better alternative that I can get my elderly parents and non-technical friends to use? I haven’t come across one and from my amateur POV it seems much better than WhatsApp or Telegram.
    • fsflover1 hour ago
      Not sure why you&#x27;re gettimg downvoted. This is exactly what he did to instant messaging; extremely damaging to everyone and without solid arguments for such design.
      • maqp55 minutes ago
        Or, he took a barely niché messaging app plugin (OTR), improved it to provide forward secrecy for non-round trips, and deployed the current state-of-the art end-to-end encryption to over 3,000,000,000 users, as Signal isn&#x27;t the only tool to use double-ratchet E2EE.<p>&gt;broken SGX metadata protections<p>Citation needed. Also, SGX is just there to try to verify what the server is doing, including that the server isn&#x27;t collecting metadata. The real talking is done by the responses to warrants <a href="https:&#x2F;&#x2F;signal.org&#x2F;bigbrother&#x2F;" rel="nofollow">https:&#x2F;&#x2F;signal.org&#x2F;bigbrother&#x2F;</a> where they&#x27;ve been able to hand over only two timestamps of when the user created their account and when they were last seen. If that&#x27;s not good enough for you, you&#x27;re better off using Tor-p2p messengers that don&#x27;t have servers collecting your metadata at all, such as Cwtch or Quiet.<p>&gt;weak supply chain integrity<p>You can download the app as an .apk from their website if you don&#x27;t trust Google Play Store.<p>&gt;a mandate everyone supply their phone numbers<p>That&#x27;s how you combat spam. It sucks but there are very few options outside the corner of Zooko&#x27;s triangle that has your username look like &quot;4sci35xrhp2d45gbm3qpta7ogfedonuw2mucmc36jxemucd7fmgzj3ad&quot;.<p>&gt;and agree to Apple or Google terms of service to use it?<p>Yeah that&#x27;s what happens when you create a phone app for the masses.
        • stavros19 minutes ago
          Exactly. These arguments are so weak that they read more like a smear campaign than an actual technical discussion.<p>&quot;You have to agree to Apple&#x27;s terms to use it&quot;? What&#x27;s Signal meant to do, jailbreak your phone before installing itself on it?
          • kelipso5 minutes ago
            Moxie Marlinspike sounds like some 90s intelligence guy’s understanding of what an appealing name to hacker groups would sound like. Put a guy like that as so-called creator of some encryption protocol for messaging and promote the app like it’s for secret conversations and you think people won’t be suspicious? It screams honeypot like nothing else.
            • stavros2 minutes ago
              So the argument against Signal is now &quot;the creator&#x27;s nickname sounds odd&quot;? I mean, OK? Keep using WhatsApp, Telegram or Instagram if you think those are more private than Signal.
        • sudahtigabulan2 minutes ago
          &gt;&gt;broken SGX metadata protections<p>&gt;Citation needed.<p><a href="https:&#x2F;&#x2F;sgx.fail" rel="nofollow">https:&#x2F;&#x2F;sgx.fail</a><p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Software_Guard_Extensions#List_of_SGX_vulnerabilities" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Software_Guard_Extensions#List...</a>
        • josephg38 minutes ago
          &gt; You can download the app as an .apk from their website if you don&#x27;t trust Google Play Store.<p>I wish apple &amp; google provided a way to verify that an app was actually compiled from some specific git SHA. Right now applications can claim they&#x27;re opensource, and claim that you can read the source code yourself. But there&#x27;s no way to check that the authors haven&#x27;t added any extra nasties into the code before building and submitting the APK &#x2F; ios application bundle.<p>It would be pretty easy to do. Just have a build process at apple &#x2F; google which you can point to a git repo, and let them build the application. Or - even easier - just have a way to see the application&#x27;s signature in the app store. Then opensource app developers could compile their APK &#x2F; ios app using github actions. And 3rd parties could check the SHA matches the app binaries in the store.
          • rcxdude34 minutes ago
            This is what F-droid does (well, I suspect most apps don&#x27;t have reproducable builds that would allow 3rd-party verification), but Signal does not want 3rd-party builds of their client anyhow.
            • actionfromafar28 minutes ago
              They could still figure out a way to attest their builds against source.
        • Maken38 minutes ago
          &gt;over 3,000,000,000 users<p>Is that a typo or are you really implying half the human population use Signal?<p>Edit: I misread, you are counting almost every messaging app user.
          • maqp31 minutes ago
            Just WhatsApp. Moxie&#x27;s ideas are used in plenty of other messengers. The context was &quot;what Moxie did for the field of instant messaging&quot;.
          • rcxdude32 minutes ago
            Yeah, whatsapp uses the same protocol.
        • fsflover10 minutes ago
          &gt;&gt; and agree to Apple or Google terms of service to use it?<p>&gt; Yeah that&#x27;s what happens when you create a phone app for the masses.<p>No, that&#x27;s what happens when you actively forbid alternative clients and servers, prevent (secure) alternative methods of delivery for your app and force people to rely on the American megacorps known for helping governmental spying on users, <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38555810">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38555810</a>
  • imustachyou19 minutes ago
    I’m missing something, won’t the input to the llm necessarily be plaintext? And the output too? Then, as long as the llm has logs, the real input by users will be available somewhere in their servers
    • fasterik3 minutes ago
      According to the article:<p><i>&gt;Data and conversations originating from users and the resulting responses from the LLMs are encrypted in a trusted execution environment (TEE) that prevents even server administrators from peeking at or tampering with them.</i><p>I think what they meant to say is that data is <i>decrypted</i> only in a trusted execution environment, and otherwise is stored&#x2F;transmitted in an encrypted format.
  • bookofjoe25 minutes ago
    <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46619643">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46619643</a>
  • colesantiago1 hour ago
    The website is: <a href="https:&#x2F;&#x2F;confer.to&#x2F;" rel="nofollow">https:&#x2F;&#x2F;confer.to&#x2F;</a><p>&quot;Confer - Truly private AI. Your space to think.&quot;<p>&quot;Your Data Remains Yours, Never trained on. Never sold. Never shared. Nobody can access it but you.&quot;<p>&quot;Continue With Google&quot;<p>Make of that what you will.
    • maqp42 minutes ago
      My issue is it claims to be end-to-end encrypted, which is really weird. Sure, TLS between you and your bank&#x27;s server is end-to-end encrypted. But that puts your trust on the service provider.<p>Usually in a context where a cypherpunk deploys E2EE it means only the intended parties have access to plaintexts. And when it&#x27;s you having chat with a server it&#x27;s like cloud backups, the data must be encrypted by the time it leaves your device, and decrypted only once it has reached your device again. For remote computing, that would require LLM handles ciphertexts only, basically, fully homomorphic encryption (FHE). If it&#x27;s that, then sure, shut up and take my money, but AFAIK the science of FHE isn&#x27;t nearly there yet.<p>So the only alternative I can see here is SGX where client verifies what the server is doing with the data. That probably works against surveillance capitalism, hostile takeover etc., but it is also US NOBUS backdoor. Intel is a PRISM partner after all, and who knows if national security requests allow compelling SGX keys. USG did go after Lavabit RSA keys after all.<p>So I&#x27;d really want to see this either explained, or conveyed in the product&#x27;s threat model documentation, and see that threat model offered on the front page of the project. Security is about knowing the limits of the privacy design so that the user can make an informed decision.
    • irl_zebra1 hour ago
      Looks like using Google for login. You can also &quot;Continue with Email.&quot; Logging in with Google is pretty standard.
      • colesantiago1 hour ago
        It is not privacy oriented if you are sharing login, profile information with Google and Confer.<p>It wouldn&#x27;t be long until Google and Gemini can read this information and Google knows you are using Confer.<p>Wouldn&#x27;t trust it regardless if Email is available.<p>The fact that confer allows Google login shows that Confer doesn&#x27;t care about users privacy.
        • fasterik20 minutes ago
          Most people don&#x27;t care about Google knowing whether they&#x27;re using a particular app. If they do, they have the option not to use it. The main concern is that the chats themselves are E2E encrypted, which we have every reason to believe.<p>This is a perfect example of purism vs. pragmatism. Moxie is a pragmatist who builds things that the average person can actually use. If it means that millions of people who would otherwise have used ChatGPT will migrate because of the reduced friction and get better privacy as a result, that&#x27;s a win even if at the margin they&#x27;re still leaking one insignificant piece of metadata to Google.
        • pousada53 minutes ago
          You don’t have to use Google login though? People building solutions like this that aim for broad adoption have to make certain compromises and this seems OK to me (just talking about offering a social login option, haven’t checked the whole project in detail)
  • moralestapia55 minutes ago
    Backdoor it?
  • throwpoaster1 hour ago
    Add a defunct cryptotoken?
    • temp883052 minutes ago
      Hey, Telegram had one. He had to get to feature parity.
  • voidfunc49 minutes ago
    Do what he did for messaging? Make a thing almost nobody uses?
    • anonymous90821346 minutes ago
      If this is how little you think of an app with ~50 million monthly active users, I take it making apps with a billion MAU is something you routinely do during your toilet breaks, or...?
    • maqp37 minutes ago
      3 billion WhatsApp users use protocol built on his labor, every day.
  • b65e8bee43c2ed01 hour ago
    what <i>did</i> he do for messaging? Signal is hardly more private than goddamn Whatsapp. in fact, given that Whatsapp had not been heavily shilled as the &quot;totally private messenger for journalists and whistleblowers :^)&quot; by the establishment media, I distrust it less.<p>edit @ -4 points: please go ahead and explain why does Signal need your phone number and reject third party clients.
    • bigfishrunning1 hour ago
      Yeah, it seems kind of funny how Signal is marketed as a somewhat paranoid solution, but most people run it on an iPhone out of the app store with no way to verify the source. All it takes is one villain to infiltrate one of a few offices and Signal falls apart.<p>Same goes for Whatsapp, but the marketing is different there.
      • maqp39 minutes ago
        Ok so which iPhone app can be verified from source?<p>Or is your problem that your peer might run the app on an insecure device? How would you exclude decade old Android devices with unpatched holes? I don&#x27;t want to argue nirvana fallacy here but what is the solution you&#x27;d like to propose?
    • anilgulecha1 hour ago
      He implemented E2EE in Whatsapp as well.
    • jaapz40 minutes ago
      &gt; Signal is hardly more private than goddamn Whatsapp<p>Kind of because Whatsapp adopted Signal&#x27;s E2EE... And not even that long ago!
      • input_sh18 minutes ago
        If by &quot;not even that long ago&quot; you mean &quot;a few months short of a decade ago&quot;, sure.
    • t3netet51 minutes ago
      Even if you discount Signal he did more or less design the protocol that WhatsApp is using <a href="https:&#x2F;&#x2F;techcrunch.com&#x2F;2014&#x2F;11&#x2F;18&#x2F;end-to-end-for-everyone&#x2F;" rel="nofollow">https:&#x2F;&#x2F;techcrunch.com&#x2F;2014&#x2F;11&#x2F;18&#x2F;end-to-end-for-everyone&#x2F;</a><p>Also while we would expect heavy promotion for a trapped app from some agency it&#x27;s also a very reasonable situation for a protocol&#x2F;app that <i>actually</i> was secure.<p>You can of course never be sure but the fact that it&#x27;s heavily promoted&#x2F;used by people on both the whistleblowers, large corporations and multiple different National Officials at the same time is probably the best trustworthyness signal we can ever get for something like this.<p>(if all of these can trust it somewhaat it has to be a ridiculously deep conspiracy to not have leaked at least to some national security agency and forbidden to use(
    • pdpi41 minutes ago
      &gt; Signal is hardly more private than goddamn Whatsapp.<p>To be fair, that is largely because WhatsApp partnered with Open Whisper to bring the Signal protocol into Whatsapp. So effectively, you&#x27;re saying &quot;Signal-the-app is hardly more private than another app that shares Signal-the-protocol&quot;.<p>In practical terms, the only way for Signal to be significantly more private than WhatsApp is if WhatsApp were deliberately breaking privacy through some alternative channel (e.g. exfiltrating messages through a separate connection to Meta).