• Palaress@lemmy.161.social
    link
    fedilink
    arrow-up
    1
    ·
    3 years ago

    He gives the example of a fed wanting to find a suspects for a hacking case. He has a potential list of names, and subpoenas the phone company’s for their phone numbers. He then installs signal, whatsapp, telegram ( all of those services that use real person identifiers ) and adds those phone numbers to his contact list. Boom, now he can narrow down suspects because all of those services, including signal, will tell you if that person uses signal.

    The only thing the fed is doing here is checking if number x has signal installed. How is ‘having signal installed’ connected to ‘being a hacker/criminal’?

    • Dessalines@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      ·
      3 years ago

      Hackers are more likely to use encrypted messengers, and signal will gladly tell the world, even people you don’t know that you use it via contact lists. Anyone in law enforcement is going to consider someone who uses encrypted messengers a more likely suspect than someone who doesn’t.

    • poVoq@lemmy.ml
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      3 years ago

      Meta-data analysis is all about collecting many different data-points that together form a clear picture but individually don’t mean much.

      Having Signal installed, or rather having your phone-number registered with the Signal service, which in turn leaks this fact to anyone asking via their app, is a vital data-point in such a meta-data analysis.