Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Couldn't it be a problem that Iran or someone else with connections to the regime run a proxy themselves to find people using Signal?


They already know people who are trying to access signal without a proxy, so I don't think this would make a significant difference. Also note that from the Signal Blog post above:

----

The Signal client establishes a normal TLS connection with the proxy, and the proxy simply forwards any bytes it receives to the actual Signal service. Any non-Signal traffic is blocked. Additionally, the Signal client still negotiates its standard TLS connection with the Signal endpoints through the tunnel.

This means that in addition to the end-to-end encryption that protects everything in Signal, all traffic remains opaque to the proxy operator.

----


It doesn't seem to be the same situation with tor exit nodes, where your node is automatically on the system. Here, it looks like people have to actively use your proxy; it tells people who run a proxy to share a URL with their friends.

Probably helpful context: [Help people in Iran reconnect to Signal – a request to our community] https://signal.org/blog/run-a-proxy/


And that brings the difficulty of letting your proxy be known to legitimate interested people if your iranian social presence is non-existent. I ran a Tor node (not an exit one) in Germany back in the days (it was to help iranian people).


Yes. It's always a cat and mouse game. Whether they are actually smart enough to think of it is a different question.


A regime that has survived 40 years facing constant adversary and the majority of time under sanctions should be competent enough at internal security.

And the people that are protesting and hurting right now are not the most tech savvy one - so expect a lot of naivete about opsec. I doubt that the majority of them even know signal exists.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: