- Joined
- Aug 26, 2023
- Messages
- 6,304
- Reaction score
- 9,986
- Location
- US
- Gender
- Male
- Political Leaning
- Slightly Liberal
Sure. Have them hire me and give me admin access and I’ll see what I can put together. I’d also like to point out that one of the message recipients was in Russia. Those messages while encrypted are open for grabs to Moscow. Can they decrypt them? It is possible and there are potential ways hence why this isn’t allowed by policy.If you are claiming that Signal has been exploited by a MiM attack in the message flow, do please support that.
So you think it would have been just fine if they put that on Twitter before or during the attack. No. I think you have your answer.There's more to consider in that than just your declaration of it being so.
I did skim it. You are claiming the contrary. Which part of the policy did you want to highlight?
The date wasn't specified.
Targets were not specified.
Locations were not specified.
Routes were not specified.
Specific units were not specified.
With out those, you really don't have much an 'attack plan' or 'war plan', or at least you have a next to useless one, which is next to useless for anyone who would try and defend against this plan's execution - no specifics.
Signal is a public network. I don’t care that you don’t understand that.It wasn't 'on public network', it was in a private strongly encrypted chat app with a mistaken invitee, apparently.
I agree youre being political. We both know exactly how you’d react if this was done by Biden. Do you have anything new to add? At this point you’re just circling the drain with desperate arguments that don’t make any sense.Given the above, it appears that far more is being made of this than is really there, and I suspect that it is being made more of is strictly political.
For the life of me, I cannot understand why Trump administration figures couldn’t simply have said, “Oops! We’ll investigate.” Why the need to bash the journalist (not offering evidence of his misconduct) and the award-winning magazine? I doubt discussion of this would still be going on if we were waiting a report or hearings.Taking responsibility is a good thing.
You have to question people whose first response is he’s a lying dishonest journalist making all this up. They have to know we are going to find out and those chickens will come home to roost. Now you’ve made yourself a lying imbecile to anyone that isn’t a Trump supporter.For the life of me, I cannot understand why Trump administration figures couldn’t simply have said, “Oops! We’ll investigate.” Why the need to bash the journalist (not offering evidence of his misconduct) and the award-winning magazine? I doubt discussion of this would still be going on if we were waiting a report or hearings.
So no support or CVE specific to a MiM attack on Signal messages. Gotcha.Sure. Have them hire me and give me admin access and I’ll see what I can put together.
Oh really? Did see that. Do point point to / cite that. I'm interested.I’d also like to point out that one of the message recipients was in Russia.
Those messages while encrypted are open for grabs to Moscow. Can they decrypt them? It is possible and there are potential ways hence
I've post multiple times the screen grab of the NSA's bulletin which states otherwise.why this isn’t allowed by policy.
That's not what I posted. But you seem to be making shit up as we go along so . . .So you think it would have been just fine if they put that on Twitter before or during the attack. No. I think you have your answer.
Ignoring the point there. OK.Same argument to the previous silliness.
Encrypted Signal messages are on the public network, the Internet, yes.Signal is a public network. I don’t care that you don’t understand that.
My point behind all this from the very start is that the Dems are so desperate to get their party's collapse off the front page that they are over hyping this, really hard.I agree youre being political. We both know exactly how you’d react if this was done by Biden. Do you have anything new to add?
I can't help it if you have incorrect and inaccurate impressions. Oh well.At this point you’re just circling the drain with desperate arguments that don’t make any sense.
So you have no clue how any of this works or how it could be possibly comprised. Gotcha.So no support or CVE specific to a MiM attack on Signal messages. Gotcha.
Did you post the full version or the cherry picked one that doesn't include the part that it's not approved for non public information?Oh really? Did see that. Do point point to / cite that. I'm interested.
I've post multiple times the screen grab of the NSA's bulletin which states otherwise.
It's public network that anyone can access and use. Encryption is not magic. Improvements in quantum computing which state actors would have access to are becoming increasingly available. That is of course if the bad actors haven't already found a way to comprise one of the devices involved in the call outside of a direct attack on Signal or it's employees. It a bad idea. The proof of that is in the line you consistently forget that say's to not use signal for non public information. Government networks and SCIF's need to be used for these type of exchanges. How this is even debatable is head scratching for sure.That's not what I posted. But you seem to be making shit up as we go along so . . .
Ignoring the point there. OK.
Encrypted Signal messages are on the public network, the Internet, yes.
Further, Signal is a public access app..
But, no, you can't consider the Signal message traffic as 'public' being heavily encrypted, such as in being transmitted in clear text or something equally stupid.
Obvious partisan bias thing is obvious. I see you.My point behind all this from the very start is that the Dems are so desperate to get their party's collapse off the front page that they are over hyping this, really hard.
This hasn't changed once least bit.
I can't help it if you have incorrect and inaccurate impressions. Oh well.
Because Trump is thin skinned and defensive.For the life of me, I cannot understand why Trump administration figures couldn’t simply have said, “Oops! We’ll investigate.” Why the need to bash the journalist (not offering evidence of his misconduct) and the award-winning magazine? I doubt discussion of this would still be going on if we were waiting a report or hearings.
You are making assertions and not supporting them.So you have no clue how any of this works or how it could be possibly comprised. Gotcha.
A link to the scribed document, so yes, the full version which was cited previously in this thread.Did you post the full version or the cherry picked one that doesn't include the part that it's not approved for non public information?
I never asserted it was 'magic'. (You keep trying to put words in my mouth, and it's not going well for you on that count)It's public network that anyone can access and use. Encryption is not magic.
Hmm. While I was aware that quantum computing was still in the labs, I haven't heard that they've made it reliable enough and work well enough for decrypting encrypted messages.Improvements in quantum computing which state actors would have access to are becoming increasingly available.
This was what the NSA's bulletin on Signal was all about, the social engineering attack on a user.That is of course if the bad actors haven't already found a way to comprise one of the devices involved in the call outside of a direct attack on Signal or it's employees.
You still haven't pointed that out in the NSA bulletin on Signal, nor quoted a different source to support this. I eagerly await.It a bad idea. The proof of that is in the line you consistently forget that say's to not use signal for non public information.
When the communications contain all the specific, most certainly, but in this case, they really didn't did they?Government networks and SCIF's need to be used for these type of exchanges.
How this is even debatable is head scratching for sure.
Obvious partisan bias thing is obvious. I see you.
Who is taking responsibility for all our top intelligence people engaging in revealing national security secrets on an unsecured chat line? Waltz is the good guy here that revealed the crime to the world. He is not a scapegoat he is a hero.You are ignoring something very important that Waltz said...that the contact in the Signal app had one person's name and, instead of their number, it had that reporter's number. Yes, Waltz is doing the right thing and taking full responsibility for this happening, but he knows HE didn't do that and you can be damned sure he's going to find out who did.
I would hate to be that person.
That's because they are security and exploit concepts. You're asking for a specific exploit or vector. I'm only mentioning possible vectors and why policy should dictate that Signal should not be used to exchange information like this. The information I saw in those texts belongs in a SCIFF. End of that story.You are making assertions and not supporting them.
So you saw it was specifically disallowed for non public information. Awesome.A link to the scribed document, so yes, the full version which was cited previously in this thread.
Fair enough. In the end it's just math. Math is solvable. Eventually.I never asserted it was 'magic'. (You keep trying to put words in my mouth, and it's not going well for you on that count)
True and what used to take years can now take minutes.What encryption does is put up a barrier to decrypting the encrypted message into clear text sufficiently high / difficult enough to either be prohibitive, or to take so long that the value of the message becomes nothing.
You are kidding yourself if you don't think governments aren't all over this. ALL of them. We are discussing government level communications. Breaking algorithms is quantum biggest use at the moment.Hmm. While I was aware that quantum computing was still in the labs, I haven't heard that they've made it reliable enough and work well enough for decrypting encrypted messages.
That exists too. Also the possibly of a compromised employee. It's all baked in there. Also why it's disallowed.The point that you are raising, that quantum computing i going to significantly change the encryption landscape, is certainly very true.
This was what the NSA's bulletin on Signal was all about, the social engineering attack on a user.
Not sure what you are waiting for. It clearly says don't use signal for non public information. It's right there.You still haven't pointed that out in the NSA bulletin on Signal, nor quoted a different source to support this. I eagerly await.
Point stands. You wouldn't post that on Twitter before the attack would you? Why not? There's your answer right there.When the communications contain all the specific, most certainly, but in this case, they really didn't did they?
Time of launch, time on target, payload, aircraft used, region of use.When the communications contain all the specific, most certainly, but in this case, they really didn't did they?
Yes I am, as I'm skeptical if such a exploits exist in Signal. You are applying concepts without support that they are applicable.That's because they are security and exploit concepts. You're asking for a specific exploit or vector.
I'm only mentioning possible vectors and why policy should dictate that Signal should not be used to exchange information like this.
This assertion is based on what expertise in government classification of information?The information I saw in those texts belongs in a SCIFF. End of that story.
I don't recall that being in the cited NSA buliten, and you won't specifically point it out to support your assertion.So you saw it was specifically disallowed for non public information. Awesome.
Neither point I contest.Fair enough. In the end it's just math. Math is solvable. Eventually.
True and what used to take years can now take minutes.
Something that's not even made it out of the labs. Hmm.You are kidding yourself if you don't think governments aren't all over this. ALL of them. We are discussing government level communications. Breaking algorithms is quantum biggest use at the moment.
The disallowed still contested until you cite and point to what it is you are exactly referring to.That exists too. Also the possibly of a compromised employee. It's all baked in there. Also why it's disallowed.
So you keep asserting, but not presenting.Not sure what you are waiting for. It clearly says don't use signal for non public information. It's right there.
On Twitter? Oh hell no.Point stands. You wouldn't post that on Twitter before the attack would you? Why not? There's your answer right there.
What I've seen from the communications didn't contain all of that.Time of launch, time on target, payload, aircraft used, region of use.
Do you not feel that is enough?
I have seen the texts and all of that information was present.What I've seen from the communications didn't contain all of that.
If you can cite where you are getting this from, I'll read it and consider it.
Signal is not an authorized medium for classified conversations.But then, Signal isn't Twitter, is it?
So what is your point standing on again, exactly?
This not the citation to support your assertion which was requested.I have seen the texts and all of that information was present.
Again, cite and highlight support of this.Signal is not an authorized medium for classified conversations.
This not the citation to support your assertion which was requested.
Again, cite and highlight support of this.
From the previously cited NSA bulletin, clipped a screen grab of the specific statement, it appears to indicate that Signal is permitted by existing policy.
If you have other than this, do please cite and highlight it. I'll read it.
Yup. That's pay walled.Here Are the Attack Plans That Trump’s Advisers Shared on Signal
The administration has downplayed the importance of the text messages inadvertently sent to The Atlantic’s editor in chief.www.theatlantic.com
This article doesn't list the messages and points back to The Atlantic's article.Non-paywall link
Signal war plans chat: Read leaked texts in full
The United States launched a fresh wave of attacks targeting the Houthi group in Yemen beginning on March 15.www.newsweek.com
This again, references the social engineering aspect, not a technical vulnerability in the application.Pentagon issued Signal warning before Trump war group chat leak: Report
The Pentagon warned March 18 how Russian hackers use Signal, a week before Goldberg said he was added to a Trump admin group chat.www.newsweek.com
If it's possible that the reporter was on the call because his number was inadvertently added through a computer glitch, it would seem reasonable to have computer pros look into it. Don't you agree?
IMHO fat fingering on the keyboard even more likely than the result of social engineering one of the chat members.Agreed on the computer glitch, but I'm still more leaning to a fat finger keyboarding error, but that too, computer people are good at finding out.
That said, I'm still not convinced that this is proper tasking for Musk and DOGE.
OK. The Newsweek article which I'm looking at does not have that on the page.
Fair enough.OK. The Newsweek article which I'm looking at does not have that on the page.
But who knows what web page filtering the the IT boys in corporate are doing.
I'll have to look on my home computer to see if it display that, before I comment on that any further.
Sure you can. Once you remember these are petty, vengeful people it all makes sense.For the life of me, I cannot understand why Trump administration figures couldn’t simply have said, “Oops! We’ll investigate.” Why the need to bash the journalist (not offering evidence of his misconduct) and the award-winning magazine? I doubt discussion of this would still be going on if we were waiting a report or hearings.
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?