Story Details

  • Technical analysis of the Signal clone used by Trump officials

    Posted: 2025-05-02 23:20:59

    This blog post analyzes "TM Sgnl," an Android app marketed as a secure messaging platform used by some Trump officials, including Mike Waltz. The author reverse-engineered the app, revealing it relies on the open-source Signal protocol but lacks crucial security features like forward secrecy and disappearing messages. Furthermore, TM Sgnl uses its own centralized server, raising concerns about data privacy and potential vulnerabilities compared to the official Signal app, which uses a federated server architecture. The analysis concludes that despite presenting itself as a secure alternative, TM Sgnl likely offers weaker security and potentially exposes user data to greater risk.

    Summary of Comments ( 249 )
    https://news.ycombinator.com/item?id=43875476

    HN commenters discuss the implications of using an obscure, unofficial Signal fork, TM-SGNL, by Trump officials. Several express concerns about the security and trustworthiness of such a client, particularly given its lack of transparency and potential for vulnerabilities. Some question the choice, suggesting it stems from a misunderstanding of Signal's functionality, specifically the belief that official servers could access their data. Others point out the irony of using a supposedly more secure app while simultaneously broadcasting its usage, potentially defeating the purpose. The feasibility of sideloading this app onto government-issued devices is also debated. A few comments highlight the difficulty of truly secure communication, even with robust tools like Signal, if operational security practices are poor. The discussion also touches on the broader issues of government officials' use of encrypted messaging and the challenges of balancing transparency and privacy.