The blog post urges Apple to implement disappearing messages in iMessage, arguing it's a crucial privacy feature already offered by competitors like Signal and WhatsApp. The author emphasizes that ephemerality is essential for protecting user privacy against device seizure, data breaches, and unwanted surveillance, citing real-world scenarios where sensitive information shared via iMessage has been exposed. They highlight the inherent risk of permanent message storage and propose that Apple offer user-configurable expiration times, similar to existing self-destructing media features. This would empower users to control the lifespan of their messages and minimize the potential for misuse or unintended exposure.
X (formerly Twitter) is currently blocking links to the encrypted messaging app Signal. Users attempting to post links containing "signal.me" are encountering errors or finding their posts failing to send. This block appears targeted, as links to other messaging platforms like WhatsApp and Telegram remain functional. While the reason for the block is unconfirmed, speculation points to Elon Musk's past disagreements with Signal or a potential attempt to bolster X's own encrypted messaging feature.
Hacker News users discussed potential reasons for X (formerly Twitter) blocking links to Signal, speculating that it's part of a broader trend of Musk suppressing competitors. Some suggested it's an intentional move to stifle alternative platforms, pointing to similar blocking of Substack, Bluesky, and Threads links. Others considered technical explanations like an overzealous spam filter or misconfigured regular expression, though this was deemed less likely given the targeted nature of the block. A few commenters mentioned that Mastodon links still worked, further fueling the theory of targeted suppression. The perceived pettiness of the move and the potential for abuse of power were also highlighted.
A security vulnerability, dubbed "0-click," allowed remote attackers to deanonymize users of various communication platforms, including Signal, Discord, and others, by simply sending them a message. Exploiting flaws in how these applications handled media files, specifically embedded video previews, the attacker could execute arbitrary code on the target's device without any interaction from the user. This code could then access sensitive information like the user's IP address, potentially revealing their identity. While the vulnerability affected the Electron framework underlying these apps, rather than the platforms themselves, the impact was significant as it bypassed typical security measures and allowed complete deanonymization with no user interaction. This vulnerability has since been patched.
Hacker News commenters discuss the practicality and impact of the described 0-click deanonymization attack. Several express skepticism about its real-world applicability, noting the attacker needs to be on the same local network, which significantly limits its usefulness compared to other attack vectors. Some highlight the importance of the disclosure despite these limitations, as it raises awareness of potential vulnerabilities. The discussion also touches on the technical details of the exploit, with some questioning the "0-click" designation given the requirement for the target to join a group call. Others point out the responsibility of Electron, the framework used by the affected apps, for not sandboxing UDP sockets effectively, and debate the trade-offs between security and performance. A few commenters discuss potential mitigations and the broader implications for user privacy in online communication platforms.
Summary of Comments ( 61 )
https://news.ycombinator.com/item?id=43274416
Hacker News users generally supported the idea of ephemeral messages in iMessage, citing privacy benefits and the existing precedent set by other messaging platforms. Some commenters raised concerns about the potential for misuse, particularly regarding evidence preservation in legal cases or investigations. Others discussed technical implementation details, questioning the reliability and security of such a feature, and suggesting potential solutions like server-side deletion or client-side cryptography. A few pointed out Apple's historical resistance to features perceived as hindering law enforcement access to data, speculating that this might be a factor in the absence of ephemeral messaging in iMessage. Finally, some questioned the effectiveness of disappearing messages given the possibility of screenshots and screen recordings.
The Hacker News post "Dear Apple: Add "Disappearing Messages" to iMessage" (linking to a blog post advocating for disappearing messages in iMessage) generated several comments discussing the technical and social implications of such a feature.
Several commenters focused on the potential for misuse and the limitations of disappearing messages as a privacy solution. One commenter pointed out that screenshots could easily defeat the purpose of disappearing messages, while another highlighted the risk of coercion and blackmail, where users might be forced to show disappearing messages before they vanish. The complexity of implementing true disappearing messages across all devices was also raised, with commenters noting the challenges of handling message synchronization and the potential for data recovery from backups.
A recurring theme was the existing availability of similar functionality in other messaging apps like Signal and WhatsApp, with some commenters questioning the need for Apple to duplicate the feature. There was also a discussion around Apple's historical stance on privacy and security, with speculation about why the company hasn't already implemented disappearing messages. Some suggested it might be due to technical challenges, while others posited that Apple might be hesitant to introduce a feature that could be perceived as facilitating illicit activities.
Some commenters supported the idea of disappearing messages, emphasizing the benefits for privacy and security in certain situations. They argued that even with the limitations, it could be a useful tool for protecting sensitive information. One user suggested that a more effective approach might be to encrypt messages by default, rather than relying on disappearing messages.
Overall, the comments section reveals a mixed reception to the idea of disappearing messages in iMessage. While some acknowledge its potential benefits, others express concerns about its limitations and potential for misuse. The discussion highlights the complex trade-offs involved in designing privacy-enhancing features and the need to consider both technical feasibility and social implications.