{"id":40377,"date":"2021-07-02T06:57:59","date_gmt":"2021-07-02T10:57:59","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=40377"},"modified":"2021-07-02T06:57:59","modified_gmt":"2021-07-02T10:57:59","slug":"signal-privacy-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/signal-privacy-security\/40377\/","title":{"rendered":"Signal to those looking for privacy"},"content":{"rendered":"<p>The Signal messaging app leapt in popularity in January 2021, when WhatsApp <a href=\"https:\/\/in.mashable.com\/tech\/19390\/whatsapp-has-updated-its-terms-and-privacy-policy-heres-why-youve-been-receiving-prompts\" target=\"_blank\" rel=\"nofollow noopener\">changed its privacy policy<\/a>. Following Elon Musk\u2019s <a href=\"https:\/\/twitter.com\/elonmusk\/status\/1347165127036977153\" target=\"_blank\" rel=\"nofollow noopener\">laconic call to use Signal<\/a>, millions of users downloaded the app, resulting in temporary technical issues with the service.<\/p>\n<p>However, cybersecurity experts <a href=\"https:\/\/www.kaspersky.com\/blog\/private-data-messengers\/10611\/\" target=\"_blank\" rel=\"noopener nofollow\">have known about Signal for a long time<\/a>, and that\u2019s no wonder; developers have spent years polishing the app\u2019s privacy and security. Here\u2019s what they have achieved and how to make Signal even more secure.<\/p>\n<h2>Signal features<\/h2>\n<p>Features available to all Signal users include end-to-end encryption, secure data storage, and the ability to view Signal\u2019s code.<\/p>\n<h3>End-to-end encryption \u2014 a pillar of privacy<\/h3>\n<p>One of Signal\u2019s indisputable advantages is its <a href=\"https:\/\/support.signal.org\/hc\/en-us\/articles\/360007318911-How-do-I-know-my-communication-is-private-\" target=\"_blank\" rel=\"nofollow noopener\">default use of end-to-end encryption<\/a>. That means only the parties chatting with one another can read their texts, and nobody \u2014 not even the app\u2019s developers \u2014 can listen in on individual or group calls. Using end-to-end encryption is an important way to <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-end-to-end-encryption\/37011\/\" target=\"_blank\" rel=\"noopener nofollow\">improve messaging security<\/a>.<\/p>\n<p>In many ways, it was thanks to Signal that end-to-end encryption became so widely used in messaging apps. Even the competing WhatsApp, Facebook Messenger, and Skype <a href=\"https:\/\/signal.org\/blog\/skype-partnership\/\" target=\"_blank\" rel=\"nofollow noopener\">use the Signal Protocol for secure communication<\/a>. But by comparison, Signal encrypts much more data.<\/p>\n<p>Unlike Telegram, whose end-to-end encryption <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-privacy-security\/38444\/\" target=\"_blank\" rel=\"noopener nofollow\">works only in so-called secret chats<\/a> for two users, <a href=\"https:\/\/signal.org\/blog\/signal-private-group-system\/\" target=\"_blank\" rel=\"nofollow noopener\">Signal also encrypts group chats and calls end to end<\/a>. Moreover, the service does not store group information such as participants, title, and avatar.<\/p>\n<p>The developers of Signal also protect chat <em>metadata<\/em> \u2014 extra info about who wrote to whom \u2014 which can be no less sensitive than the contents of the chat and is <a href=\"https:\/\/www.kaspersky.com\/blog\/unusual-ways-to-leak-info\/36049\/\" target=\"_blank\" rel=\"noopener nofollow\">a frequent source of confidential information leaks<\/a>.<\/p>\n<p>Finally, Signal also encrypts user profile info. Only the users you approve (contacts, people you have written to, and those you expressly permit to view your account data) can see your name, avatar, and status.<\/p>\n<h3>Privacy of contacts and secure enclaves<\/h3>\n<p>Signal employs so-called <em>secure enclaves,<\/em> isolated storage on its servers to which even the server owners have no access. It is because of that isolation that you can learn <a href=\"https:\/\/signal.org\/blog\/private-contact-discovery\/\" target=\"_blank\" rel=\"nofollow noopener\">which of your contacts use Signal<\/a> without disclosing your address book to the developers. The app sends an encrypted request to the enclave; the latter checks your contacts against registered users\u2019 numbers and returns an encrypted response. No other living soul will see the content of your request.<\/p>\n<h3>Transparency policy<\/h3>\n<p>As <a href=\"https:\/\/github.com\/signalapp\" target=\"_blank\" rel=\"nofollow noopener\">an open-source project<\/a>, Signal makes its code freely available, so a tech-savvy user can read or build code for Signal\u2019s server software, Android and iOS apps, and desktop versions for Windows, macOS, and Linux, to make sure they contain no backdoors that would provide access to users\u2019 sensitive data.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksec\">\n<h2>Setting up Signal<\/h2>\n<p>Beyond the app\u2019s inherent security, Signal lets users opt for greater privacy and security with a variety of settings.<\/p>\n<h3>Signal PIN<\/h3>\n<p>You can use a <a href=\"https:\/\/support.signal.org\/hc\/en-us\/articles\/360007059792-Signal-PIN\" target=\"_blank\" rel=\"nofollow noopener\">Signal PIN<\/a> to recover your profile as well as the settings and contacts that you save in the app (i.e., contacts not present in your address book), and the list of your blocked contacts, should you lose your device or reinstall the app.<\/p>\n<p>Does that mean your data is actually stored on Signal servers and accessible to developers or hackers ? Yes and no. Yes, the information is really stored on the servers. But no, it can\u2019t be stolen because it is encrypted and kept in the abovementioned secure enclaves \u2014 and the only key to it is that PIN, which only you know.<\/p>\n<p>The app prompts users to set up a PIN at registration, and you can change yours in the settings. In case you don\u2019t trust the PIN and the enclaves enough, you can deactivate the feature, either during registration or through the settings. If you do so, however, then if you delete the app you will also be deleting all of the data it\u2019s stored on your device, including <a href=\"https:\/\/support.signal.org\/hc\/en-us\/articles\/360007319011-Manage-Contacts\" target=\"_blank\" rel=\"nofollow noopener\">contacts not in your address book<\/a>.<\/p>\n<p>Also, if you have no PIN, someone else can potentially register in Signal using your phone number, for example using <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/sim-swapping\/\" target=\"_blank\" rel=\"noopener\">SIM swapping<\/a>. The same can happen if you haven\u2019t used the number long enough for it to be disconnected and issued to another person.<\/p>\n<h3>Privacy settings<\/h3>\n<p>To protect your chats from anyone who happens to handle your smartphone, we recommend activating the screen lock feature in the app settings. Once it\u2019s active, you\u2019ll need to use the same code, fingerprint, or Face ID to access the app as you use to unlock the phone.<\/p>\n<p>By default, the app doesn\u2019t lock when you collapse it, so make sure to change that setting. Both Android and iOS users can set a screen lock timeout duration in the privacy settings or choose <em>Instant<\/em>. Once locked, Signal will require your code, fingerprint, or Face ID each time you switch back to the app.<\/p>\n<p>Android users, in addition to relying on an inactivity timeout, can alternatively lock the app manually from the notification bar.<\/p>\n<p>The Android version of Signal has another useful privacy feature in the settings: the incognito keyboard. If you turn it on, your smartphone will no longer learn your new and most frequently used words and phrases and prompt you for them on the go \u2014 meaning the keyboard app will not process and keep the text you type. The <a href=\"https:\/\/support.signal.org\/hc\/en-us\/articles\/360055276112-Incognito-Keyboard\" target=\"_blank\" rel=\"nofollow noopener\">incognito keyboard may not work<\/a> with some devices, in which case the app will warn you when you try to activate the function.<\/p>\n<p>Finally, you may choose whether you want your contacts to see whether you have read an incoming message or are typing text. Similar to other messaging apps, once you deactivate the option, you will no longer receive the same info about other users.<\/p>\n<h3>Linking devices<\/h3>\n<p>You can chat in Signal on your smartphone, tablet, and computer at the same time; you just have to link the additional devices to your account.<\/p>\n<p>To do that, go to <em>Linked devices<\/em> and press <em>+<\/em> to activate the camera and receive a QR code to scan. Next, run Signal on the second device (for example, your PC) and follow the instructions.<\/p>\n<p>You\u2019ll see a list of all of your linked devices in the app\u2019s settings. We recommend checking that list from time to time for any unknown devices \u2014 that is, unauthorized users. Also don\u2019t forget to unlink any devices you no longer need.<\/p>\n<h3>Chat backups<\/h3>\n<p>By default, Signal does not create chat backups, but you can activate the feature so that you can recover your chats if need be. Follow the instructions in the settings, and be sure to save the 30-character password phrase the app creates for you. Lose that and your backup copy becomes useless.<\/p>\n<p>Signal stores backup copies on your device, so if you need to recover your data on a new phone, you will still need access to your old device. That means if you lose your smartphone or it breaks, you <a href=\"https:\/\/support.signal.org\/hc\/en-us\/articles\/360007059752-Backup-and-Restore-Messages\" target=\"_blank\" rel=\"nofollow noopener\">won\u2019t be able to restore your chats<\/a>.<\/p>\n<h3>Advanced settings (for the most cautious)<\/h3>\n<p>These options will completely conceal your messenger activities from prying eyes.<\/p>\n<ul>\n<li>Under <em>Chats<\/em>, deactivate the retrieval of link previews for your messages. This will prevent Signal from sending an extra Web query to the referenced website, which would otherwise be available to your Internet service provider.<\/li>\n<li>In the advanced privacy settings, set voice calls to connect through Signal servers instead of connecting directly to your contact. Doing so hides your IP address, which can prove useful under certain circumstances, although the developers warn it may reduce call quality.<\/li>\n<li>Activate a proxy to avoid potential surveillance even more effectively. Here, a proxy is a protective element between your device and the app\u2019s servers (the service website contains <a href=\"https:\/\/support.signal.org\/hc\/en-us\/articles\/360056052052-Proxy-Support\" target=\"_blank\" rel=\"nofollow noopener\">detailed instructions<\/a>). With a proxy, even Signal will know nothing about your IP address. This option will also be of use in countries that block Signal.<\/li>\n<\/ul>\n<h2>Final recommendations<\/h2>\n<p>Now that you\u2019ve guaranteed the privacy of your personal data in Signal, including chats, metadata, and profile information, make sure you\u2019ve also taken steps to prevent unauthorized physical or remote access to your device. Always <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-theft-proof-your-smartphone\/40090\/\" target=\"_blank\" rel=\"noopener nofollow\">lock your smartphone<\/a>, update all of your apps and the operating system in a timely manner, and install a <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solution<\/a>. And for users of other messaging apps, don\u2019t forget to set up <a href=\"https:\/\/www.kaspersky.com\/blog\/discord-privacy-security\/38546\/\" target=\"_blank\" rel=\"noopener nofollow\">Discord<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-privacy-security\/38444\/\" target=\"_blank\" rel=\"noopener nofollow\">Telegram<\/a> for maximum security and privacy.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Everything you need to know about the privacy-focused messaging app.<\/p>\n","protected":false},"author":2658,"featured_media":40380,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[3856,607,43,835,1532,131],"class_list":{"0":"post-40377","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-end-to-end-encryption","9":"tag-messengers","10":"tag-privacy","11":"tag-settings","12":"tag-signal","13":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/signal-privacy-security\/40377\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/signal-privacy-security\/23030\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/signal-privacy-security\/18512\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/signal-privacy-security\/9244\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/signal-privacy-security\/24980\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/signal-privacy-security\/22988\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/signal-privacy-security\/22234\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/signal-privacy-security\/25590\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/signal-privacy-security\/25043\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/signal-privacy-security\/30965\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/signal-privacy-security\/9805\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/signal-privacy-security\/17270\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/signal-privacy-security\/17736\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/signal-privacy-security\/15007\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/signal-privacy-security\/27011\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/signal-privacy-security\/31147\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/signal-privacy-security\/27253\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/signal-privacy-security\/24071\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/signal-privacy-security\/29406\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/signal-privacy-security\/29198\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/messengers\/","name":"messengers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/40377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2658"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=40377"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/40377\/revisions"}],"predecessor-version":[{"id":40444,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/40377\/revisions\/40444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/40380"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=40377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=40377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=40377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}