Beginner guide to use the signal


If you have not heard about a sign before this week, you are likely to be familiar with it now. The messaging application was Pay to the news on Monday when Atlantic OceanThe editor -in -chief of the editor -in -chief, Jeffrey Goldberg, was added to a group chat that included senior military officials planning to hit air. Although she entered the speech for very unusual reasons, Signal was, and still is, a well -respected messenger platform for safe communication. It’s not guaranteed – focus on foolish, In this case – but it is worth understanding what it is and how it works, even if you are not a person who deals with very secret information.

The signal is a messaging application. You can download it to your iOS or Android device, connect your phone number, and you are ready to go – just like other services like WhatsApp or Telegram. The thing that makes the sign is different is its concentration on privacy. Communications are encrypted on the platform by default, and the application provides additional protection to maintain your special discussions.

Why encryption from one side to an important party?

Aside from, for example, walking to someone and whispering in their ear, encryption from a run to end is the best way to communicate with someone else and make sure your messages remain special. The encryption encourages the contents of your message so that it is not possible to read effectively by anyone without the key needed to decode it. Effective to one side means that the message that you share is notable mainly in every step of the journey step between your device and the recipient. It is only decoded when it reaches its intended destination.

In comparison, standard SMS text messages are not coded while moving via cellular networks – from towers to servers to the person you send with text messages. Your phone may store it as encrypted files, but the Internet service providers who deal with messages can access them and may keep copies stored on their servers. This is where your message is vulnerable to advanced breakthroughs such as Hurricane salt Or a court order submitted to ISP. The encrypted messages from end to end can not be hacked in the same way, as it is impossible to read effectively without the key. Its e -border institution Excellent explanation on encryption And many other resources on best private practices.

How does the signal differ from other messages platforms with a comprehensive encryption?

The encryption is from one side to the tip of a standard feature in more chat platforms, and this is a good thing. It is part of WhatsApp as well as IMESSAGE on iPhone and RCS devices on Google messages. Currently, do not support Android and iPhone users to encoder from end to tip, though This changes soon. But even if your messages themselves are encrypted by a comprehensive, technology companies can access and store other information about you. For example, WhatsApp preserves things like your profile information and address book and will provide these things for law enforcement If it is submitted with an inspection order.

The signal is run by a non -profit organization, especially pregnancy only Two pieces of information about their usersWhen they created their signal account, and when they used the signal. Law enforcement cannot obtain more information than a signal from its users because the company simply does not own it. For this reason she is popular with journalists, activists and people who realize privacy. Keep in mind that if law enforcement, infiltrators, or foreign opponent puts their hands on the person who sent a correspondent – that is, the other end point – there is a lot of information they can collect, even if you have disappeared messages that have been prepared.

Who may want to use the sign?

The brief answer is anyone. It is clear that people who have certain types of jobs have more risks in their connection, but you do not need to be a correspondent or government official who want a greater guarantee of privacy. Law enforcement in Nebraska I got private Facebook chat history Between the 17 -year -old mother and daughter to help sue themselves on charges of illegal abortion. Since the chat was not coded, Meta had the relevant messages and its heart to the officials when it received the request. If messages are encrypted, Meta will not be able to comply.

What are the disadvantages of using the sign?

Since most of your signal account information is stored locally on your device, transferring your account to a new device requires some additional steps in addition to accessing your old device. When your information is stored in the cloud, the logic is less secure but much easier to a new device. This may be given, but the person you are communicating with needs to calculate a signal as well.

What should I know about the sign?

This week’s news emerges more important than using a signal or any other communication platform: it cannot protect you from you. Signal’s correspondence protocol is very safe, but there is still room for human error if the wrong person is added to the chat. However, you can take some additional steps to avoid potential errors. 404 media He has good advice on Using the signal title feature To avoid the name of one offer to another.

Footage shows privacy options in the signal application.

The signal contains some additional privacy options that you can enable in the application settings.

Another source of anxiety in time is the extent of securing your data when someone else can access your phone – Especially the border agent. There is no bulletproof -resistant way to secure information on your phone, and the regulations of how immigration officials are able to on your phone and what they can do with it is not completely clear. But it is a good idea Keep your digital fingerprint as much as possible And take steps to restrict what someone might find on your phone with a quick search.

The signal provides an option for the hidden messages that remove it from your device after a certain period of time. There are also options to hide the contents of the application in the application’s switching view, and you can set up the application to require screen locking data every time you reopen it. Little caution can be a long way.

Leave a Reply

Your email address will not be published. Required fields are marked *