In hundreds of criminal investigation cases, authorities are always looking for information available from all sorts of sources, from oral testimony, evidence, and even posts and activity on social media and online platforms, including messaging apps.
Companies such as Facebook, Apple and various manufacturers of smartphones and other smart devices receive constant requests from the U.S. government to implement mechanisms that allow authorities to access confidential information on these platforms. For the fulfillment of these orders, platforms such as WhatsApp have begun to issue their own guidelines, rules to which developers submit to deliver information of their users to the authorities.
This is not the case with Signal, a messaging app focused on users’ privacy. According to a report by the company, the authorities continue to try to access the information of the users of this service, which is impossible considering that this platform does not store user information and such records do not exist on its servers.
In other words, Signal does not know the names, addresses, contact list, and call and message logs of any user.
In releasing a new subpoena received by its legal team, Signal confirmed that it sent authorities a response exactly the same as that issued with the previous subpoenas: In its dataset identified as “Account and Subscriber Information,” Signal only stores timestamps to identify when an account was created, last network connection, and other minor details.
In addition to the search warrant, the platform revealed that it received four consecutive non-disclosure orders on these requests. Signal concluded by mentioning that the court that issued the orders never confirmed receipt of a response or scheduled a hearing. The platform will continue to work continuously to maintain its commitment to user privacy, which needless to say does not violate any rule in current US legislation.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.