Someone made a compilation of academic reviews and blogposts here: https://community.signalusers.org/t/wiki-overview-of-third-party-security-audits/13243 but none of them seem to be real security audit reports, ex. compare with real security audits to Delta Chat: https://delta.chat/en/help#security-audits
Not a formal audit, but a more recent review of the protocol: https://soatok.blog/2025/02/18/reviewing-the-cryptography-used-by-signal/
thanks, I think I know that one, but yeah as you said it is not a real security audit and the person itself said so
Lack of detailed audits…only in this case specifically…does not imply lack of security and/or privacy.
The protocol that Signal uses, which is in fact firmly audited with no major problematic findings, plus the fact the client is OSS is generally enough to lower any concerns.
The server side software in production for Signal.org is not OSS. It will not be. You are required to trust the server to use Signal; because the protocol and the client renders it factually impossible for the server to spy on your messages. The server cannot read messages; or even connect who is messaging who if the correct client settings are used. (Sealed Sender).
Non-OS stats software in general is not automatically lacking in privacy or security, particularly not in this case where the affected software does interact only with software that is verifiably open-source and trustworthy in general due to the protocols and how they are implemented correctly in a verifiable manner.
Non-OS stats software in general is not automatically lacking in privacy or security
Sure is. It’s only that in this case you are sure that your messages are sufficiently protected, so you can send them over a untrusted service.
There’s a hardened “version” of signal called molly
does that one has security audits? thanks in advance
Both signal and molly are considered safe, a lot of apps use the same protocol as signal, most risk come from messages leaks before the encryprion happens.
Unfortunately, I’m not aware if they did external audits, but both codes are available in github.
At a user level, the biggest security compromise with signal is enabling notifications
That’s a big one, you can disable it, but if the other person has it enabled there is a possible leak after decryption also.
As I seen in other comment I think that the protocol is audited not really the app and servers In comparison SimpleX is audited pretty regularly
could you provide some source/link to the SimpleX security audits? I would like to look into it, thanks in advance!
This seems to be the latest one. https://simplex.chat/blog/20241014-simplex-network-v6-1-security-review-better-calls-user-experience.html
If you use Android, Briar is end to end encrypted and doesn’t have a central server and its recommended by privacyguides.org
does Briar has security audits you could point to? thanks in advance
thanks!
So it looks like the protocol was audited, but I don’t know about the app or servers. https://www.pindrop.com/article/audit-signal-protocol-finds-secure-trustworthy/
This was first published in 2021. There are some interesting points made.
https://dessalines.github.io/essays/why_not_signal.html
It has had a few updates since, then but I cannot vouch for its accuracy.
It doesn’t cover audits per sé, but I feel there is important information that is tangentially related, since security audits become kind of moot if some of the items mentioned are true (i.e. CIA funding and US govt. tactics).
Full disclosure, I still use Signal for a family group chat. I have very little economic value, thus my threat model is minimal. It mentions cats several times. I neither have cats, nor interact with them frequently enough to warrant their inclusion in a threat model.
Right, always this link to show that signal isn’t trustworthy and then lists “good alternatives” that are either less secure or less usable
You can’t trust them, being a centralized service based in a country where things could go way lore south anytime.