
Signal implements special protection measures against MITM attacks, making certificate spoofing useless and complicating malware-based attacks.įortunately for the law enforcement, most instant messengers sync and store communications using their own cloud service. If the other party is compromised, all your communications with that party will be compromised as well. It is very important to understand that even if your iPhone is secure, the other party’s device running the iOS, Android or desktop app (which is much easier to break) might be compromised. While technically the traffic can be intercepted, decrypting it will require a malicious app installed on the end-user device (such as the infamous NSO Group spyware). Without direct government intervention or proposed encryption backdoors one can hardly ever intercept messaging with a MITM attack. This in turn is very difficult as everyone is touting point-to-point encryption. One can attempt to intercept conversations in transit. What exactly makes Signal so difficult to crack? Let us first look at how one can gain access to users’ communications occurring in other instant messengers. Elcomsoft Phone Viewer can now decrypt Signal databases extracted from the iPhone via physical (well, file system) acquisition, and that was a tough nut to crack. With emphasis on security, there is no wonder that Signal is frequently picked as a communication tool by those who have something to hide. With over half a million users, Signal is an incredibly secure cross-platform instant messaging app.
