@GossiTheDog@kimzetter but isn't that also pretty irrelevant in this case. It wouldn't have mattered how secure the communications channel was. The failure point was the human.
@GossiTheDog@simonoid Do these actually work on up-to-date iPhones? I know I've seen a lot of claims about tools to gain access to mobile devices that then turn out to only actually work on older OS versions (presumably old enough to have known exploits).
I don't THINK it, I KNOW it, because it is NOT an approved app for government communications. Period. And you can't just install apps on government managed devices that handle classified (and even SBU) data. AND there was an NSA Opsec special bulletin warning DoD and intelligence staff about Signal vulnerabilities and that it was NOT TO BE USED for non-public official info
@Ehay2k@GossiTheDog@kimzetter What makes you think Signal was not an approved app on a government-issued device? Whoever manages these devices surely works in/for/with an agency that reports to the POTUS in the end. They probably have vK on that list as well by this point
And these were personal devices, because you can't install non-approved apps like #Signal on a government-issued device unless you illicitly bypass the device management system. And as personal devices, they are much more likely to be compromised because they are managed by people without any cybersecurity expertise. And because they're not monitored no one will know if they are compromised. It's just an awful cyber security rabbit hole. They should all go to jail.
JFC, that's from #Foxnews, so they whitewashed this small detail:
"Organizations may already have these best practices in place, such as secure communication platforms and multifactor authentication (MFA) policies. In cases where organizations do not, apply the following best practices to your mobile devices"
#Signal is absolutely NOT approved for DoD classified/SBU comms. It is recommended for personal, non official comms only Stop spreading #misinformation
#CISA is recommending best practices in the absence of any official guidelines: "Organizations may already have these best practices in place, such as secure communication platforms and multifactor authentication (MFA) policies."
And you can bet 100% that everybody in the national security apparatus has official policies and apps. Signal isn't one.
And again, I challenge you to show me ANYWHERE that #Signal is permitted for the processing or storage of non-public government information. The NSA memo (link below) explicitly calls out that it shall not be used even for *unclassified* (protected, FOUO, CUI) data. And that would apply to everybody in the national security apparatus.
Anybody stating anything to the contrary is a liar, a shill or both.