Friday, April 4, 2025
HomeSecurity NewsPrivate Messenger app Signal Published a New Private Contact Discovery Service

Private Messenger app Signal Published a New Private Contact Discovery Service

Published on

SIEM as a Service

Follow Us on Google News

The signal is an encrypted communications application for Android and iOS.It uses end-to-end encryption to secure all communications to other Signal users.Any text, video, or image coming from the Android version of Signal is encrypted before it leaves your phone.

It is the most secured Encrypted messaging app and it was certified by security experts.

I am regularly impressed with the thought and care put into both the security and the usability of this app. It’s my first choice for an encrypted conversation. Bruce Schneier,

Use anything by Open Whisper Systems.Edward Snowden,

With the new Private Contact Discovery Service, signal enables clients to find which of their contacts are enrolled users, yet does not uncover their contacts to the service operator or any gathering that may have compromised the service.

Signal Contact Discovery

Most of the social app uses an existing social graph such as Login with Facebook and Google. Instead with signal once user signed in it uses the contacts from phone address book and compared to entries in a database on Open Whisper Systems servers to determine which users use Signal.

Signal process

  • The client calculates the truncated SHA256 hash of each phone number in the device’s address book.
  • The client transmits those truncated hashes to the service.
  • The service does a lookup from a set of hashed registered users.
  • The service returns the intersection of registered users.

With this current process if someone hacks the Signal service could potentially modify the code so that it logs user contact discovery requests.

Also Read Are Online Gamers and eSports Fanatics at Risk of Cyber Attacks?

Private Contact Discovery Service Signal

Modern-day Intel chips had a feature called Software Guard Extensions (SGX). SGX enables applications to provide a “protected enclave” that is separated from the host operating system and kernel.

Signal customary SGX relationship to run a protected enclave on the server, the SGX enclave on the server-side would empower a support of performing computations on encrypted client data without learning the content of the data or the result of the computation.

SGX contact discovery

Private contact discovery using SGX is fairly simple at a high level:

  • Run a contact discovery service in a secure SGX enclave.
  • Clients that wish to perform contact discovery negotiate a secure connection over the network all the way through the remote OS to the enclave.
  • Clients perform remote attestation to ensure that the code which is running in the enclave is the same as the expected published open source code.
  • Clients transmit the encrypted identifiers from their address book to the enclave.
  • The enclave looks up a client’s contacts in the set of all registered users and encrypts the results back to the client.

Since the enclave bears witness to the software that is running remotely, and since the remote server and OS have zero ability to see into the enclave.They also published source code in Github.

Check it out and let us know what you think! This is a beta technology preview, but we’ll be deploying the service into production and integrating it into clients as we finish testing over the next few months.Says Signal!

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ex-ASML Russian Employee Smuggled Trade Secrets to Moscow via USB

A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands...

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within...

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...

Australian Pension Funds Hacked: Members Face Financial Losses

Several of Australia’s largest superannuation funds have been targeted in a coordinated cyberattack, leading...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...

Enhancing Satellite Security by Encrypting Video Data Directly on Payloads

The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for...