Read the Affidavit produced here:
https://signal.org/bigbrother/santaclara/
Read Signal's complete source code here:
https://github.com/signalapp
Once you understand the code, you'll understand "what they can do" and what they cannot do.
When you've identified any flaw in the code that runs the Signal servers that would allow IP logging, let me know. I'll be glad to file the bug report on your behalf.
@sunzu2
"Under FISA order, signal would provide logs."
How would Signal do this? Logs of what?
Corresponding parties? Messages? They don't have them.
They'd have to rewrite their backend code to obtain them, and changes would also need to be made to the Signal client apps.
It would not matter if the FISA Court ordered that logs be produced in secret by Signal. Any such logs could not be obtained without significant changes to the way Signal works. Users would know.
Yes, Signal does have some shortcomings, but these are acceptable in most 'use cases' for most threat models.
Signal is best used as a private, E2EE alternative to SMS. Only a fool would use it for the *most sensitive* of communications. (Like, you know, discussing an impending military strike...)
We all know of the alternatives, including (but not limited to) SimpleX, Session, Briar, Element etc.
@maniacalmanicmania @9tr6gyp3 @signalapp