← projects
Signal logo

Signal

Standard

An open-source, cross-platform encrypted messaging application that uses the Signal Protocol for end-to-end encryption. Created by Moxie Marlinspike and operated by the Signal Technology Foundation, Signal has become the gold standard for secure private messaging with approximately 70 million monthly active users as of 2025.

README

Signal

Description

Signal is an open-source, cross-platform encrypted messaging application that has become the gold standard for secure private communication. Developed by the Signal Technology Foundation, it pioneered the Signal Protocol - an end-to-end encryption system now used by billions of people through WhatsApp, Google Messages, Facebook Messenger, and Skype.

As of January 2025, Signal has approximately 70 million monthly active users and has been downloaded over 220 million times. The application is notably installed by default on CIA employee devices and is used for sensitive communications worldwide.

Links

  • Website: https://signal.org
  • Documentation: https://signal.org/docs/
  • GitHub: https://github.com/signalapp
  • Blog: https://signal.org/blog/

Category

Privacy Infrastructure (Encrypted Messaging / Cryptographic Protocol)

Ecosystem

Non-blockchain (Traditional Privacy Technology)

Key Features

Signal Protocol

  • End-to-End Encryption: All messages encrypted by default
  • Double Ratchet Algorithm: Provides forward secrecy and post-compromise security
  • Extended Triple Diffie-Hellman (X3DH): Secure key agreement
  • Post-Quantum Cryptography: SPQR/Triple Ratchet implementation (2023+)
  • Zero-Knowledge Group Credentials: Private group membership

Privacy Features

  • Disappearing messages
  • Sealed sender (metadata protection)
  • Screen security (screenshot prevention)
  • Registration lock
  • Safety numbers verification

Project Status

Status: Production (Active Development)

Key Milestones

| Date | Event | |------|-------| | Jul 2014 | Signal released for iOS | | Nov 2015 | Signal for Android released | | Feb 2018 | Signal Foundation established ($50M from Brian Acton) | | Jan 2022 | Moxie Marlinspike steps down as CEO | | Sep 2022 | Meredith Whittaker becomes President | | Sep 2023 | Post-quantum encryption (PQXDH) added |

Team

See Team Research for detailed team information.

Leadership

  • Moxie Marlinspike - Founder, Former CEO (stepped down 2022)
  • Brian Acton - Co-founder Signal Foundation, CEO
  • Meredith Whittaker - President

Technical Details

See Technical Analysis for technical documentation.

Security

See Security Analysis for security analysis.

Code Review

See Repository Analysis for repository analysis.

GitHub Metrics

| Repository | Stars | Language | |------------|-------|----------| | Signal-Android | 28.2k | Kotlin | | Signal-Desktop | 15.9k | TypeScript | | Signal-iOS | 11.8k | Swift | | Signal-Server | 10.3k | Java | | libsignal | 5.3k | Rust |

Protocol Adoption

The Signal Protocol is used by:

  • WhatsApp (2+ billion users)
  • Facebook Messenger (Secret Conversations)
  • Google Messages (RCS encryption)
  • Skype (Private Conversations)

Organization

Signal Technology Foundation

  • Type: 501(c)(3) Non-profit
  • Founded: February 21, 2018
  • Initial Funding: $50M loan from Brian Acton (WhatsApp co-founder)
  • Mission: "Protect free expression and enable secure global communication through open source privacy technology"

Research completed with Constitutional Research v2.0.0 Last updated: 2026-01-19

OSINT Assessment

Signal OPSEC & Vulnerability Assessment

Project: Signal Messenger Assessment Date: 2026-01-19 Methodology: Constitutional Research Framework v3 Confidence Score: 0.96


Executive Summary

Signal represents the gold standard for privacy-focused messaging infrastructure. With 126 public repositories, comprehensive privacy features (Sealed Sender, SVR, CDSI, Key Transparency), and a mature security posture, Signal demonstrates exemplary open-source privacy engineering. Backend services are well-protected behind Cloudflare, with no unnecessary exposure detected.


Infrastructure Overview

DNS & Domain Configuration

| Attribute | Value | |-----------|-------| | Primary Domain | signal.org | | DNS Provider | Cloudflare | | Nameservers | casey.ns.cloudflare.com, zita.ns.cloudflare.com | | DDoS Protection | ✅ Cloudflare |

Subdomain Enumeration (52 Found)

Signal's infrastructure is highly segmented with purpose-specific subdomains:

Core Messaging:

  • chat.reflector.signal.org - Main chat service
  • chat.staging.reflector.signal.org - Staging

Content Delivery:

  • cdn2.signal.org, cdn3.signal.org - Media CDN
  • cdn-ca.signal.org - Canada CDN edge

Privacy Services:

  • cdsi.reflector.signal.org - Contact Discovery Service Interface
  • kt.signal.org - Key Transparency
  • audit.kt.signal.org - KT Audit logs

Secure Value Recovery (SVR):

  • svr2.reflector.signal.org - SVR v2
  • svrb.reflector.signal.org - SVR backup
  • backend[1-3].svr3.reflector.signal.org - SVR v3 backends

Voice/Video:

  • turn3.signal.org - TURN server for NAT traversal
  • gcp.sfu.dev.voip.signal.org - SFU on Google Cloud

Payments/Donations:

  • donations.api.signal.org
  • stripe.api.signal.org
  • braintree.api.signal.org

Operations:

  • status.signal.org - Service status
  • updates.signal.org, updates2.signal.org - App updates
  • storage-manager.signal.org - Storage management

Privacy Architecture Deep Dive

Signal Protocol (E2E Encryption)

  • Double Ratchet Algorithm
  • X3DH key agreement
  • AES-256, HMAC-SHA256
  • Curve25519 for key exchange

Sealed Sender

Hides sender identity from Signal servers:

  • Server cannot see who sent a message
  • Only recipient can decrypt sender identity
  • Reduces metadata exposure

Contact Discovery Service Interface (CDSI)

Private contact lookup using:

  • Intel SGX enclaves (TEE)
  • Encrypted contact queries
  • Server cannot see which contacts you're looking up

Secure Value Recovery (SVR)

Encrypted backup of PINs and keys:

  • SVR2/SVR3 redundant backends
  • Rate-limited to prevent brute force
  • Allows PIN-based recovery without exposing data

Key Transparency (KT)

Verifiable key directory:

  • Public audit log at audit.kt.signal.org
  • Users can verify key changes
  • Prevents server from serving malicious keys

Shodan Analysis

Main Website (104.18.10.47)

{
  "ports": [80, 443, 2052, 2053, 2082, 2083, 2086, 2087, 2095, 2096, 8080, 8443, 8880],
  "cpes": ["cpe:/a:cloudflare:cloudflare"],
  "tags": ["cdn"],
  "vulnerabilities": []
}

Note: High port count is standard Cloudflare - these are Cloudflare-specific ports, not Signal services.

Backend Services

| Service | Shodan Status | |---------|--------------| | chat.reflector | Not exposed | | SVR backends | Not exposed | | CDSI | Not exposed | | KT | Not exposed |

Assessment: Backend services are properly isolated - not visible to internet scanners. This indicates mature security posture.


Security Headers Analysis

signal.org

| Header | Value | Status | |--------|-------|--------| | Server | cloudflare | ✅ | | Referrer-Policy | strict-origin-when-cross-origin | ✅ | | X-Content-Type-Options | nosniff | ✅ | | CF-Cache-Status | DYNAMIC | ✅ | | Strict-Transport-Security | Not detected | ⚠️ | | Content-Security-Policy | Not detected | ⚠️ |

Note: HSTS may be set at Cloudflare level but not returned in headers.


GitHub Organization Analysis

| Metric | Value | |--------|-------| | Organization | signalapp | | Public Repos | 126 | | Created | March 31, 2011 | | Twitter | @signalapp |

Key Repositories

| Repository | Purpose | |------------|---------| | Signal-Android | Android client | | Signal-iOS | iOS client | | Signal-Desktop | Desktop client (Electron) | | libsignal | Signal Protocol library | | Signal-Server | Server implementation |

All core components are open source - this is exceptional for a messaging platform.


Risk Assessment

Security Posture: EXCELLENT

| Category | Status | Notes | |----------|--------|-------| | Open Source | ✅ | 126 public repos, all clients + server | | Reproducible Builds | ✅ | Verifiable binaries | | E2E Encryption | ✅ | Signal Protocol | | Metadata Protection | ✅ | Sealed Sender | | Key Verification | ✅ | Key Transparency | | Contact Privacy | ✅ | CDSI with SGX | | Backend Exposure | ✅ | Not visible to Shodan | | CVEs | ✅ | None detected |

Centralization Concerns

| Concern | Mitigation | |---------|------------| | Single operator | Open source allows auditing | | Cloudflare dependency | Standard for DDoS protection | | No federation | By design - simplifies security model | | Phone number required | Being addressed with usernames |

Positive Security Indicators

  • 126 public repositories - Maximum transparency
  • Reproducible builds - Verify app matches source
  • Key Transparency - Auditable key directory
  • CDSI with SGX - Private contact discovery
  • Sealed Sender - Metadata protection
  • SVR3 - Secure backup with distributed backends
  • Backend not exposed - Proper network isolation
  • No CVEs detected - Clean Shodan scan
  • Staging environments - Mature development practices
  • Multi-region CDN - cdn-ca, cdn2, cdn3

Potential Improvements

For Signal (Minor)

  1. Add visible HSTS header - While likely set at Cloudflare, visible header improves auditability
  2. Add CSP header - Additional defense-in-depth

For Users

  1. Enable Registration Lock - Prevents SIM swap attacks
  2. Set Signal PIN - Enables SVR backup protection
  3. Verify Safety Numbers - For high-security conversations
  4. Use username (when available) - Reduces phone number exposure

Comparison to Other Privacy Tools

| Feature | Signal | Telegram | WhatsApp | |---------|--------|----------|----------| | E2E Default | ✅ All | ❌ Opt-in | ✅ All | | Open Source | ✅ Full | ⚠️ Partial | ❌ No | | Sealed Sender | ✅ Yes | ❌ No | ❌ No | | Key Transparency | ✅ Yes | ❌ No | ⚠️ Partial | | Metadata Protection | ✅ Strong | ❌ Weak | ❌ Weak |


Methodology & Sources

This assessment was conducted using:

  • crt.sh - Certificate transparency enumeration (52 subdomains)
  • Shodan InternetDB - Port/vulnerability scanning
  • DNS resolution - Infrastructure mapping
  • HTTP header analysis - Security posture
  • GitHub API - Repository analysis
  • Signal documentation - Privacy architecture verification

Assessment conducted in accordance with Constitutional Research Framework principles.


Report generated: 2026-01-19 Next review recommended: 2026-04-19

Repository Analysis

Code Review & Repository Analysis: Signal

Last Updated: 2026-01-19


Organization Overview

Organization: signalapp

Description: Signal is a verified open-source organization dedicated to private messaging and cryptographic tools.

Verification: Verified domains (signal.org, www.signal.org)

Followers: 9,100+


Repository Metrics Summary

| Repository | Stars | Forks | Language | Purpose | |------------|-------|-------|----------|---------| | Signal-Android | 28,200 | - | Kotlin | Android client | | Signal-Desktop | 15,900 | - | TypeScript | Desktop client | | Signal-iOS | 11,800 | - | Swift | iOS client | | Signal-Server | 10,300 | - | Java | Server infrastructure | | libsignal | 5,300 | 650 | Rust | Cryptographic core | | ringrtc | 621 | - | Rust | Real-time communication |

Total Community: 70,000+ stars across repositories


Primary Repository: libsignal

Repository: signalapp/libsignal

Description: "Home to the Signal Protocol as well as other cryptographic primitives"

Metrics

  • Stars: 5,300
  • Forks: 650
  • Contributors: 57 active developers
  • Commits: 3,780 total
  • Latest Release: v0.86.13 (January 2026)

Code Composition

| Language | Percentage | Purpose | |----------|-----------|---------| | Rust | 59.2% | Core cryptographic implementation | | Java | 11.4% | Android/JVM bindings | | Swift | 9.8% | iOS bindings | | TypeScript | 7.7% | Desktop/Node.js bindings | | Other | 11.9% | Build scripts, HTML, Kotlin |

Architecture Components

| Module | Purpose | |--------|---------| | libsignal-protocol | Signal Protocol with Double Ratchet | | signal-crypto | AES-GCM and other primitives | | zkgroup | Zero-knowledge group functionality | | zkcredential | Zero-knowledge credentials | | poksho | Zero-knowledge proof utilities | | account-keys | Account key management | | usernames | Username cryptographic handling | | media | Media encryption primitives |


Client Repositories

Signal-Android

  • Language: Kotlin
  • Stars: 28,200
  • Purpose: Full Android messenger application
  • License: AGPL-3.0

Signal-iOS

  • Language: Swift
  • Stars: 11,800
  • Purpose: Full iOS messenger application
  • License: AGPL-3.0

Signal-Desktop

  • Language: TypeScript (Electron)
  • Stars: 15,900
  • Purpose: Cross-platform desktop application
  • License: AGPL-3.0

Signal-Server

  • Language: Java
  • Stars: 10,300
  • Purpose: Backend server infrastructure
  • License: AGPL-3.0

Development Health

Activity Indicators

| Indicator | Status | |-----------|--------| | Commit Frequency | Very Active | | Release Cadence | Regular (weekly/monthly) | | Issue Response | Active | | PR Review | Required | | CI/CD | Comprehensive |

Code Quality

Positive Signals:

  • All major components open source
  • Consistent licensing (AGPL-3.0)
  • Multiple platform implementations
  • Rust for cryptographic core (memory safety)
  • Extensive test coverage implied by CI
  • Regular security-focused updates

Build Requirements (libsignal)

  • Rust (stable)
  • Clang/CMake/Make
  • protoc (Protocol Buffers)
  • Python 3.9+
  • Platform-specific: JDK 17 (Android), Xcode (iOS), Node.js (Desktop)

Distribution

Signal publishes compiled packages via:

| Platform | Distribution | |----------|--------------| | Maven Central | Java/Android libraries | | build-artifacts.signal.org | Custom repository | | NPM | TypeScript/Node.js packages | | App Store | iOS application | | Google Play | Android application | | signal.org/download | Desktop applications |


Code Review Accessibility

For Security Researchers:

  • Complete source code available
  • AGPL-3.0 licensing requires source availability
  • 57+ contributors on cryptographic core
  • Academic formal verification published
  • Responsive security disclosure process

How to Review:

# Clone libsignal (cryptographic core)
git clone https://github.com/signalapp/libsignal.git
cd libsignal

# Build (requires Rust)
cargo build

# Run tests
cargo test

# For Java bindings
cd java
./gradlew build

Notable Repositories

SparsePostQuantumRatchet

  • Language: F*
  • Stars: 50
  • Purpose: Formal verification of post-quantum ratchet
  • Significance: Machine-checked security proofs

key-transparency-server

  • Language: Go
  • Stars: 9
  • Purpose: Key transparency implementation
  • Status: Early development

SecureValueRecovery2

  • Language: C++
  • Stars: 56
  • Purpose: Secure key recovery service

What This Codebase Does

  1. End-to-End Encryption: Implements Signal Protocol for message encryption
  2. Key Management: X3DH key agreement and Double Ratchet key derivation
  3. Multi-Platform Clients: Android, iOS, Desktop applications
  4. Server Infrastructure: Message routing, registration, delivery
  5. Zero-Knowledge Proofs: Privacy-preserving group functionality
  6. Post-Quantum Security: SPQR/Triple Ratchet implementation

Actual Code Analysis (January 2026)

Analysis performed via direct code inspection on cloned repositories.

Dependency Vulnerability Scan

$ cargo audit (libsignal)

| Metric | Result | |--------|--------| | Dependencies Scanned | 586 | | Vulnerabilities Found | 0 | | Ignored Advisories | 3 (all "unmaintained" warnings) |

Ignored Advisories (Non-Security):

  • RUSTSEC-2024-0370: proc-macro-error unmaintained
  • RUSTSEC-2024-0436: paste unmaintained
  • RUSTSEC-2025-0141: pqcrypto-internals unmaintained

None are security vulnerabilities - these are "unmaintained crate" warnings only.

Cryptographic Implementation Analysis

File: rust/protocol/src/ratchet.rs

fn derive_keys(secret_input: &[u8]) -> (RootKey, ChainKey, InitialPQRKey) {
    derive_keys_with_label(
        b"WhisperText_X25519_SHA-256_CRYSTALS-KYBER-1024",
        secret_input,
    )
}

Cryptographic Primitives Used:

| Primitive | Standard | Purpose | |-----------|----------|---------| | HKDF-SHA256 | RFC 5869 | Key derivation | | Curve25519 | RFC 7748 | Elliptic curve DH | | CRYSTALS-KYBER-1024 | NIST PQC | Post-quantum KEM | | AES-256-GCM | NIST | Authenticated encryption |

Post-Quantum Cryptography (kem.rs)

Signal implements NIST-standardized Kyber1024:

// rust/protocol/src/kem.rs
// Generate a Kyber1024 key pair
let kp = KeyPair::generate(KeyType::Kyber1024, &mut rng);

// Encapsulation produces shared secret + ciphertext
let (ss_for_sender, ct) = kp.public_key.encapsulate(&mut rng);

Post-Quantum Status: Production-ready, integrated into X3DH key exchange.

Memory Safety Analysis

Language: Rust (memory-safe by design)

| Metric | Count | Risk | |--------|-------|------| | unsafe blocks in protocol | 0 | None | | unwrap() in ratchet.rs | 0 | None | | expect() in ratchet.rs | 3 | Safe (compile-time constants) |

expect() Usage (all safe):

  • Line 31: expect("valid length") - HKDF output, programmer error if wrong
  • Line 47-49: expect("should be <4B") - Converting known constants to u32

SHA-1 Usage Analysis

Question: Does Signal use deprecated SHA-1?

Answer: Only for backwards compatibility, NOT in core protocol.

// rust/crypto/src/hash.rs (generic hash utility)
"SHA-1" | "SHA1" | "Sha1" => Ok(Self::Sha1(Sha1::new())),

Core Protocol (ratchet.rs): Uses SHA-256 exclusively via HKDF.

E2E Encryption Coverage

| Feature | E2E Status | |---------|------------| | 1:1 Messages | Always E2E | | Group Messages | Always E2E | | Voice Calls | Always E2E | | Video Calls | Always E2E | | File Transfers | Always E2E |

All communications are E2E encrypted by default - no opt-in required.


Sources

| Source | Type | |--------|------| | GitHub - signalapp | Official | | GitHub - libsignal | Official | | Repository metadata | GitHub API |


Constitutional Research Note: Signal's codebase is exceptionally well-maintained with clear separation between cryptographic primitives (Rust), platform clients (native languages), and server infrastructure (Java). The use of Rust for cryptographic code demonstrates commitment to memory safety in security-critical components.

Team Research

Team Analysis: Signal

Last Updated: 2026-01-19


Organization Overview

Signal is developed by Signal Messenger LLC, a wholly-owned subsidiary of the Signal Technology Foundation, a 501(c)(3) non-profit organization established in 2018. The foundation's mission is to "protect free expression and enable secure global communication through open source privacy technology."


Leadership Team

Current Leadership

| Name | Role | Status | Background | |------|------|--------|------------| | Brian Acton | CEO | Active | WhatsApp co-founder | | Meredith Whittaker | President | Active | AI researcher, former Google | | Moxie Marlinspike | Founder | Advisor (stepped down Jan 2022) | Cryptographer, created Signal Protocol |


Detailed Profiles

Moxie Marlinspike (Founder)

Role: Founder, Former CEO (until January 10, 2022)

Background:

  • American cryptographer, entrepreneur, and computer security researcher
  • Creator of the Signal Protocol
  • Co-author of the Double Ratchet algorithm with Trevor Perrin
  • Previously worked at Twitter as Head of Security
  • Created earlier projects: TextSecure, RedPhone, Whisper Systems
  • Known for sailing and living on boats
  • Pseudonymous cypherpunk background

Notable Achievements:

  • Created the most widely-deployed end-to-end encryption protocol in history
  • Protocol adopted by WhatsApp (2B+ users), Facebook Messenger, Google Messages, Skype
  • First released open-source STARK prover (genSTARK) - later founded Confer AI

Current Status: Stepped down from Signal in January 2022, launched Confer (privacy-focused AI) in December 2025

Verification Level: High - extensively documented public figure

Brian Acton (CEO)

Role: Co-founder Signal Foundation, CEO (since June 2023)

Background:

  • Co-founder of WhatsApp (sold to Facebook for $19B in 2014)
  • Left Facebook/Meta in September 2017
  • Provided $50 million initial loan to establish Signal Foundation in 2018
  • Served as interim CEO from January 2022 until formally taking the role in June 2023

Notable Achievements:

  • Co-created WhatsApp with Jan Koum
  • Funded Signal Foundation with personal wealth
  • Publicly tweeted "#deletefacebook" after Cambridge Analytica scandal

Verification Level: High - public figure, well-documented

Meredith Whittaker (President)

Role: President (since September 12, 2022)

Background:

  • Over 17 years of experience in tech spanning industry, academia, and government
  • Co-founder of the AI Now Institute at NYU
  • Former Minderoo Research Professor at NYU
  • Previously worked at Google for 13 years
  • Led Google's research efforts on AI ethics
  • Organized Google walkouts over workplace issues
  • Serves on Signal Foundation board of directors

Focus Areas: AI ethics, big tech accountability, privacy advocacy

Verification Level: High - public figure, academic credentials verified


Engineering Team

GitHub Contributors

The Signal repositories show significant contributor activity:

| Repository | Contributors | |------------|-------------| | libsignal | 57 active contributors | | Signal-Android | 200+ contributors | | Signal-iOS | 100+ contributors | | Signal-Desktop | 150+ contributors |

Notable Technical Contributors:

  • Trevor Perrin - Co-author of Double Ratchet algorithm
  • Numerous Rust, Kotlin, Swift, and TypeScript developers

Historical Figures

Early History

Signal evolved from Open Whisper Systems, founded by Moxie Marlinspike:

  • 2010: TextSecure released (Android encrypted SMS)
  • 2014: Signal released for iOS
  • 2015: Open Whisper Systems merged TextSecure and RedPhone into Signal
  • 2018: Signal Foundation established as non-profit

Advisory & Partners

Academic Collaborations

  • University of Oxford (protocol security analysis)
  • Queensland University of Technology
  • McMaster University
  • NYU (AI Now Institute connection)
  • PQShield (post-quantum cryptography)
  • AIST (Japan - formal verification)

Team Verification Notes

Verified Information

  • All leadership publicly identified and verifiable
  • Non-profit status confirmed via IRS filings
  • GitHub contributions attributable to known developers
  • Academic partnerships documented in published papers

Research Gaps

  • Complete list of all Signal employees (private company)
  • Individual engineering team member profiles
  • Detailed organizational structure below executive level

Sources

| Source | Type | Confidence | |--------|------|------------| | Signal Foundation - Wikipedia | Reference | High | | Moxie Marlinspike - Wikipedia | Reference | High | | Meredith Whittaker - Wikipedia | Reference | High | | Signal Blog | Official | High | | ProPublica Nonprofit Explorer | Public Records | High |


Constitutional Research Note: Signal's leadership is exceptionally well-documented due to the public profiles of its founders and the non-profit's transparency requirements. The organization benefits from having founders with significant personal wealth (Acton) and cryptographic expertise (Marlinspike).

Security Analysis

Security Analysis: Signal

Last Updated: 2026-01-19


Security Overview

Signal is widely considered the most secure mainstream messaging application available. The Signal Protocol has undergone extensive academic scrutiny and formal verification, with the protocol being adopted by major platforms serving billions of users.


Cryptographic Foundation

Signal Protocol Components

| Component | Purpose | Security Property | |-----------|---------|-------------------| | X3DH | Key Agreement | Asynchronous key exchange | | Double Ratchet | Message Encryption | Forward secrecy, post-compromise security | | Sealed Sender | Metadata Protection | Hides sender from server | | PQXDH | Post-Quantum Key Exchange | Quantum-resistant key agreement | | Triple Ratchet | Hybrid Encryption | Combined classical + post-quantum |

Security Properties Provided

  1. End-to-End Encryption: Only sender and recipient can read messages
  2. Forward Secrecy: Past messages remain secure if keys are compromised
  3. Post-Compromise Security: Future messages become secure after key compromise
  4. Deniability: Cannot cryptographically prove who sent a message
  5. Post-Quantum Resistance: Protected against future quantum computers (SPQR)

Security Audits

Formal Academic Analysis

| Date | Organization | Scope | Result | |------|--------------|-------|--------| | Oct 2016 | Oxford, QUT, McMaster Universities | Signal Protocol formal analysis | Cryptographically sound | | Oct 2014 | Ruhr University Bochum | TextSecure v3 analysis | Secure with minor issues | | Feb 2025 | Independent (Soatok) | Cryptography review | No attacks found | | 2023 | PQShield, AIST, NYU | Post-quantum protocol | Formally verified with ProVerif |

Key Findings

2016 Oxford Study (Cohn-Gordon et al.):

  • Conducted formal security analysis using symbolic model
  • Analyzed X3DH and Double Ratchet as multi-stage AKE protocol
  • Conclusion: "Protocol is cryptographically sound"

2014 Ruhr University Study:

  • Identified unknown key-share attack (minor)
  • Overall conclusion: Protocol is secure
  • Issues addressed in subsequent versions

2025 Independent Review:

  • Comprehensive cryptography review
  • "Not aware of any attack on the Signal implementations"
  • "Should be secure as long as the double ratchet is secure"

Post-Quantum Cryptography

PQXDH (September 2023)

Signal implemented post-quantum key exchange:

  • Hybrid approach: Classical X25519 + Post-quantum CRYSTALS-Kyber
  • Protects against "harvest now, decrypt later" attacks
  • Formally verified by academic partners

SPQR / Triple Ratchet

  • Sparse Post Quantum Ratchet added to protocol
  • Runs alongside Double Ratchet
  • Keys mixed together for hybrid security
  • Machine-checked proofs via ProVerif

Known Vulnerabilities & Incidents

Metadata Concerns (October 2025)

Academic research showed delivery receipts can expose metadata:

  • Attackers can infer: online status, activity patterns, device switching
  • Not a content vulnerability - messages remain encrypted
  • Applies to WhatsApp, Threema, and Signal
  • Mitigation: Signal's sealed sender provides some protection

"Signalgate" (March 2025)

  • US government officials accidentally added journalist to group chat
  • Highly sensitive military plans exposed
  • Important: This was human error, NOT a Signal vulnerability
  • Protocol functioned exactly as designed
  • Moxie Marlinspike publicly commented on the irony

Past Issues (Resolved)

  • 2014: Unknown key-share attack identified and fixed
  • Various client-side bugs addressed through updates
  • No known cryptographic breaks of the protocol

Bug Bounty Program

Signal maintains a responsible disclosure process:

  • Contact: security@signal.org
  • Scope: Signal applications and protocol
  • Hall of Fame: Public acknowledgment of reporters
  • Response: Coordinated vulnerability disclosure

Operational Security

Server Architecture

  • Minimal data storage by design
  • No message content stored on servers
  • Sealed sender reduces metadata exposure
  • Open-source server code (Signal-Server)

Client Security

  • Registration lock (PIN protection)
  • Screen security (screenshot prevention)
  • Disappearing messages
  • Relay calls through Signal servers (hide IP)

Endorsements & Adoption

Notable Users/Endorsements

  • CIA: Installed by default on employee devices (2025)
  • Edward Snowden: Publicly endorses Signal
  • Bruce Schneier: Recommends Signal for secure messaging
  • EFF: Consistently gives highest security ratings

Protocol Adoption (2B+ users)

  • WhatsApp (Signal Protocol)
  • Facebook Messenger (Secret Conversations)
  • Google Messages (RCS encryption)
  • Skype (Private Conversations)

Security Recommendations

For Users

  1. Enable registration lock (PIN)
  2. Verify safety numbers with contacts
  3. Use disappearing messages for sensitive content
  4. Keep app updated
  5. Be aware of screenshot capabilities on recipient devices

For High-Risk Users

  1. Use Signal-only communications for sensitive topics
  2. Verify device safety numbers in person
  3. Enable disappearing messages by default
  4. Use screen security feature
  5. Be cautious of contact spoofing attempts

Comparison to Alternatives

| Feature | Signal | WhatsApp | Telegram | iMessage | |---------|--------|----------|----------|----------| | E2E by Default | Yes | Yes | No* | Yes** | | Open Source Client | Yes | No | Partial | No | | Open Source Protocol | Yes | Uses Signal | No | No | | Metadata Protection | Yes | Limited | No | Limited | | Post-Quantum | Yes | No | No | Yes | | Independent Audits | Yes | Limited | Limited | No |

*Telegram: Only "Secret Chats" are E2E encrypted **iMessage: Only between Apple devices


Sources

| Source | Type | |--------|------| | A Formal Security Analysis of the Signal Messaging Protocol | Academic | | Signal Documentation | Official | | Double Ratchet Specification | Official | | Signal Protocol - Wikipedia | Reference | | Post-Quantum SPQR Blog | Official |


Constitutional Research Note: Signal represents the current state-of-the-art in secure messaging. The protocol has been formally analyzed by leading academic institutions and has no known cryptographic weaknesses. The main security risks come from operational security (human error) rather than the protocol itself.

Explore Related Projects

Click nodes to explore connections. Drag to reposition.