Advertisement
Tech

Is Signal ‘vulnerable?’: Misleading reports raise concerns about app’s safety

The encrypted messaging app was recently thrust into the spotlight.

Photo of Mikael Thalen

Mikael Thalen

Photo Illustration of a cracked Signal logo with a Bandage holding it together.
Daily Dot Graphics; Signal; Adobe Stock (Licensed)

The encrypted messaging app Signal is receiving renewed attention after high-level members of President Donald Trump’s administration inadvertently added a journalist to a group chat discussing military action in Yemen.

Featured Video

Questions about the security of Signal, which is widely regarded as the gold standard for encrypted communications, have also been raised after a Pentagon briefing titled “Signal Vulnerability” was shared by NPR just days later.

The Pentagon-wide advisory—which cautioned employees not to use the app for work discussions, even if unclassified—stated that a “vulnerability has been identified in the Signal Messenger Application.”

“Please note: third party messaging apps (e.g. Signal) are permitted by policy for unclassified accountability/recall exercises but are NOT approved to process or store nonpublic unclassified information,” the memo, dated March 18, said.

Advertisement

The alleged vulnerability concerned phishing attacks, attributed by Google to the Russian government, aimed at high-profile users of Signal.

The memo, as well as a report from Axios on Tuesday detailing how members of a California delegation group chat on Signal were targeted months back by an account posing as California Gov. Gavin Newsom (D), has many asking whether Signal is as safe as it’s portrayed to be.

Advertisement

Does Signal have a vulnerability?

The so-called vulnerabilities mentioned regarding Signal are not with the app or its security. Instead, the issues are related to what is always the weakest link with any digital communications: people.

As with any security-focused app, the security is only as robust as the person using it. Signal is designed to encrypt your communications on the wire, meaning anyone attempting to intercept them as they travel from one device to another will only receive encrypted gibberish.

But if an individual’s message is exposed when it reaches and decrypts on their phone, either by sophisticated phone-monitoring malware or something as simple as someone peering over your shoulder, there is nothing Signal can do.

Advertisement

In a lengthy post to X, Signal addressed this issue by pushing back on the Pentagon’s use of the term “vulnerability.”

“One piece of misinfo we need to address is the claim that there are ‘vulnerabilities’ in Signal. This isn’t accurate,” Signal wrote. “Reporting on a Pentagon advisory memo appears to be at the heart of the misunderstanding. The memo used the term ‘vulnerability’ in relation to Signal—but it had nothing to do with Signal’s core tech. It was warning against phishing scams targeting Signal users.”

And while likely classified information regarding war plans probably shouldn’t have been discussed by Trump’s officials on Signal, the group could have taken multiple steps to protect against the exposure, such as checking the identities of everyone in the group and confirming those identities with Signal’s safety number feature.

It’s also important to remember that not everyone faces the same threats. Government officials are at risk of having their phones targeted with sophisticated hacking tools, whereas the average Signal user is not.

Advertisement

As with any security tool, knowing its capabilities is just as important as knowing its weaknesses. In other words, Signal remains the gold standard for encrypted communications, but make sure you know how to properly use it first.


Internet culture is chaotic—but we’ll break it down for you in one daily email. Sign up for the Daily Dot’s web_crawlr newsletter here. You’ll get the best (and worst) of the internet straight into your inbox.