Advertisement
Tech

Here’s what happens when the cops try to subpoena Signal

‘It’s impossible to turn over data that we never had access to in the first place.’

Photo of Mikael Thalen

Mikael Thalen

Signal app next to a data request

The encrypted messaging app Signal has once again shown just how little data it collects on users after publicly revealing its response to a recent government subpoena.

Featured Video

Signal was ordered last month by the United States Attorney’s Office in the Central District of California to provide a wide array of information on numerous users currently under criminal investigation.

The subpoena demanded access not only to multiple users’ names and home addresses but the times and dates they messaged one another.

Advertisement

But there’s just one problem: Given that the app was built from the ground up with privacy in mind, Signal doesn’t collect large amounts of data like other messaging services do.

In a blog post on the matter, Signal detailed how it was unable to provide nearly all of the information requested.

“Because everything in Signal is end-to-end encrypted by default, the broad set of personal information that is typically easy to retrieve in other apps simply doesn’t exist on Signal’s servers,” the company wrote. “The subpoena requested a wide variety of information that fell into this nonexistent category, including the addresses of the users, their correspondence, and the name associated with each account.”

Signal went on to further note that it “doesn’t have access to your messages; your chat list; your groups; your contacts; your stickers; your profile name or avatar; or even the GIFs you search for.”

Advertisement

The only data Signal was able to hand over for the accounts listed in the subpoena were the times and dates when they were created and the last time they connected to the app.

https://twitter.com/mshelton/status/1387423390361817093?s=20

For comparison, the popular Facebook-owned messaging service WhatsApp can hand over everything from your name, IP address, and email address to your profile photos, address book, and “about” information if requested by law enforcement.

Signal’s blog post on Wednesday is not the first time that the encrypted messaging service has revealed the details of a government subpoena. In 2016, Signal also published a blog post about a subpoena from the Eastern District of Virginia. Just like the most recent case, Signal was only able to provide when the user’s account was created and when it was last accessed.

Advertisement

Read more of the Daily Dot’s tech and politics coverage

Nevada’s GOP secretary of state candidate follows QAnon, neo-Nazi accounts on Gab, Telegram
Court filing in Bored Apes lawsuit revives claims founders built NFT empire on Nazi ideology
EXCLUSIVE: ‘Say hi to the Donald for us’: Florida police briefed armed right-wing group before they went to Jan. 6 protest
Inside the Proud Boys’ ties to ghost gun sales
‘Judas’: Gab users are furious its founder handed over data to the FBI without a subpoena
EXCLUSIVE: Anti-vax dating site that let people advertise ‘mRNA FREE’ semen left all its user data exposed
Sign up to receive the Daily Dot’s Internet Insider newsletter for urgent news from the frontline of online.
 
The Daily Dot