After an outage of #Signal (caused by a problem at #AWS) @Mer__edith@mastodon.world argued that a cloud provider is needed to run a service like Signal.
I answered that a cloud provider is needed, because Signal doesn't federate (and thereby build its own so called 'cloud').
I added that I doubt that by using a cloud provider Signal doesn't leak the social graph of their accounts.
I got referred to the #PrivateContactDiscovery by @newhinton@troet.cafe designed to protect the social graph which I simplified to hashing leaving out the use of #sgx part in my post.
I stated that I wouldn't understand how one could be sure that all which is guaranteed by using SGX really is like it is promised.
The only answer by @moehrenfeld@social.karotte.org is that I indeed didn't understand "Private Contact Discovery" completely.
It's frustrating to doubt and being left in the dark about the facts.
Today I learned something new: SGX is not meant to be save against physical attacks - or to phrase it different: SGX is meant to protect data if the OS is completely compromised, but the server is under physical safety and control:
…All three chipmakers exclude physical attacks from threat models for their TEEs, also known as secure enclaves.… (Nvidia, AMD, Intel)
…“These features keep getting broken, but that doesn’t stop vendors from selling them for these use cases—and people keep believing them and spending time using them,”…
…Those making these statements run the gamut from cloud providers to AI engines, blockchain platforms, and even the chipmakers themselves. Here are some examples:…
…The maker of the Signal private messenger assures users that its use of SGX means that “keys associated with this encryption never leave the underlying CPU, so they’re not accessible to the server owners or anyone else with access to server infrastructure.” Signal has long relied on SGX to protect contact-discovery data.…
Big thanks to @kyle@kylerank.in for sharing this post by by @arstechnica@mastodon.social: https://arstechnica.com/security/2025/10/new-physical-attacks-are-quickly-diluting-secure-enclave-defenses-from-nvidia-amd-and-intel/ !
Maybe my naïve assumption that you can only protect data on hardware you physical own and protect has not been so wrong at all.
I'd be happy to read arguments and opinions and corrections to the arstechnica article.
The problem is that signal is not running as a federated service. This makes you dependend on services like AWS and the like.
And there's another AWS/(any evil hosting service): As I understood #signal hashes phone numbers before uploading them to let accounts discover each other. The number space of phone numbers is not really big and having computing power and storage space at hand it shouldn't be too complicated to make a database to quickly access any phone number by its hash.
This information - using default signal settings - is exposed to super computing companies. This information allows to recreate the topology of the social network that is made of the millions of signal accounts.