Signal, once a niche messaging service for the privacy-minded, is currently the most downloaded app in the United States, unseating perennially popular social media and gaming apps. Its newfound popularity is due to a convergence of reasons, including WhatsApps changing policies, violence at the Capitol that led many tech companies to deplatform Trump, and a viral tweet from the worlds wealthiest man.
On January 7, Tesla founder Elon Musk tweeted Use Signal and sent the valuation of the wrong company, tiny health care technology firm Signal Advance, beyond its wildest expectations. Musk had been referring to the unrelated encrypted messaging outfit, which also benefited immensely from the tweet.
Signal, for the first time, became the most downloaded app on the App Store and Google Play following Musks tweet, a position it has maintained for a week. The sudden growth caused widespread outages on January 15, as the company struggles to add extra server capacity for the record number of new users.
We have been scaling all week to meet the increasing capacity, Signal spokesperson Jun Harada said in an email to Recode. Still, Fridays usage surge came out of nowhere. Harada said the company hoped to have service restored in the near future.
Musks tweet came a day after he had tweeted a meme blaming Facebook for its role in the violent storming of the Capitol, in which Trump supporters, amped up on conspiracy theories about a stolen election, failed to stop Congress from certifying Joe Bidens election victory. The meme illustrates the domino effect from Facebooks beginnings as a website to rate women on campus to the Capitol being under the control of a man in a viking hat.
A few days earlier, on January 4, Facebook-owned WhatsApp had issued a new privacy policy, which many interpreted would mean users would be required to share personal information with Facebooks ad network in order to use the platform. Facebook has clarified that WhatsApp messages will remain encrypted and personal information like contacts would not be shared with Facebook. Still, many users goaded in part by Musks tweet flocked to other encrypted messaging apps like Telegram (now No. 2 in the App Store) and Signal (now No. 1).
But as influential as Musk is, he isnt tweeting in a vacuum. Signals growth in popularity also came as numerous tech companies, including Facebook and Twitter, began deplatforming Trump and his followers and trying to prevent their technologies from being used in service of further violence. Parler, the right wings social media alternative, was also booted from the internet; Google and Apple banned it from its app stores and Amazon Web Services stopped hosting the app on its servers.
Signal, typically praised by privacy proponents and left-wing activists, is topping the app stores along with other privacy-focused social media alternatives like MeWe. Its unclear how much the shift to these apps is being buoyed by people from the fringe right in need of new places to communicate. Because of the encrypted nature of the app, its hard to know (more on that below).
Previously, the number of new Signal users has rocketed up following social or political unrest. Signal downloads spiked after the election of Donald Trump, who rolled back a number of privacy protections. Downloads also grew during Black Lives Matter protests against police violence last spring, as activists strove to organize while staying safe from law enforcement.
Due to the nature of social apps and how the primary functionality involves communicating with others, their growth can often move quite quickly, based on current events, Amir Ghodrati, director of market insights at App Annie, told Recode.
The mobile data and analytics provider said demand for privacy-focused messaging apps has grown in the last few years, as internet privacy becomes a more mainstream issue and as people spend more time 67 percent more time on average in the first half of 2020 in messaging apps than on social media apps.
Signal is an end-to-end encrypted communications app, available for mobile and desktop. That means users can send texts or make phone or video calls without outsiders or the platform itself seeing the content of those messages. Intercepted messages would look like a string of garbled text and symbols.
Police, for example, would be unable to get access to Signal messages, whether those communiques included political activism or revenge porn. Protesters have preferred the platform as a way to communicate and organize without being spied on by police. A 2016 instance where a grand jury issued a subpoena for Signal data yielded minimal information: when the user registered for the service and when they last used it. Unencrypted apps would allow law enforcement visibility into the messages themselves.
Founded in 2014 by an enigmatic software engineer, white hat hacker and anarchist thinker Moxie Marlinspike, Signal is developed by a nonprofit, which means its unlikely to be acquired by, say, a big tech company. And unlike big tech companies, the service doesnt sell ads or user data. Its supported by donations, including a $50 million loan from its co-founder, Brian Acton, who also created WhatsApp. WhatsApp is encrypted using Signals protocol and was acquired by Facebook in 2014. Critics have worried that WhatsApps ownership by Facebook makes it less secure than Signal.
Signals software is open sourced, so others can download or copy it. The founders mission is for end-to-end encryption to become commonplace, even to the point where Signal isnt necessary.
If weve pushed the envelope as far as we can go and the things we develop become as ubiquitous as possible, we could all focus on other things, Marlinspike told the New Yorker in a profile in October.
While Signal has its downsides, including the fact that it notifies users every time a new contact gets the service and that you can only communicate securely if others have the app, its generally considered to have good enough privacy for regular people. That is, its easy to use and generally secure. More secure programs require jumping through more hoops.
Signal is more geared at direct communication rather than the broad communication of social media, though recently increased its group call limit from five to eight users and its group chats top out at 1,000 users. The company has also been rolling out new features like wallpaper and animated stickers. This summer, it released a tool that would automatically blur faces, so people could, say, share videos of protests without identifying the protesters.
Its possible that Signals most recent surge has been propped up by protesters this time those on the right. As social media companies are taking a more active stance on whats allowed on their platforms after the violent Capitol riots, it makes sense that those searching for new platforms would turn to ones in which their communications are kept secret.
Support Vox's explanatory journalism
Every day at Vox, we aim to answer your most important questions and provide you, and our audience around the world, with information that empowers you through understanding. Voxs work is reaching more people than ever, but our distinctive brand of explanatory journalism takes resources. Your financial contribution will not constitute a donation, but it will enable our staff to continue to offer free articles, videos, and podcasts to all who need them. Please consider making a contribution to Vox today, from as little as $3.
See the article here:
Is the Signal app safe? The encrypted messaging platform and WhatsApp alternative, explained - Vox.com
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]