
Send Signal Messages with [[:Template:Project name]]

Introduction
Signal is a well-respected, free, open source, cross-platform encrypted messaging service. It supports individual and group messages (files, voice notes, images and video) as well as one-to-one voice and video calls. All communications are encrypted end-to-end for security, and mechanisms exist to independently verify the identity of contacts as well as the integrity of the data channel. The encryption keys are generated and stored at the endpoints (user devices), rather than by the servers. Both the client and server code is openly published, and the software is recommended by noted privacy advocates Edward Snowden and Bruce Schneier, among others. This is due to the strong architecture and limited metadata available in the ecosystem. [1] [2] [3]
Anonymity Specific
The mandatory linkage of the desktop software application with a phone number makes it very likely adversaries can easily link any 'anonymous' use of Signal in Template:Project name with a user's real identity, even if a secondary phone number is used as a limited workaround. Notably, to date Signal has ignored user requests to enable registration with an email account as a possible alternative. For this reason alone, alternative options like Gajim and HexChat should be investigated instead; see Instant Messenger Chat for further information. Readers are of course free to ignore this advice -- see below for Template:Project name instructions.
Prerequisites
Signal must already be installed on your Android or iOS device -- first follow the download instructions on the Signal homepage if required. [5]
It is also recommended to create a separate Template:Workstation product name that is only used for Signal because these instructions require the enabling of the Ubuntu Xenial repository for the desktop client. [6] The Signal developers do not maintain specific versions for other distributions, which is why Ubuntu is defaulted to.
Install the Signal Desktop Client
This configuration allows the standalone Signal desktop client to link with the mobile device and send/receive messages from a laptop or desktop computer. [7] As of late-2020, the desktop application also now supports one-to-one voice and video conversations. [8] After launching the desktop client, it must be linked with the (mobile) phone. Be aware that messages are synchronized with Signal on the mobile phone.
- [[Non-Qubes-Whonix|Template:Non q project name]]: Perform these steps inside [[Template:Workstation product name short|Template:Workstation product name]].
- [[Kicksecure-Qubes|Template:Q project name]]: Perform these steps inside Qubes
Template:Whonix-ws
Template.
1. Add the Signal GPG key to the APT keyrings. [9]
To add the signing key, follow steps A to C.
A. Securely download the key.
B. Display the key's fingerprint.
Optional for better security. If you are interested, click on Expand on the right.
C. Copy the signing key to the APT keyring folder. [14]
Click = Copy Copied to clipboard!
2. Add the Signal third-party APT repository. [15] [16] [17]
Click = Copy Copied to clipboard!
3. Install Signal.
Install package(s) signal-desktop
following these instructions
1 Platform specific notice.
- Kicksecure: No special notice.
- Kicksecure-Qubes: In Template.
2 Update the package lists and upgrade the system.
Click = Copy Copied to clipboard!
3 Install the signal-desktop
package(s).
Using apt
command line --no-install-recommends
option is in most cases optional.
Click = Copy Copied to clipboard!
4 Platform specific notice.
- Kicksecure: No special notice.
- Kicksecure-Qubes: Shut down Template and restart App Qubes based on it as per Qubes Template Modification
.
5 Done.
The procedure of installing package(s) signal-desktop
is complete.
4. Done.
The process of installing Signal is complete.
5. Note.
- Template:Non q project name: No extra steps required.
- Template:Q project name: Shutdown
Template:Whonix-ws
Template. Restart Template:Workstation product name (Template:Workstation product name vm
).
Start Signal
Inside Template:Workstation product name (Template:Workstation product name vm
).
To launch Signal, run.
Click = Copy Copied to clipboard!
Figure: Signal Desktop in Template:Project name
Claims That Signal Encryption Is Broken
Cellebrite formerly claimed
they were able to decrypt Signal encryption. However, the article details were later removed
because it was debunked by Moxie Marlinspike
(co-founder and currently CEO of Signal Messenger) , Edward Snowden
, and Filippo Valsorda
. Signal also officially
responded to this false claim.
Note: cryptographer Bruce Schneier wrote an article about this issue in his blog entitled "Cellebrite Can Break Signal", but he later apologized for his erroneous post.
See Also
Footnotes
- ↑
https://en.wikipedia.org/wiki/Signal_%28software%29
- ↑
For additional Signal features, see: Wikipedia: Signal (software) - Features
- ↑
Signal blog
:
By design, Signal does not have a record of your contacts, social graph, conversation list, location, user avatar, user profile name, group memberships, group titles, or group avatars. The end-to-end encrypted contents of every message and voice/video call are protected by keys that are entirely inaccessible to us. In most cases now we don’t even have access to who is messaging whom.
- ↑ The number can be different form the device's SIM card; it can be a landline or VOIP number, so long as the user can receive the verification code and possesses a separate device to set up the software.
- ↑ Also see: Installing Signal
.
- ↑ Common advice is to not mix repositories from related distributions like Ubuntu and Debian, since this can cause system instability.
- ↑
https://www.signal.org/blog/standalone-signal-desktop/
- ↑ https://github.com/signalapp/Signal-Desktop/releases/tag/v1.35.1
- ↑
https://github.com/freedomofpress/ansible-role-signal-desktop
- ↑
Using Qubes UpdatesProxy (
http://127.0.0.1:8082/
) because Qubes Templates are non-networked by Qubes default and therefore require UpdatesProxy for connectivity. (APT in Qubes Templates is configured to use UpdatesProxy by Qubes default.) - ↑
Even more secure would be to download the key Disposable and then
qvm-copy
it to the Qubes Template because this would avoid
curl
's attack surface but this would also result in even more complicated instructions. - ↑
Even more secure would be to display the key in another Disposable because this would protect the Template from
curl
's andgpg
's attack surface but this would also result in even more complicated instructions. - ↑ Minor changes in the output such as new uids (email addresses) or newer expiration dates are inconsequential.
- ↑
https://forums.whonix.org/t/apt-repository-signing-keys-per-apt-sources-list-signed-by/12302
- ↑
https://signal.org/download
- ↑
https://forums.whonix.org/t/apt-repository-signing-keys-per-apt-sources-list-signed-by/12302
- ↑
See this for a comment why
tor+
is useful even inside Template:Project name.

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!