More telcos confirm Salt Typhoon breaches as White House weighs in

Signal, end-to-end encryption, and trust

  • Debate over FBI recommending Signal: some see it as evidence Signal is compromised; others argue Signal’s protocol is formally analyzed and currently among the strongest available.
  • Trust split:
    • Pro‑Signal: open source; crypto independently verified; client doesn’t need to trust the server for message contents.
    • Skeptical: server code isn’t fully verifiable; Signal historically ran non‑open server components; requirement for a phone number harms anonymity and creates exploitable metadata.
  • Several note that practical compromise is more likely via OS, hardware, or targeted app delivery (e.g., tainted APKs) than via breaking Signal’s crypto.
  • Alternatives mentioned include Session, Matrix, Tox, SimpleX; but none discussed in comparable depth.

CALEA, lawful intercept, and the Salt Typhoon attack path

  • Many think the breach likely exploited lawful-intercept (CALEA) systems or third‑party “wiretapping outsourcing” providers, not core network routing directly.
  • Others argue reporting doesn’t clearly support that and point instead to insecure or legacy telco equipment, firmware implants, TFTP-based provisioning, and weak management protocols.
  • Broad agreement that LI backdoors mandated for domestic law enforcement create a high‑value target that foreign actors can and do exploit.

Metadata, phone numbers, and KYC

  • Strong criticism of mandatory phone numbers for messaging and financial services: creates de‑facto identity, maps social graphs, and adds breach risk.
  • Services blocking VOIP numbers (e.g., Venmo, some banks, WhatsApp) are seen as prioritizing fraud reduction and “Know Your Customer” requirements over user privacy.
  • Workarounds (cheap travel SIMs, eSIMs) show phone-based “identity” is weak and easily gamed.

Telecom security practices and incentives

  • Multiple commenters describe telecom/network security as systematically weak:
    • Shared secrets for RADIUS/SNMP/BGP, rarely used or weak TCP protection, poor host key validation, insecure consoles, and spotty secure boot/auditing.
  • Legacy/EOL gear with known vulnerabilities persists because it “still works” and replacing it is costly.
  • Companies face little real liability for breaches, leading to “compliance theater” and dependence on cyberinsurance rather than serious hardening.
  • Advocated fixes include strong data minimization, meaningful financial penalties for PII loss, and treating stored data as a dangerous liability, not an asset.

Attribution, geopolitics, and “act of war” questions

  • Some treat PRC attribution as plausible given known espionage patterns and concurrent Treasury intrusion; others see “China, China, China” as unproven narrative with little public evidence.
  • Several frame this as part of an ongoing digital cold war and “prepositioning” in critical infrastructure, not necessarily a prelude to kinetic war.
  • Repeated theme: US-mandated surveillance capabilities (CALEA, SS7 exposure, LI platforms) have now been turned against US infrastructure by foreign actors, validating long‑standing warnings about backdoors.