“Super secure” messaging app leaks everyone's phone number

Context: MAGA-Themed “Super Secure” App and Its Flaws

  • Thread centers on a MAGA-branded chat app (Converso/Freedom Chat) that exposes users’ phone numbers and even plaintext PINs via trivial API misuse.
  • Many see it as emblematic of “failure-as-a-feature” operations and grifty, low-quality products marketed as privacy tools.
  • Several note the app is barely used (tiny install counts), questioning whether it’s more a marketing stunt than a real platform.

Signal’s Design: Strengths and Limitations

  • Multiple comments contrast the app with Signal’s private contact discovery: SGX enclaves, ORAM-like lookup, constant-time equality, and remote attestation to hide which numbers match.
  • Acknowledged limits:
    • SGX is not perfect (side channels, need to trust attestation/verifier).
    • Signal’s metadata protection is “by policy,” not mathematically enforced; it still sees registration time and coarse login activity.
  • Some argue if you need stronger metadata privacy, use tools like Cwtch, Ricochet, Briar, etc.

Identifiers, Phone Numbers, and Threat Models

  • Heavy debate over requiring phone numbers at all:
    • Pro: excellent anti-spam and usability (viral contact discovery, easier onboarding).
    • Con: ties account to SIM/ID, enables global phone-number enumeration, and leaks that two people are Signal users.
  • Ideas floated: pairwise hashes for discovery, paid/crypto-based registration, PoW or CAPTCHAs, invite-only systems—each criticized as either user-hostile, ineffective at scale, or still linkable.

Other Messengers and Metadata Concerns

  • SimpleX, Matrix, DeltaChat, Telegram, and others discussed:
    • SimpleX criticized for IP exposure and centralized relays.
    • Matrix praised for federation and ongoing research into anonymous discovery (e.g. new protocols), though current hashed lookup has its own issues.
    • Telegram widely characterized as non-private and metadata-heavy.

Basic Security Hygiene and Developer Competence

  • Core failure here is 101-level: no rate limiting, unsafe APIs, serializing entire user objects (including PINs), and naive contact discovery.
  • Several lament “vibe coding”: devs using auto-serialization and cloud stacks without understanding rate limiting, data minimization, or common web vulns.

Hubris, Politics, and Expertise

  • A widely cited quote from the app’s creator (“we’re both smart, how hard can it be?”) is used to illustrate broader cultural distrust of expertise and overconfidence.
  • Political angle is contentious: some see MAGA’s anti-expert ethos as directly producing insecure tech; others argue breaches happen across the spectrum and want less politicization in the technical discussion.