First of all signal may be open source. But the implementation of the app on your device is not.
Secondly security by open source only helps if multiple experts have audited and fixed vulnerabilities. Even after that there may be bugs which have escaped scrutiny.
Metadata has never been one of the things that end-end encryption helps with though. The point has always been about the messages themselves. And of course every app has to respond to court orders and such.
Uh, does anybody claim they don’t cooperate when required?
The February 16, 2016 order issued by Magistrate Judge Pym gave Apple five days to apply for relief if Apple believed the order was “unreasonably burdensome”. Apple announced its intent to oppose the order, citing the security risks that the creation of a backdoorwould pose towards customers.[31] It also stated that no government had ever asked for similar access.[32] The company was given until February 26 to fully respond to the court order.[33][34]”
Yeah, that third way is companies secretly giving the unlocking info to a third party, having the govt get the info anyways and then withdrawing the order. Don’t know who they’re trying to fool.
Why do you think they had to pay a company not located in the US? So that Apple could transfer the requisite unlocking knowledge overseas where it wouldn’t be subjected to unnecessary scrutiny like 4th amendment.
Plus investors and customers like you and me are happy with the public announcement “oh fbi withdrew request so Apple didn’t comply. See they’re so good :))”
4th amendment wasn’t an issue; the owner of the phone wasn’t the shooter (was a work phone) and were actively cooperating with the fbi. Any other irrelevancies you want to bring up?
It’s a huge thing in Japan and various govt agencies have taken official steps toward mitigating the incident. While in TW these discussions are mostly centered around… how the Japanese government had reacted to it, or how LINE Taiwan (three companies) has moved to a bigger office in Neihu and there is a huge cute bear right in the lobby…
A bit more info on this case. Not exaustive but you will get the idea.
the incident occurred at LINE Fukuoka (not LINE Tokyo) where mostly IT teams are stationed. LINE Fukuoka outsourced some IT dev to a Japanese company which outsourced some dev works to one of their subsidiary in PRC
it prompted the Cabinet to hold a press conference late March, and again the same week, and again a month after it’s reported
CEO of LINE Japan apologized, saying they’ve betrayed everyone’s trust
A guideline has been issued by the top cyber security unit in the Japanese Cabinet, prohibiting all govt agencies the automatic transmission of personal identifiable information thru LINE platforms, which could effectively hurt the company’s business with public sector stkahlholders in JP. It’s not enforced yet.
Meanwhile I don’t think you’d like to know more about the situation in TW…
… more than 100 people in the political sector were victims of the attack, including Cabinet and Presidential Office officials, military officers, local government officials, and heavyweights of political parties
Letter Sealing point-to-point encryption function of the LINE app accounts of the victims had been turned off