Signal Messenger and Tor: Government Ops, Yasha Levine

grarpamp grarpamp at gmail.com
Sat Jan 15 23:29:44 PST 2022


https://yasha.substack.com/p/signal-is-a-government-op
https://yasha.substack.com/p/spy-funded-privacy-tools-like-signal

"Tor Stinks  -- NSA"

Links in original/archive


Signal is a government op
Signal was created and funded by a CIA spinoff. It is not your friend.
Yasha Levine
	Jan 16

Signal — the privacy chat app favored by the world’s leading crypto
experts — is trending again. In the wake of Twitter and Facebook’s
MAGA Maidan Internet purge (which was followed by Facebook’s
announcement that it was gonna start siphoning data off its WhatsApp
property), Signal shot up to being the top downloaded messenger app on
the planet.

The New York Times is writing about it. Edward Snowden is tweeting
about it, telling his fans that Signal is the only reason he’s able to
stay alive (and not the fact that he’s being protected round-the-clock
by Russia’s security apparatus.) Hell, Even Elon Musk is out there
telling people to go Signal. So many people are flooding the app that
it’s been crashing.
Twitter avatar for @elonmuskElon Musk @elonmusk
Use Signal

January 7th 2021
48,655 Retweets363,262 Likes

Given that the app is blowing up, I figure it’s a good time to roll
out my periodic public service announcement: Signal was created and
funded by a CIA spinoff. Yes, a CIA spinoff. Signal is not your
friend.

Here are the cold hard facts.

Signal was developed by Open Whisper Systems, a for-profit corporation
run by “Moxie Marlinspike,” a tall, lanky cryptographer who has a head
full of dreadlocks and likes to surf and sail his boat. Moxie was an
old friend of Tor’s now-banished chief radical promotor Jacob
Appelbaum, and he’s played a similar fake-radical game — although he’s
never been able to match Jake’s raw talent and dedication to the art
of the con. Still, Moxie wraps himself in air of danger and mystery
and hassles reporters about not divulging any personal information,
not even his age. He constantly talks up his fear of Big Brother and
tells stories about his FBI file.

So how big a threat is Moxie to the federal government?

This big: After selling his encryption start-up to Twitter in 2011,
Moxie began partnering with America’s soft-power regime change
apparatus — including the State Department and the Broadcasting Board
of Governors (now called the U.S. Agency for Global Media) — on
developing tech to fight Internet censorship abroad. That relationship
led to his next venture: a suite of government-funded encrypted chat
and voice mobile apps. Say hello to Signal.

If you look at Signal’s website today, you’ll find all sorts of
celebrity endorsements —  Edward Snowden, Laura Poitras, and even Jack
Dorsey. You’ll also find a “donate” button — which, by the way, you
shouldn’t press because Signal has plenty of tech oligarch cash on
hand these days. What you won’t find is an “about” section that
explains Signal’s origin story — a story that involves several million
dollars in seed and development capital from Radio Free Asia, a CIA
spinoff whose history goes back to 1951 and involves all sorts of
weird shit, including its association in the 1970s with the Moonies,
the hardcore anti-communist Korean cult.

Exactly how much cash Signal got from the U.S. government is hard to
gauge, as Moxie and Open Whisper System have been opaque about the
sources of Signal’s funding. But if you tally up the information
that’s been publicly released by the Open Technology Fund, the Radio
Free Asia conduit that funded Signal, we know that Moxie’s outfit
received at least $3 million over the span of four years — from 2013
through 2016. That’s the minimum Signal got from the feds.

Three mil might not seem like much these days, especially because
Signal recently got a huge infusion of WhatsApp oligarch cash to keep
its operation going. But it’s important to know that without this
early U.S. government seed money, there would be no Signal today. And
that makes you think: If Signal’s super crypto tech truly posed a
threat to the feds and to our oligarchy’s power, why would the feds
bankroll its creation? And why would Facebook and Google rush to adopt
its super-secure protocols? H’mmmmm…

As you can see from the way Parler was shutdown last week — when our
imperial oligarchy wants to cancel an app, it can do so instantly and
with a vengeance. But Signal lives on and thrives, despite it being a
supposed threat to the almighty surveillance powers of the United
States of America.
Signal was seeded by this Radio Free Asia?

What is Radio Free Asia and the Open Technology Fund? And why would
the U.S government fund crypto tech like Signal? On top of that, why
would Silicon Valley — built as it is on for-profit surveillance —
embrace Signal’s supposedly unbreakable privacy tech?

I’ve written at length about the deeper history of Signal’s government
backers and the way in which crypto fits into America’s imperial
machine. In fact, I dedicated two whole chapters of my book to the
subject. I won’t reprint it here. But if you want to know the whole
story, you can pick up Surveillance Valley at your local bookstore. Or
you can check out some of the articles I’ve written on the topic over
the years. The mains ones are:

    In “The Crypto-Keepers: How the politics-by-app hustle conquered
all,” I do a profile on Telegram and survey the field of our tech
obsessed privacy culture and the bankrupt libertarian-neoliberal
politics that underpin it.

    In “Internet Privacy, Funded By Spies” I tell the history of the
U.S. government regime change apparatus that funds privacy apps like
Signal and Tor.

    In “#J20, Signal, spies and the cult of crypto” I riff on what
being obsessed with crypto says about our politics.

    Back in 2016, German magazine konkret published a wide-ranging
interview with me about spies, politics, and crypto culture.

But beyond just Signal and its government money trail, what interests
me are the politics embedded in our culture’s obsession with crypto
and privacy tech. People are obviously concerned about the
all-pervasive surveillance that surrounds us. But instead of seeking
political solutions to surveillance, our culture has become obsessed
with technological and technocratic solutions — not just Signal, but
apps like Telegram and email providers like ProtonMail.

There’s a feeling of an NRA fantasy to it all. It’s the idea that if
everyone is equipped with a crypto weapon powerful enough, we could
take on both corporations and powerful spy agencies like the NSA. We
can win this war! But cryptography is an area normally reserved for
warfare and espionage between powerful states. There’s nothing
grassroots about it. It’s an arena where this “people power” is
destined to fail.

Maybe using Signal and other “secure” apps can protect you from your
local police department if you’re buying molly off our neighborhood
dealer — that is, if the cops don’t get ahold of your phones. But if
you think you can win a privacy arms race against our imperial tech
oligarchy by using apps that are run and developed on property owned
and controlled by this very same imperial tech oligarchy…well, you
know the answer to that.

—Yasha Levine

PS: When I was working on my book, I found out through a FOIA request
that my early reporting on Tor and Signal immediately got the
attention of the top people in America’s regime change apparatus. That
included Libby Liu, the head of Radio Free Asia. She got freaked out
that my exposé on the millions in government funds that were flowing
to “grassroots” anti-government crypto tech like Signal and Tor was
going scare away the privacy community. Lucky for her and the U.S.
government, she was wrong. The top privacy activists of our age —
including the people from Tor — didn’t care that their main backer was
an old school CIA op. That’s what shocked me when I came across her
email. Here was the head of Radio Free Asia talking about privacy
activists as if they were all in the government’s pocket. And the
thing is, they were — and are.








Spy-funded privacy tools (like Signal and Tor) are not going to
protect you from the government
Ask yourself: Why would a CIA spinoff fund a grassroots encryption app?
Yasha Levine
	Nov 28, 2016	
2		
Art for Pando by Jeannette Langmead.

America’s in total turmoil following Donald Trump’s victory.

Nazis and white supremacists are suddenly in vogue, getting magazine
profiles and primetime TV spots. Bernie supporters are nervously
rejoicing — setting sights on taking over the Democratic Party, while
waiting for blacklists and payback.

Sad to say, but most of my journalist colleagues are in total meltdown
mode. Caught completely off-guard, they’re blaming everything from
fake news to Facebook to Macedonian teenager-entrepreneurs and nursing
wild theories about an underhanded plot by the Russians to hack voting
machines via infected USB dongles.

Meanwhile, lots of people seem to think that Trump’s victory
represents some kind of unique evil that has put America on fast track
to becoming Nazi Germany — forgetting our country’s long and dark
history of normalizing eugenicists, white supremacists and outright
Nazis for political ends. Look no further than Ukraine, welfare reform
and libertarians, just to name a few. And Trump’s cabinet picks are
bearing this continuity out: more and more, his is shaping up to be a
Charles Koch administration — you know, the richest man in the world,
who just so happens to fund white supremacists and Holocaust deniers.

The crypto community’s not letting a good crisis go to waste. Our
foremost privacy experts have seized on people’s fears and have been
churning out articles and how-to guides urging us to immediately
encrypt our digital lives in order protect ourselves from what they
say will be a Totalitarian Trump presidency.

“With Trump eager to misuse his power and get revenge on his perceived
enemies, it’s reasonable to conclude there will be a parallel increase
in abuse of power in law enforcement and the intelligence community,”
wrote Micah Lee, a technologist at The Intercept, owned by eBay
billionaire Pierre Omidyar. “Activists who put their bodies on the
line trying to protect basic rights — freedom of religion, freedom of
speech, civil rights, reproductive rights, voting rights, privacy
rights — will face the brunt of it.”

That sounds like a nightmare. And what’s the Intercept’s solution to
the Trump menace? Lee says there’s only one thing to do: encrypt your
computers and smartphones, host your websites in the dark web, browse
the Internet using Tor and communicate via Signal. In fact, he lashed
together a longwinded, five-page guide on the exact grassroots privacy
tech people need to use to safeguard their cyber property:

    “Surveillance Self-Defense Against the Trump Administration.”

     “…you should get everyone in your activist Facebook groups to
switch to an end-to-end encrypted group-messaging app, such as Signal,
WhatsApp…”

    “Everyone in your group will need to use Tor Browser…”

Lee’s post was shared thousands of times on Twitter and Facebook. And
his wasn’t the only one. Reddit, Facebook, Twitter and Medium are
awash with news articles and guides telling people to protect
themselves using Tor and Signal. Even Edward Snowden chimed in via
video link at the Real Future Fair in Oakland last week to tell people
political struggle won’t be enough to stop Trump’s totalitarianism and
that encryption was the answer.

“If you want to build a better future, you’re going to have to do it
yourself. Politics will take us only so far … Law is simply letters on
a page,” Ed told the conference, as reported by Matt Novak.“Technology
works differently than law. Technology knows no jurisdiction.” He then
added: “use Signal.”

Yep, forget collective action, forget politics. Use encryption apps.
Tech trumps everything in our fight for collective freedom.

Those who’ve followed my reporting on the Tor Project and the Internet
Freedom movementknow I think this advice isn’t just ridiculous and
dishonest, it’s downright dangerous — dangerous because it puts in
harm’s way the very people that these encryption and privacy apps are
supposed to protect.

The reason is simple, and can’t be repeated often enough: most of
today’s “grassroots” privacy technology pushed by privacy activists
like Lee and Snowden were created and continue to be controlled by the
very same U.S. military-intelligence apparatus these apps are supposed
to shield us from. I’m talking about the Pentagon (including the NSA),
the State Department and several CIA spinoff outfits that had been
covertly set up during the Cold War. In short, these tools are a part
of the very same state apparatus that will in just a few months be
under the control of President Donald Trump.

If this all sounds like a whack job conspiracy theory to you, then
you’re in for a rude awakening.

Let’s start with Tor.

Tor went mainstream in 2013, after Edward Snowden popped up on the
scene. He was a huge fan! His loyalty on full display in the first
pictures that emerged while he was in hiding in Hong Kong: a big fat
Tor sticker on his black laptop. After fleeing to Russia, he explained
that Tor was central to what he did, allowing him to exfiltrate
documents under the nose of the NSA. He also said Tor was good for
more than just protecting leakers and whistleblowers. He described it
as the best weapon people have to protect themselves against Internet
surveillance. “Without Tor, the streets of the Internet become like
the streets of a very heavily surveilled city,” he explained.

But there is something about Tor that Snowden held back from his fans.

Tor is made by the Tor Project, a nonprofit based in Cambridge,
Massachusetts. It is an Internet anonymity app that runs on your
computer and hides your identity as you browse the Internet. It can
also run Internet servers and make them accessible through the dark
web. In fact, the “dark web” almost exclusively runs on Tor, making
the service an integral part of a global network of illegal drug
marketplaces, child sex abuse pornography communities, ISIS hangout
spots and at least on crypto literary journal. The spooky thing about
Tor wasn’t that it allowed all this bad stuff to take place online,
but that it was almost entirely funded by the U.S. government.

Tor was initially developed by military researchers in the mid-1990s
at the U.S. Naval Laboratory in Washington D.C. It was spun off as a
quasi-independent nonprofit in 2004 but continued to receive most of
its funding through contracts coming from three branches of the U.S.
National Security State: the U.S. Navy, the State Department and the
Broadcasting Board of Governors, an old CIA spinoff set up during the
Cold War to wage psychological warfare and regime change ops against
countries deemed hostile to U.S. security and economic interests. To
date, Tor has received over $10 million in federal contracts. It even
has its own federal contractor number. (For funding details see here,
here and here.)

So why would the U.S. National Security State fund an app designed to
thwart its own power? Well, that’s a long story and fascinating story
— one that I’m addressing at length in my upcoming book “Surveillance
Valley.” But the quick answer is that Tor was created not to thwart
American power, but to enhance and multiply it.

Tor was developed by the U.S. Navy as a way of getting around the
problem of the open nature of Internet communication, which allows
anyone watching network traffic — ISPs, Google, spies — to see where
you are coming from and where you are going. Imagine a CIA agent
trying to log into their mail.cia.gov account while under cover in a
hotel in Ankara. Whoever was monitoring the spy’s connection would
immediately blow their cover. Internet architecture posed a problem
for spies and Tor was one of the solutions: It could hide where you’ve
coming from and where you are going on the Internet by bouncing your
connections around several nodes and obscuring your identity. The only
problem was that if only U.S. spies and agents used this system, then
it’s would have been very obvious that anyone connecting to Tor was a
spook. So in order for Tor to truly work, it needed to be opened up to
as many people as possible: not just spies but soccer moms, drug
dealers, terrorists, paranoid kids, activists, credit card scammers,
Russian spies — anybody. The bigger the crowd Tor had, the better it
could hide the spies used it. That’s why Tor was spun off from the
U.S. Navy and became a non-profit organization, but was still actively
used by the Pentagon, as well as the FBI.

As Tor matured, America’s foreign policy apparatus found another use
for its anonymity technology: regime change.

America runs a sprawling foreign propaganda operation that blankets
much of the world. Satellite, television and radio transmissions
beamed to Latin America, Asia, the Middle East and Eastern Europe —
targeting countries deemed hostile to U.S. interests: Russia, China,
Cuba, Iran, Vietnam, North Korea, Venezuela. The idea behind it is the
same thing that the U.S. and Europe now accuse Russia of doing:
sponsoring news — some of it objective and very good, lots of it
ideologically distorted or simply fabricated — as part of a
destabilization and psychological warfare campaign. America has been
doing this non-stop for more than half a century, using propaganda to
complement grand plans of regime change.

During the Cold War, this propaganda was delivered mostly by radio
through outfits like Radio Free Europe, Radio Liberty, Radio Free Asia
— all of which were first set up and covertly run by the CIA. In the
2000s, the U.S. government began to use the Internet for these
propaganda efforts. After the collapse of the Soviet Union a big focus
was on China, so Radio Free Asia was brought back from the dead and
began to use the Internet. But China simply blocked the IP addresses
of Radio Free Asia’s websites. It was a pretty simple fix from China’s
perspective. So the U.S. government needed a technology that could
help the Chinese people to get around this censorship, and Tor offered
the best solution.

That’s when Tor started getting funding from the Broadcasting Board of
Governors, which is an umbrella federal agency that oversees all of
America’s foreign propaganda operations. While one part of the U.S.
military-intelligence apparatus used it to hide their tracks online,
another part started using it like a crowbar to pry open national
firewalls that prevented American propaganda from coming into
countries like China and Iran. From then on, Tor became a foreign
policy weapon, a soft power cyber weapon.

Today, Tor is private in name only. It's a federal weapons contractor
with its own federal contractor number and gets the bulk of its budget
via contracts from various wings of the U.S. National Security State:
the State Department, the Pentagon and the U.S. Navy and several CIA
spinoffs, including the Broadcasting Board of Governors and Radio Free
Asia.

Does Tor work? Don’t get your hopes up. Tor is a bit of a boondoggle.
It’s almost completely useless in countries like China or Iran that
actively try to block it. As for protecting people in the United
States from their own government? Well, the ACLA, EFF and even Edward
Snowden champion it as the most powerful anonymity tool on the
Internet. That may be true, but being the most powerful tool does not
necessarily make it secure against the U.S. National Security State.
As Tor developer Mike Perry admitted a few years back, Tor is not at
all effective against powerful, organized “adversaries” (aka
governments like the United States) that are capable monitoring huge
swaths of the Internet. “Extremely well funded adversaries that are
able to observe large portions of the Internet can probably break
aspects of Tor and may be able to deanonymize users,” he wrote.

And Tor’s been battered in a bad way in recent years — with so many
holes poked in it that it now looks like a log of Swiss cheese. Front
and center: a small group of researchers at Carnegie Mellon University
had figured out a cheap and easy way to crack Tor’s super-secure
network with just $3,000 worth of computer equipment. The method was
then used by the FBI to mount an international raid that punched holes
in Tor’s defenses and shutdown several hundred anonymous drug and
kiddie porn markets.

There is one thing Tor does really well: it concentrates everyone who
has something to hide on its network. According to documents leaked by
Edward Snowden, this is the exact reason why the NSA does not want to
spook people away from Tor. It is also a reason why the NSA, along
with the GCHQ, run their own Tor nodes.

In short: if you’re looking to score a few grams of coke online, Tor
might shield you from the FBI and DEA — but only because they have
bigger suckers to bust. But if your political activities are in any
way perceived as a threat by the powers that be — well, I wouldn’t
trust Tor if I were you.

Despite all this, Tor is still being pushed by the likes of the
Intercept and all sorts of well-meaning organizations. For instance,
here is a DIY guide to feminist cybersecurity: “If you are ever in a
position where you absolutely NEED to be anonymous, be it for safety
or political reasons, then you need to use the Tor network.”

Yeah, good luck with that.

Then there’s Signal.

Signal is an encrypted chat app you can download for use on your
Android and iPhone. Like Tor, it went mainstream largely thanks to
Edward Snowden. Ed made the NSA’s surveillance of the Internet a
global concern and offered Signal as the best, free and easy-to-use
tool people could use to encrypt themselves against the NSA menace.

“Use anything by Open Whisper Systems,” Snowden told his followers,
referring to the outfit that makes Signal.

Snowden isn’t Signal’s only celebrity endorsement. Laura Poitras is a
huge fan, telling anyone who will listen:  “Signal is the most
scalable encryption tool we have. It is free and peer reviewed. I
encourage people to use it everyday.” Other Signal boosters include
respected encryption experts like Bruce Schneier and Matt Green. You
can find most of these endorsements right there on Open Whisper
System’s homepage. Without a doubt, Signal is hugely popular in the
privacy world — so popular that Facebook even integrated it into
WhatsApp’s encrypted chat mode.

As a result of all this promotion, Signal has become the communication
app of choice for political activists and protesters — from the Black
Lives Matter movement to people currently organizing the national #J20
anti-Trump strike planned for January 20th, Inauguration Day.

And why not use Signal, right?

Here’s the problem: Signal was created by the same spooky regime
change outfits that fund the Tor Project. The money primarily comes
through the federal government’s premier Internet Freedom venture
capital outfit: Open Technology Fund, which works closely with the
State Department’s regime change arm and is funded through several
layers of Cold War CIA cutouts — including Radio Free Asia and the
Broadcasting Board of Governors.

So what’s Signal story?

Here’s a quick rundown: The encrypted chat app — which can be
downloaded from Apple and Google’s stores for free — is built by Open
Whisper Systems (aka Quiet Riddle Ventures), an opaque for-profit
organization run by Moxie Marlinspike (not his real name). Marlinspike
likes to keep the details of his biography wrapped in mystery. He
poses as an anti-government radical in the mold of Jacob Appelbaum,
who selflessly works for the greater good, risking life and freedom
building super-secure communication technology powerful enough to
stand to the National Security Agency. It’s a nice story. The reality
is something different: Marlinspike made a bunch of money selling his
previous encryption startup to Twitter in 2011. Right after that, he
began partnering with America’s soft-power regime change apparatus —
including the State Department and the Broadcasting Board of Governors
— which led to them funding his next venture: a suite of encrypted
chat and voice mobile apps. Signal is a direct result of this project.

You won’t find it anywhere on Open Whisper System’s website, but
Signal depends on NatSec cash for continued survival. Exactly how much
cash is hard to gauge, as Open Whisper System refuses to disclose its
financing structure. But if you tally up documents released by Radio
Free Asia’s Open Technology Fund, we know Marlinspike’s outfit
received $2.26 million in the span of the past three years — not
exactly pocket change. And the NatSec cashflow shows no sign of
ending.

Signal, like Tor, is bankrolled by the soft-power wing of the U.S.
National Security State as part of a larger “Internet Freedom”
initiative — an attempt to leverage the Internet and digital
communication tools as a compliment to more traditional elements of
psychological warfare and regime change ops. The ideas behind
“Internet Freedom” go back to the origins of the commercial Internet,
but they began to be implemented in earnest during President Barack
Obama’s first term — led by Hillary Clinton’s State Department.

Hillary Clinton isn’t too Internet savvy, but she surrounded herself
by a bunch of gee-whiz cyber-democracy advisors who were sold on the
idea that the Internet is a magic technology that transforms everyone
that comes in contact with it into a happy, non-violent
democratic-consumer. To make world peace a reality, all you had to do
was unleash Silicon Valley on the world and let the for-profit
Internet work its magic.

With these geniuses whispering in her ear, Secretary Clinton made
Internet Freedom a central plank of her State Department tenure. To
her, it was not about regime change, but about helping people around
the world talk to one another. “We see more and more people around the
globe using the Internet, mobile phones and other technologies to make
their voices heard as they protest against injustice and seek to
realize their aspirations,” she said back in 2011. “So we’re focused
on helping them do that, on helping them talk to each other, to their
communities, to their governments and to the world.”

In reality, Internet Freedom was just war fought by other means.
Here’s a report by the New York Times from June 2011, right around the
time that Marlinspike began working with the State Department on
Internet Freedom efforts, which would grow later become Signal.

    The Obama administration is leading a global effort to deploy
“shadow” Internet and mobile phone systems that dissidents can use to
undermine repressive governments that seek to silence them by
censoring or shutting down telecommunications networks.

    The effort includes secretive projects to create independent
cellphone networks inside foreign countries, as well as one operation
out of a spy novel in a fifth-floor shop on L Street in Washington,
where a group of young entrepreneurs who look as if they could be in a
garage band are fitting deceptively innocent-looking hardware into a
prototype “Internet in a suitcase.”

     Financed with a $2 million State Department grant, the suitcase
could be secreted across a border and quickly set up to allow wireless
communication over a wide area with a link to the global Internet.

    The American effort, revealed in dozens of interviews, planning
documents and classified diplomatic cables obtained by The New York
Times, ranges in scale, cost and sophistication.

    Some projects involve technology that the United States is
developing; others pull together tools that have already been created
by hackers in a so-called liberation-technology movement sweeping the
globe.

    The State Department, for example, is financing the creation of
stealth wireless networks that would enable activists to communicate
outside the reach of governments in countries like Iran, Syria and
Libya, according to participants in the projects.

Ah yes. Look at Syria and Libya — models of democracy, where Al-Qaeda
and ISIS run wild and democracy’s a-flourishin’.

Aside from the geopolitical aspect of Internet Freedom technology, the
question is: Does Signal actually work? Certainly, lots of encryption
experts say its code is flawless. But then again, these experts have
been saying the same thing about Tor.

Signal runs on Amazon AWS cloud service — and Amazon is itself a CIA
contractor. Signal also requires that users tie their app to a real
mobile phone number (their identity) and give unrestricted access to
their entire address book (the identities of all their friends,
colleagues, fellow activists and organizers and sources). Troubling on
an even more fundamental level: Signal depends on Apple and Google to
deliver and install the app. As one respected security researcher
recently pointed out, this is a serious problem because both companies
partner with the NSA and can modify the app (at request of, say, the
NSA or CIA) without anyone getting wise.

“Google usually has root access to the phone, there’s the issue of
integrity. Google is still cooperating with the NSA and other
intelligence agencies. PRISM is also still a thing. I’m pretty sure
that Google could serve a specially modified update or version of
Signal to specific targets for surveillance, and they would be none
the wiser that they installed malware on their phones,” wrote Sander
Venema in a post called “Why I won’t be recommending Signal anymore.”

Yeah, that’s pretty troubling. Like Tor, Signal might work if you're
chatting with your local neighborhood dealer to score a few grams of
coke, but don’t expect it to protect you if you decide to do anything
really transgressive — like organizing against concentrated corporate
political power in the United States. For what it's worth, I
personally heard activists protesting the Democratic National
Convention in Philadelphia tell me that the cops seemed to know their
every move, despite the fact they were using Signal to organize.

The moral of this story: Tor and Signal are creations of America’s
spooky war apparatus. They are designed for regime change in the age
of the Internet. If they ever posed a threat to the United States —
and to the corporate monopoly power that calls the shots here — their
funding would be pulled and they would cease to exist. In short: if
you’re worried about corporate-state surveillance, technology funded
by this very same state is not the answer.

—Yasha Levine

PS: If you want to know more, read my book — Surveillance Valley.

Update: An earlier version of this story incorrectly described Open
Whisper Systems as a non-profit. It is, in fact, a for profit company.


More information about the cypherpunks mailing list