Close Menu
Philstar Tech
    • Deals
    • Contact Us
    • About Us
    Philstar Tech
    • Home
    • All Post
    • News
      • Features
    • Tech @Life
    • Reviews
      • Fitness
      • Laptops
      • Mobility
      • Smartphones
      • Wearables
    • Opinion
    Philstar Tech
    Home » The Signal leak and the pitfalls of security
    Opinion

    The Signal leak and the pitfalls of security

    Eugene VillarBy Eugene VillarMarch 26, 20254 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Unless you’ve been completely offline (or not at all interested in American politics), you’ve likely heard about the massive blunder by President Trump’s administration, where top military and intelligence officials accidentally invited a critical journalist into a Signal group chat discussing airstrikes on Yemen’s Houthi rebels that started on March 15.

    This all came to light when Jeffrey Goldberg, the journalist in question and editor-in-chief of the left-leaning magazine The Atlantic, published a bombshell report about the security leak last March 24. As Goldberg recounts in his piece, “U.S. national-security leaders included me in a group chat about upcoming military strikes in Yemen. I didn’t think it could be real. Then the bombs started falling.”

    The whole debacle can be summed up as a comedy of errors in two parts. First, top officials discussed classified information using an unapproved communication channel. And second, nobody vetted that everyone with access to the communication channel have the required security clearances.

    According to political pundits, either or both of these could possibly be considered criminal acts under the U.S. Espionage Act of 1917 and/or the Federal Records Accountability Act of 2014.

    What is Signal?

    This comedy—or tragedy, if you stand on the other side of the political aisle—has again put the spotlight on the messaging app Signal.

    Long favored by journalists, privacy advocates, and political dissidents, Signal is an alternative to apps like Facebook Messenger, WhatsApp, and Viber. What sets Signal apart is its primary focus on privacy by employing automatic and default end-to-end (E2E) encryption of chats and calls. This means that even employees of Signal itself cannot read messages that pass through its systems, making things like subpoenas against Signal useless.

    Signal has implemented numerous safeguards to help ensure their users’ security and privacy. First, all of the software—mobile and desktop clients as well as servers—are open-source, which allows anyone to inspect and verify that the encryption is solid and there are no hidden backdoors that could be exploited by hackers or law enforcement.

    Second, Signal is maintained and operated by the non-profit Signal Foundation, which contrasts with practically every other messaging app out there that are under the auspices of commercial entities including Big Tech firms like Apple, Google, and Facebook. This makes it much less likely that the foundation will compromise its security in order to enrich shareholders.

    Finally, Signal’s E2E encryption uses the Signal Protocol. This protocol has been extensively analyzed by academics and security researchers and found to be very secure. The Signal Protocol is so good that even Facebook/Meta have adopted it for private chats in their own WhatsApp and Messenger apps while Viber uses a different protocol modeled after it.

    OPSEC is hard, for real!

    Jeffrey Goldberg being accidentally included in that infamous Houthi group chat is a very good example that simply using Signal (or another E2E encrypted app) is never enough. Setting aside that these officials shouldn’t have used Signal—excellent as it is—in the first place, they shouldn’t have been careless with inviting random unvetted people into a sensitive space.

    Their biggest mistake? Failing to follow strict operations security, or OPSEC for short.

    Did you know that you are already using OPSEC in your day-to-day life? You practice OPSEC when you choose hard-to-guess passwords that use different types of characters and do not incorporate details from your life like your child’s birthday or your favorite pet’s name. You use OPSEC when your bank sends you one-time passwords (OTPs) and learn to spot phishing emails. And you adopt OPSEC when you choose to use Signal instead of plain unencrypted SMS.

    OPSEC is challenging. No system is 100% secure and your security and privacy is only as strong as its weakest link.

    What good is using Signal if you inadvertently install a weird app or game in your phone that could actually be a Trojan horse that hackers or criminals can use to gain access into your chats? After all, end-to-end encryption is useless if the end, i.e., your phone, itself is compromised.

    A strong OPSEC practitioner is more paranoid than usual—constantly identifying potential vulnerabilities and planning ways to counter or mitigate them. But of course you only implement OPSEC to the extent needed. Using Signal between friends just to decide where to eat for dinner might be overkill. But if you are a U.S. Defense Secretary planning an attack against a foreign adversary? You need a helluva lot more than just a very secure messaging app.

    cybersecurity
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Eugene Villar

    Related Posts

    AI has done it again: Global DRAM shortage scratches heads for consumers

    December 1, 2025

    Philippine Game Show launches with promise and challenges

    December 1, 2025

    AI and English proficiency: Why Filipinos need both for the future of work

    November 27, 2025

    Most Popular

    Yes, you can still use Google on a HUAWEI phone. I tried it. Here’s what actually works

    July 29, 20254 Mins Read

    Step into tomorrow: Globe unveils Asia Pacific’s first AI-powered solar home

    December 3, 20253 Mins Read

    Philippine Game Show launches with promise and challenges

    December 1, 20255 Mins Read

    Quick Tech Gifts for 2025: Useful, thoughtful, and zero shopping drama

    December 2, 20254 Mins Read

    Here’s where you can officially buy the Nintendo Switch 2 in the Philippines (with 2 years warranty perks to match)

    July 8, 20253 Mins Read

    ASUS ROG Xbox Ally X in-depth review : A whole lot of power, but what is an Xbox?

    November 21, 20257 Mins Read

    Latest

    AI firms under fire as DDoS attacks surge amid global scrutiny — Cloudflare

    By Dawn SolanoDecember 4, 20252 Mins Read

    Step into tomorrow: Globe unveils Asia Pacific’s first AI-powered solar home

    By PhilSTAR Tech TeamDecember 3, 20253 Mins Read

    HONOR Philippines continues to expand operations in Manila, opens bigger new headquarters

    By PhilSTAR Tech TeamDecember 3, 20251 Min Read

    IQOS advances smoke-free vision with the launch of ILUMA i in the Philippines

    By PhilSTAR Tech TeamDecember 3, 20253 Mins Read

    Designed for every student: Apple marks 40 years of accessibility

    By Lia EspinaDecember 3, 20252 Mins Read

    Ninja Shark FlexBreeze review: The fan that basically wants to be everywhere at once

    By Lia EspinaDecember 3, 20255 Mins Read
    Copyright © 2025 Philstar Tech | Powered by The Philippine STAR

    Type above and press Enter to search. Press Esc to cancel.