I don’t see refenece in this article or any others, but how did prosecutors get access to SBF’s Signal messages?

Was it simply a court order that he unlock his phone (and agreed), or a codefendant who flipped to the prosecution and handed over the thread?

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    9 months ago

    One of the co-defendends in the group chat starting taking screen shots when the writing was on the wall, I believe that is what I read earlier

    The threat model guides say it many times, but its easy to forget, even if signal works perfectly the people your talking to can compromise you… by taking screen shots, using a second phone to take photos of the first phone, hooking up a audio recorder to record voice conversations, etc.

    We also saw this behavior in some of the political trials post trump. Signal + screenshots.

    https://www.cnbc.com/2023/10/19/read-the-secret-signal-messages-that-could-help-put-sbf-behind-bars.html

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 months ago

      Honestly you can just use a modified signal client that doesn’t delete messages. When you send something to someone you need to trust them.

  • sadreality@kbin.social
    link
    fedilink
    arrow-up
    1
    ·
    9 months ago

    Encryption can’t protect you from the counterparty dumping the chat log to the feds for “protection”