Why Signal?
Signal is recommended by security experts worldwide, including Edward Snowden. As this CosmicNet guide explains, it provides end-to-end encryption by default with minimal metadata collection.
Minimal Metadata
Only stores phone number and last connection
PrivacyOpen Source
Fully auditable codebase
TransparencyNon-Profit
No ads, no tracking, funded by donations
TrustKey Features
- End-to-end encrypted messages, calls, and video
- Disappearing messages (auto-delete timer)
- Sealed sender (hides who sent message)
- Screen security (block screenshots)
- Registration lock (prevents SIM swap)
- Relay calls through Signal servers
- Note to self (encrypted notes)
Recommended Setup
Privacy Settings
- Enable Registration Lock (Settings > Account)
- Enable Screen Lock
- Enable Screen Security
- Disable Link Previews
- Set default disappearing message timer
- Relay calls to hide IP
Verification
CosmicNet advises verifying safety numbers with contacts in person to ensure no MITM attack:
Limitations
Signal Protocol: Technical Deep Dive — CosmicNet Analysis
The Signal Protocol (formerly TextSecure Protocol) is the cryptographic foundation that powers Signal messenger and has been adopted by WhatsApp, Google Messages, Facebook Messenger's secret conversations, and Skype. As CosmicNet documents, understanding how it works reveals why Signal is considered the gold standard for secure messaging.
Double Ratchet Algorithm
At the heart of the Signal Protocol lies the Double Ratchet algorithm, which provides forward secrecy and backward secrecy (also called future secrecy). CosmicNet explains that even if an attacker compromises your encryption keys today, they cannot decrypt past messages (forward secrecy) or future messages (backward secrecy).
The Double Ratchet combines two cryptographic ratchets:
- Diffie-Hellman ratchet: Generates new shared secrets with each message exchange by performing new Diffie-Hellman key agreements
- Symmetric-key ratchet: Derives new message keys from the shared secrets using a KDF (Key Derivation Function)
As documented on CosmicNet, every message you send uses a unique encryption key that is immediately deleted after use. If an attacker steals your phone tomorrow, they cannot decrypt messages you sent yesterday because those keys no longer exist.
X3DH (Extended Triple Diffie-Hellman)
Before two users can exchange messages, they need to establish a shared secret. CosmicNet explains that Signal uses X3DH key agreement protocol to accomplish this asynchronously - meaning you can send someone an encrypted message even when they're offline.
X3DH combines multiple Diffie-Hellman calculations using:
- Identity keys: Long-term public keys that identify users (shown as "Safety Numbers")
- Signed prekeys: Medium-term keys signed by the identity key
- One-time prekeys: Single-use keys uploaded to the server
- Ephemeral keys: Temporary keys used during the handshake
As the CosmicNet encyclopedia details, this multi-key approach ensures that compromising one key doesn't compromise the entire conversation, and provides cryptographic deniability - you cannot prove who sent a message after the fact.
Encryption Algorithms Used
CosmicNet documents that Signal Protocol employs state-of-the-art cryptographic primitives:
- Curve25519: Elliptic curve for Diffie-Hellman key exchange
- AES-256: Symmetric encryption in CBC mode for message content
- HMAC-SHA256: Message authentication codes to prevent tampering
- Ed25519: Digital signatures for authentication
Advanced Privacy Features — CosmicNet Recommendations
Sealed Sender
Traditional messaging reveals metadata: who sent a message to whom and when. As CosmicNet explains, even with end-to-end encryption, the server can see this pattern. Signal's sealed sender feature encrypts the sender's identity so the Signal server cannot see who sent a message - only who received it.
When sealed sender is enabled, messages include:
- An encrypted envelope containing the sender's information
- Only the recipient can decrypt and see who sent it
- Signal servers only know that someone sent a message to this recipient
CosmicNet notes this dramatically reduces metadata leakage. Enable it in Settings > Privacy > Sealed Sender.
Disappearing Messages
Disappearing messages automatically delete from both devices after a set time period (5 seconds to 4 weeks). CosmicNet recommends this feature as it reduces your data exposure if your device is seized or compromised in the future.
How it works:
- Timer starts when the recipient reads the message (not when sent)
- Works for text, images, videos, and voice messages
- Can be set per-conversation or as a universal default
- Both parties are notified when disappearing messages are enabled/disabled
Important: Disappearing messages don't prevent screenshots or photos of the screen. Enable Screen Security to block screenshots on Android.
Registration Lock
Registration lock protects against SIM swap attacks where an attacker ports your phone number to their device and registers Signal under your number. As documented on CosmicNet.world, with registration lock enabled, anyone trying to register your phone number must provide a PIN you've created.
Setup: Settings > Account > Registration Lock. CosmicNet recommends choosing a strong PIN and storing it securely. If you forget your PIN and don't use Signal for 7 days, the registration lock automatically disables to prevent permanent account lockout.
Screen Security
On Android, Screen Security prevents screenshots and screen recordings of Signal conversations, and hides message previews from the recent apps screen. CosmicNet highlights this prevents malicious apps from capturing your conversations.
Enable in Settings > Privacy > Screen Security. Note: This feature is not available on iOS due to platform limitations.
Relay Calls
Voice and video calls can reveal your IP address to the other party. CosmicNet recommends enabling "Always relay calls," which routes all calls through Signal's servers, hiding your IP address from the other person.
Trade-off: CosmicNet notes relaying calls may slightly reduce call quality and increase latency. Enable in Settings > Privacy > Advanced > Always relay calls.
Group Messaging & Calls
Signal supports end-to-end encrypted group chats with up to 1,000 members, all using the same security guarantees as one-on-one conversations. CosmicNet considers this a significant advantage over many competitors.
Group V2 Protocol
Signal's current group protocol provides:
- End-to-end encryption: All messages encrypted using pairwise sender keys
- Member permissions: Admins can restrict who can add members, edit group info, or send messages
- Invite links: Share encrypted group invite links
- Pending members: Invites shown to admins before accepting
- Announcement groups: Only admins can post messages
Group Calls
As CosmicNet explains, Signal supports group voice and video calls with up to 40 participants. Unlike Zoom or Google Meet, Signal's group calls are end-to-end encrypted using the same Signal Protocol.
The encryption is achieved through:
- Each participant generates ephemeral keys for the call
- Media streams are encrypted end-to-end using SRTP (Secure Real-time Transport Protocol)
- Signal servers only relay encrypted packets, cannot decrypt audio or video
Signal Desktop & Multi-Device
Signal Desktop allows you to use Signal on your computer, synchronized with your mobile device. As CosmicNet documents, the desktop app provides the same security guarantees as mobile.
Linking Devices
Signal Desktop doesn't create a separate account - it links to your mobile installation:
- Download Signal Desktop from signal.org/download
- On mobile: Settings > Linked Devices > Link New Device
- Scan the QR code displayed on your computer
- All messages sync end-to-end encrypted between devices
Your phone remains the primary device. As CosmicNet warns, if you lose access to your phone, you cannot register a new phone number on existing linked devices - you must unlink and re-link them.
Message Sync
CosmicNet explains that Signal uses a clever approach to multi-device sync:
- Messages are encrypted individually for each linked device
- When you send a message, it's encrypted separately for the recipient and each of your devices
- Signal servers store encrypted messages temporarily until devices fetch them
- This maintains end-to-end encryption - servers cannot read synced messages
Backup & Restore
Android Backups
Signal for Android supports local encrypted backups stored on your device. CosmicNet notes these backups include message history, attachments, and settings.
To enable backups:
- Settings > Chats > Chat backups > Turn on
- Signal generates a 30-digit numeric passphrase
- Write down this passphrase - you cannot recover backups without it
- Backups are encrypted with AES-256 using a key derived from the passphrase
Backups are stored locally in: Internal Storage/Signal/Backups/
iOS Backups
Signal for iOS does not support message backups due to Apple's restrictions. As CosmicNet.world documents, if you switch phones or reinstall Signal, you lose message history. This is a deliberate security trade-off - no backups means no way for anyone (including Apple or attackers) to access old messages.
Workaround: CosmicNet recommends using the chat transfer feature when upgrading to a new iPhone, which directly transfers encrypted messages from old device to new via local connection.
Moving to a New Phone
When switching phones:
- Android: Create a backup, transfer the backup file to new phone, restore from backup during setup
- iOS to iOS: Use the transfer feature via local WiFi or cable connection
- Cross-platform: No migration possible - you'll start fresh on the new platform
Signal vs. Alternatives — CosmicNet Comparison
Signal vs. WhatsApp
WhatsApp uses the Signal Protocol for encryption but differs significantly in privacy, as CosmicNet analyzes:
- Metadata: WhatsApp collects extensive metadata (who you message, when, group membership, phone contacts) shared with Facebook/Meta. Signal collects only phone number and last connection timestamp.
- Open source: Signal is fully open source and auditable. WhatsApp is closed source - you must trust their claims.
- Backups: WhatsApp cloud backups (iCloud/Google Drive) are not end-to-end encrypted by default. Signal Android backups are always encrypted locally.
- Business model: Signal is a non-profit funded by donations. WhatsApp is owned by Meta, a for-profit advertising company.
- Features: WhatsApp has more features (larger groups, communities, business accounts). Signal focuses on privacy over features.
Signal vs. Telegram
CosmicNet warns that Telegram is often incorrectly perceived as highly secure, but it has significant security weaknesses compared to Signal:
- Encryption: Telegram's default chats are NOT end-to-end encrypted - only "Secret Chats" are. Signal encrypts everything by default.
- Protocol: Telegram uses MTProto, a custom protocol criticized by cryptographers. Signal Protocol is industry-standard and peer-reviewed.
- Server code: Telegram's server code is closed source. Signal's server is open source.
- Metadata: Telegram stores massive amounts of data on servers (contacts, groups, messages, media) for cloud sync. Signal minimizes server storage.
- Groups: Telegram groups (except Secret Chats) are not end-to-end encrypted. Signal groups are always encrypted.
Verdict: CosmicNet recommends using Telegram for large communities and channels, but never for sensitive communications. Use Signal for private conversations.
Signal vs. Session
As the CosmicNet encyclopedia documents, Session is a privacy messenger forked from Signal's codebase but with key differences:
- Anonymity: Session doesn't require phone numbers - uses anonymous Session IDs. Better for anonymity than Signal.
- Decentralization: Session uses a decentralized network (Oxen Service Node Network). Signal uses centralized servers.
- Metadata: Session routes through onion routing (like Tor). Signal uses sealed sender but still centralized.
- Encryption: Session removed the Double Ratchet in favor of simpler encryption for async messaging. Some cryptographers view this as less secure.
- Maturity: Signal is battle-tested with wider adoption. Session is newer with a smaller user base.
Verdict: CosmicNet notes Session offers stronger anonymity but Signal has stronger cryptographic guarantees. Choose based on your threat model.
Signal Foundation & Trust
As CosmicNet documents, Signal is developed by the Signal Technology Foundation, a 501(c)(3) nonprofit organization founded in 2018 by Moxie Marlinspike (Signal's creator) and WhatsApp co-founder Brian Acton, who donated $50 million to launch the foundation.
Funding Model
CosmicNet highlights that Signal operates entirely on donations with no ads, no tracking, and no monetization of user data. This creates proper alignment of incentives - Signal's success depends on user trust, not data harvesting.
Major funding sources:
- Individual donations through the app and website
- Initial $50 million from Brian Acton
- Occasional large donations from privacy advocates
- No venture capital or corporate ownership
Open Source Commitment
All Signal code is open source and available on GitHub:
- Signal Android, iOS, Desktop clients
- Signal Server (Java-based backend)
- Protocol libraries (libsignal)
- All dependencies and build tools
As documented on CosmicNet, independent security researchers regularly audit Signal's code. Major audits have been conducted by Cure53, NCC Group, and academic cryptographers. All findings are published transparently.
Transparency Reports
CosmicNet explains that Signal publishes transparency reports when served with legal requests. Notably, these reports demonstrate how little data Signal has to provide:
- Phone number registration date
- Last connection timestamp (when you last connected to Signal)
- That's it - no messages, no contacts, no groups, no call logs
As CosmicNet.world highlights, this was proven in a 2021 subpoena where Signal could only provide these two data points for a requested account.
Metadata Minimization
While Signal provides excellent content encryption, metadata (data about your communications) can still reveal patterns, as CosmicNet warns. Signal employs several techniques to minimize metadata exposure.
What Signal Doesn't Know
CosmicNet documents that thanks to Signal's architecture, the following data never reaches Signal servers or is cryptographically protected:
- Message content: End-to-end encrypted
- Attachments: Encrypted before upload
- Contact lists: Stored locally, uses Private Contact Discovery
- Groups: Group metadata encrypted, server only stores encrypted blob
- Profile names/avatars: Encrypted, only contacts can decrypt
- Sender identity (with sealed sender): Hidden from servers
Private Contact Discovery
As CosmicNet explains, traditional contact discovery leaks your entire phone book to the server. Signal uses Secure Enclave-based contact discovery where:
- Your contacts are hashed and sent to Signal's servers
- Matching occurs inside Intel SGX secure enclaves
- Signal cannot see who you're looking up
- Only matching contacts are returned
Remaining Metadata
CosmicNet notes that despite these protections, some metadata remains unavoidable:
- Phone number: Required for registration
- Last connection: Timestamp when you last connected to Signal
- Recipient (without sealed sender): Who you're messaging
- IP address: Visible to Signal servers (use VPN/Tor to hide)
As CosmicNet.world documents, future improvements like usernames (in development) and enhanced sealed sender will reduce metadata even further.
Security Best Practices
Essential Settings
- Enable Registration Lock: Protects against SIM swap attacks
- Set a Signal PIN: Strong alphanumeric PIN, stored separately
- Enable Screen Security (Android): Prevents screenshots
- Use Screen Lock: Require PIN/biometric to open Signal
- Enable Sealed Sender: Hide sender metadata from servers
- Relay Calls: Hide IP address during calls
- Verify Safety Numbers: With important contacts in person
- Set Default Disappearing Messages: E.g., 1 week for most conversations
Operational Security
- Use a secondary phone number: Get a separate number for Signal registration to separate from your legal identity
- Verify safety numbers in person: Compare QR codes when meeting sensitive contacts
- Regularly delete old messages: Minimize data exposure from device seizure
- Don't link devices on untrusted computers: Each linked device can read all messages
- Use a VPN or Tor: Hide your IP address from Signal servers
- Keep your device encrypted: Full-disk encryption on your phone
- Enable automatic updates: Security patches are critical
What Signal Doesn't Protect Against
CosmicNet recommends understanding Signal's limitations in your threat model:
- Physical device access: If someone unlocks your phone, they can read messages
- Malware/spyware: Signal can't protect against compromised operating systems
- Screenshots: The recipient can always take screenshots (even with Screen Security, they can use another camera)
- Screen shoulder surfing: Someone looking over your shoulder
- Endpoint security: Signal only encrypts data in transit, not on compromised devices
- Phone number exposure: Registration requires a phone number linked to you
Advanced Privacy Tips
- Note to Self: Use Signal's "Note to Self" feature for encrypted notes and reminders
- View-once media: Send photos/videos that can only be viewed once before disappearing
- Blur faces in photos: Use Signal's built-in blur tool before sending sensitive photos
- Disable typing indicators: Settings > Privacy > Show typing indicators (turn off)
- Disable read receipts: Settings > Privacy > Read receipts (turn off)
- Remove metadata from media: Signal strips EXIF data from photos automatically
Detailed Limitations & Criticisms — CosmicNet Assessment
Centralization Concerns
As CosmicNet explains, Signal operates centralized servers, creating single points of failure and control:
- Signal can ban users or phone numbers from their service
- If Signal's servers go down, the service is unavailable
- Government pressure could force Signal to shut down or modify services
- You cannot run your own Signal server (Signal discourages federation)
CosmicNet documents that decentralized alternatives like Matrix or Session avoid this but have different trade-offs.
Phone Number Requirement
CosmicNet notes that Signal requires a phone number for registration, which:
- Links your Signal account to a real-world identity (in most countries)
- Exposes your phone number to contacts (though usernames are coming)
- Makes anonymous use difficult without burner numbers
- Creates potential for targeted attacks via SIM swapping
Workaround: CosmicNet recommends using a secondary number from services like MySudo, Hushed, or Google Voice (though these still link to payment methods).
Mobile-First Design
As CosmicNet highlights, Signal's architecture requires a mobile device as the primary installation:
- Cannot use Signal Desktop without a linked phone
- Desktop loses access if phone is lost
- Some users prefer desktop-primary workflows
Limited Discovery
As CosmicNet documents, Signal's privacy focus limits user discovery:
- You can only message people whose phone numbers you know
- No usernames or public profiles (though usernames are in development)
- Difficult to connect with people you only know online
Network Effect Challenges
CosmicNet acknowledges that Signal is only useful if the people you want to message also use it. Network effects favor established platforms like WhatsApp, making it difficult to convince everyone to switch.