Hacker News new | past | comments | ask | show | jobs | submit login
[flagged] Europa.eu domain name contacted through Signal Helper (signalusers.org)
77 points by decrypt on Nov 9, 2021 | hide | past | favorite | 21 comments



I don't know, but if someone would paste a link to such domain in their signal client, would it be this helper which fetches it to render a preview?



Genuine Signal app wouldn't fetch link previews from the client, it's a huge leak.


good point, but where would it fetch it from?

the only good solution I can think of is Tor


Previews are handled sender side iirc, so still from the client just no inadvertently.


Previews from sender side are prone to spoofing though.


That would be the most likely explanation I would think of.


> I just found that we shared a link pointing to a governmental domain. I cleaned every log today and retrieved the link then sent it back. The domain has been contacted again. So yes it is related to link preview.

> Thanks Stefan

From a 3 days old account.


Am I missing something or is this just a link preview? I don’t think there is any reason to spread fear or panic based on what is provided.


Looks like it is:

> I just found that we shared a link pointing to a governmental domain. I cleaned every log today and retrieved the link then sent it back. The domain has been contacted again. So yes it is related to link preview.

But I can't believe Signal devs left such a huge data leak channel in their app.


You can disable this. But just to be clear, the preview is from the sender. I think it’s reasonable to assume that someone sending a link is willing to click the link, no?

(There’s also a “privacy-preserving proxy” in the middle, FWIW: https://signal.org/blog/i-link-therefore-i-am/.)


If the preview comes from a proxy why does the helper perform a dns lookup or hit on that domain ?

> I think it’s reasonable to assume that someone sending a link is willing to click the link, no?

I think it's reasonable in most cases but my assumption was that Signal was doing the clicking for me discreetly from their servers but reading their blog post now I think I understand it's only for some domains.


Good question. Without looking into it, one theory I might have is that the client does the DNS resolution and then just proxies the HTTP request through Signal's servers.

In general, I find the privacy implications of either solution a bit hard to reason about. Having Signal proxy the requests leaks to the website that someone is sending a link to the site via Signal, but not who is sending the link. If the link itself is sufficiently unique, though, that could be an issue.

On the other hand, if someone sends me a link and I in turn send it on (without clicking) via Signal, and doing so causes my client IP to be revealed, that seems sorta bad. So the proxy makes sense here.

/shrug

I don't think any of the risks here are huge, and the options all have tradeoffs, which I guess is why you can disable the feature.


Perhaps IP 147.67.37.17 is used for shared hosting and the reverse DNS lookup from the Firewall software returned a misleading domain.


This IP reports back into ns1bru.europa.eu. This looks like it could be the Signal link preview stack:

https://hub.packtpub.com/signal-introduces-optional-link-pre...


The IP has no reverse name configured:

    > nslookup 147.67.37.17
    ** server can't find 17.37.67.147.in-addr.arpa: SERVFAIL
So I'm not sure where the host name from the firewall software is coming from.

I tried and got a certificate that looks like it is from the European Commission

    > curl -v https://147.67.37.17
    ...
    * Server certificate:
    *  subject: C=BE; ST=Brussels-Capital Region; L=Brussels; O=European Commission; CN=*.ec.europa.eu
    ...
It looks like this is a server from the EC and I consider it unlikely that they are using a shared hosting provider.


Not surprisingly, this turns out to have a totally benign explanation.

Still, I do think this demonstrates how hard it is for (apparently) well-meaning, somewhat-technical users to understand what their software does.

I don’t think reading over firewall logs is a very good way to ensure trust in client-side software, of course. (Aside from just being ridiculously time-consuming, there are too many easy ways to exfiltrate data. Like…sending it to the Signal servers?)

But I do sort of idly wonder, given the ever-increasing complexity of the trusted computing base, how we can make it so users who are (apparently) concerned enough to read over firewall logs can more productively evaluate trust.


If this was a spying attempt they'd surely set up a less suspicious domain instead of a subdomain

On a different note, does someone know what this firewall software is called?


It's little snitch on Mac, but I heard of a few alternatives... Typically LuLu which is made by a respected developer, and free


Looks like LittleSnitch for me


ATTEMPT NO LANDING THERE.




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: