Encrypted Messaging Apps (Signal, Wire)

From Resist Together Wiki

Encrypted Messaging Apps (Signal, Wire)[edit | edit source]

Private communication tools for activists, organizers, and journalists.

Overview[edit | edit source]

Encrypted messaging apps are essential tools for secure communication. They use end-to-end encryption (E2EE) to protect messages so that only the sender and intended recipient can read them. Popular options like Signal and Wire offer free, open-source solutions that are widely trusted in the activist and security communities.

However, it’s important to understand that **no tool is completely invulnerable**. Encryption protects content, but apps can still expose metadata, have legal vulnerabilities, or even contain undiscovered backdoors.

Key Apps[edit | edit source]

  • Signal:
    • Free, open-source, supports text, voice, video, and group chats
    • Uses the Signal Protocol (also used by WhatsApp and Facebook Secret Chats)
    • Known for minimal metadata retention
    • Supports disappearing messages, screen security, registration lock
  • Wire:
    • End-to-end encrypted chats and calls
    • Open-source and supports team collaboration features
    • Can be self-hosted by organizations
  • Session:
    • Decentralized and anonymous, based on Signal fork
    • No phone number required
  • Threema:
    • Swiss-based, paid app that doesn’t require email or phone number
    • Stores messages only on device

Use Cases in Activism[edit | edit source]

  • Planning direct actions or organizing events
  • Sharing sensitive documents or information securely
  • Communicating between teams or cells without external visibility
  • Coordinating during protests or raids when trust is crucial

Important Disclaimers[edit | edit source]

  • **No messaging app is 100% safe**:
 * Some encrypted apps have shared user data when legally compelled (e.g., IPs, phone numbers, contacts)
 * Metadata (who, when, where) is often not encrypted and can be revealing
 * Vulnerabilities and backdoors can exist — either by accident or intent
  • **Don’t rely solely on the app’s marketing**:
 * Evaluate apps based on independent audits and community trust
 * Stay updated on known vulnerabilities and controversies
  • **Legal systems can still compel compliance**:
 * Even if messages are encrypted, user registration or contact data may be logged or seized
 * Secure deletion and session hygiene are also critical

Safer Practices[edit | edit source]

  • Use strong passcodes and enable disappearing messages
  • Limit group sizes and rotate keys periodically
  • Avoid syncing backups to cloud services
  • Turn off link previews, contacts syncing, and typing indicators where possible
  • Don’t use your primary SIM or identity when setting up secure comms

Limitations[edit | edit source]

  • Encrypted apps may be blocked or flagged in some countries
  • Centralized services (like Signal) may go down or be targeted
  • Misuse (e.g., screenshots, forwarding) can still compromise secure chats

Related Topics[edit | edit source]

Resources and Further Reading[edit | edit source]

Legal Disclaimer[edit | edit source]

This content is for educational use. Encrypted messaging reduces risk but does not guarantee total privacy or immunity from surveillance. Always evaluate tools critically, stay informed on security developments, and combine technical and behavioral defenses for real-world safety.