Close Menu
Stratnews GlobalStratnews Global
    Facebook X (Twitter) Instagram
    Trending
    • YMTC Expansion Plans Boost Chip Output
    • Apple RAM Shortage Hits Mac Mini And Mac Studio
    • China Dialect Surveillance Fears Rise Over WeChat Plan
    • Mythos AI Threat Sparks Banking Cybersecurity Fears
    • Germany Fuel Relief Plan Eases Iran War Price Shock
    • Cybersecure Drones Redefine India’s Battlefield Edge
    • Hybrid Propulsion Boost For India-UK Aviation Project
    • Soyuz-5 Rocket Ready For Russia Space Missions
    • Support Us
    Stratnews GlobalStratnews Global
    Write for Us
    Tuesday, April 14
    • Space
    • Science
    • AI and Robotics
    • Industry News
    • Support Us
    Stratnews GlobalStratnews Global
    Home » Encrypted App Signal at Centre of US Security Controversy

    Encrypted App Signal at Centre of US Security Controversy

    Aditya LenkaBy Aditya LenkaMarch 26, 2025Updated:March 26, 2025 World No Comments3 Mins Read
    Signal

    Signal Messaging App at the Centre of US Security Breach

    Top officials from the Trump administration reportedly used the encrypted messaging app Signal to share sensitive military plans, inadvertently adding a journalist to their conversation. This incident has led Democratic lawmakers to demand a congressional investigation into the security breach.

    Under US law, mishandling classified information can be a criminal offence. However, it remains unclear whether any legal provisions were violated in this case.

    How Secure Is Signal?

    Signal is an open-source, fully encrypted messaging service that operates on centralised servers managed by Signal Messenger. Unlike other messaging apps, Signal does not store user conversations, contacts, or metadata. Instead, messages remain on users’ devices, with an option to automatically delete them after a set period.

    The app does not use government encryption, nor is it hosted on government servers. It also avoids tracking user data or displaying ads. Users can enhance security by hiding their phone number and verifying messages through an additional safety number.

    Cybersecurity expert Rocky Cole highlighted that while Signal itself is secure, the real risk comes from vulnerabilities in mobile devices. “If the phone itself isn’t secure, all the Signal messages on that device can be read,” he explained.

    How Does Signal Work?

    Signal provides end-to-end encryption for messages, voice calls, and video chats, ensuring that even the service provider cannot access user communications. It is available on both smartphones and computers and requires a phone number for registration.

    Unlike many other messaging services, Signal does not track or store user data. Its open-source nature allows security experts to verify its encryption methods and ensure its reliability.

    Signal’s president, Meredith Whittaker, defended the app’s security, calling it “the gold standard in private communications.” She also noted that WhatsApp uses Signal’s cryptographic technology to secure its messages.

    Who Founded and Uses Signal?

    The app was created in 2012 by entrepreneur Moxie Marlinspike. In 2018, Marlinspike and WhatsApp co-founder Brian Acton launched the non-profit Signal Foundation, which now oversees the app. Acton, who left WhatsApp in 2017 due to concerns over data privacy and advertising, provided $50 million in initial funding for the company. The company has stated that it is not affiliated with any major tech firms and will never be acquired by one.

    It has grown from a niche app used by privacy advocates and activists to a widely trusted platform for journalists, government agencies, and organisations. In 2021, concerns over WhatsApp’s updated privacy terms led to a surge in Signal’s user base, as many sought an alternative that prioritised data security.

    Reuters includes Signal as one of its recommended tools for whistleblowers, though it acknowledges that no system is entirely secure. The European Commission and the US Senate have also approved its use for official communications.

    Despite its reputation for secure messaging, cybersecurity analyst Ben Wood expressed doubts about its suitability for handling national security discussions. This concern follows revelations that top Trump aides used the app to discuss military strikes on Yemeni Houthi militants, leading to the current security controversy.

    With inputs from Reuters

    Author

    • Aditya Lenka
      Aditya Lenka

      A multi-faceted professional with a diverse range of skills and experiences. He currently works as a Producer, Digital Marketer, and Journalist for several well-known media outlets, namely StratNewsGlobal, BharatShakti, and Interstellar. With a passion for storytelling and a keen eye for detail, Aditya has covered a wide range of topics and events across India, bringing a unique perspective to his work.

      When he's not busy producing content, Aditya enjoys exploring new places and cuisines, having traveled extensively throughout India. He's also an avid writer and poet, often penning his thoughts and musings in his free time. And when he wants to unwind and relax, Aditya spends time with his two loyal companions, Zorro and Pablo, his beloved dogs.

      Aditya's dynamic personality and varied interests make him a unique individual, always eager to learn and experience new things.

      View all posts
    Featured
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit Telegram WhatsApp
    Aditya Lenka
    Aditya Lenka

      A multi-faceted professional with a diverse range of skills and experiences. He currently works as a Producer, Digital Marketer, and Journalist for several well-known media outlets, namely StratNewsGlobal, BharatShakti, and Interstellar. With a passion for storytelling and a keen eye for detail, Aditya has covered a wide range of topics and events across India, bringing a unique perspective to his work.When he's not busy producing content, Aditya enjoys exploring new places and cuisines, having traveled extensively throughout India. He's also an avid writer and poet, often penning his thoughts and musings in his free time. And when he wants to unwind and relax, Aditya spends time with his two loyal companions, Zorro and Pablo, his beloved dogs.Aditya's dynamic personality and varied interests make him a unique individual, always eager to learn and experience new things.

      Keep Reading

      YMTC Expansion Plans Boost Chip Output

      Apple RAM Shortage Hits Mac Mini And Mac Studio

      China Dialect Surveillance Fears Rise Over WeChat Plan

      Mythos AI Threat Sparks Banking Cybersecurity Fears

      Germany Fuel Relief Plan Eases Iran War Price Shock

      Cybersecure Drones Redefine India’s Battlefield Edge

      Add A Comment
      Leave A Reply Cancel Reply

      Anti Drone System (CUAS)
      Latest Posts

      YMTC Expansion Plans Boost Chip Output

      April 14, 2026

      Apple RAM Shortage Hits Mac Mini And Mac Studio

      April 14, 2026

      China Dialect Surveillance Fears Rise Over WeChat Plan

      April 14, 2026

      Mythos AI Threat Sparks Banking Cybersecurity Fears

      April 14, 2026

      Germany Fuel Relief Plan Eases Iran War Price Shock

      April 14, 2026

      Cybersecure Drones Redefine India’s Battlefield Edge

      April 13, 2026

      Hybrid Propulsion Boost For India-UK Aviation Project

      April 13, 2026

      Soyuz-5 Rocket Ready For Russia Space Missions

      April 13, 2026

      AI Extremism Tool To Guide Users To Support

      April 13, 2026

      Gaganyaan IADT-02 Test Boosts Mission Readiness

      April 11, 2026

      Subscribe to News

      Get the latest sports news from NewsSite about world, sports and politics.

      • Astronomical Events
      • Space Missions
      • Industry News
      • Science
      StratNewsGlobal Tech
      Facebook X (Twitter) Instagram LinkedIn YouTube
      © 2026 StratNews Global, A unit of BharatShakti Communications LLP
      • About Us
      • Contributors
      • Copyright
      • Contact
      • Write for Us

      Type above and press Enter to search. Press Esc to cancel.