Home » Articles » Here’s some tips for using Signal as safely as possible
Click Here To Hide Tor

Here’s some tips for using Signal as safely as possible

A few weeks ago, we wrote about how Signal was one of the better encrypted messaging applications for mobile devices. In the article, it was mentioned that no matter how secure you think your platform is – there’s always a weak link. More often than not, user error plays a major key in how weak that link is. An article was published by The Intercept_ yesterday that points out a few extra steps one can take to further protect themselves while using Signal. I’ll run through their list briefly. This list is fairly straightforward, and if you’re not a newcomer to operation security or the ins-and-outs of Signal, this write-up probably won’t provide too much insight.


If you’re on Android:

  • Set a passcode. No need to go into detail on this one. You all know how to set passcodes. The Intercept_ has a great bit on Touch ID/fingerprint sensors that I’ll stick at the bottom of the article, but I would completely avoid using patterns or four digit pin-codes.
  • Encrypt your phone’s storage. It’s default on iOS, but it’s a lot easier to forget about storage encryption as it’s often “hidden” within settings. It’s not really hidden, but it’s nested a little bit. Settings → Security → “Encrypt Phone.” It takes as long as an hour and I believe your phone needs to be plugged into a power source. There’s no reason not to have your phone encrypted if you’re security conscious.
  • Install updates promptly. I can’t entirely agree with this one. Or at least the promptly part. I remember several incremental bug-patching updates that caused more issues than they fixed. I would recommend waiting until someone else is able to test the update.

If you’re on iOS:

  • Set a passcode. See the Android passcode section. There’s no difference in function. Avoid four digit pins like the plague though. I’ll briefly touch on Touch ID at the bottom of this article.
  • Install updates promptly. Again, see above. I would generally say that iOS is by default somewhat more secure than Android, but when it comes to updates, I’m not so sure.

The next category is fairly similar to the first one – it helps prevent people who have physical access to you phone, whether innocent or law enforcement, from snooping or extracting data.

Hide Signal Messages on Your Lock Screen

If you’re using Android:

  1. Open the Settings app, and under “Device” > “Sound & notification” select “When device is locked.”
  2. The options are “Show all notification content,” “Hide sensitive notification content,” or “Don’t show notifications at all.” I recommend you choose “Hide sensitive information content” — this way you’ll still be notified when you get a Signal message, but you’ll have to unlock your phone to see who it’s from and what it says.(source)

If you’re using an iPhone

  1. Open the Signal app and click the gear icon in the top-left to get to Signal’s settings. Under “Notifications” > “Background Notifications,” tap “Show.”
  2. The options are “Sender name & message,” “Sender name only,” or “No name or message.” I recommend you choose “No name or message” — this way you’ll still be notified when you get a Signal message, but you’ll have to unlock your phone to see who it’s from and what it says.
  3. To completely remove Signal notifications from your iPhone’s lock screen, open the Settings app, tap “Notifications,” scroll down to the list of apps, and tap Signal. From here you can turn off “Show on Lock Screen.”(source)

Verifying Identities

This is my favorite part as it encompasses the entire purpose of having a secure messaging app like Signal. I use Signal with a handful of contacts and one of them is admittedly security naive – he had no idea that man-in-the-middle attacks were still a threat. One of the the key functions of Signal is how easy it is to verify the identity of the party you’re communicating with. Here’s how:

Verify your phone contacts.

“It’s easy to verify the security of phone calls on Signal, but you have to verify every call.

For each call, the Signal app displays two words on the callers’ phone screens. In the screen shot below, for example, each screen shows the words “shamrock paragon.” Juliet and Romeo read these words to one another; if the words are the same, and they recognize one another’s voices, the call is secure. If the words are different, someone is attacking the encryption in the call and you should hang up and try calling again, but this time from a different internet connection.

It’s not required, but a popular convention is for the receiver to answer the phone by reading the first word, as in, “Shamrock?” And the caller to respond with the second word, as in, “Paragon.”

Verify your text contacts.

It’s more complicated to verify the security of Signal text chats, but once you’ve verified a text chat correspondent, you won’t have to re-verify them again until they get a new phone or re-install Signal.

Each person you text with in Signal has something called an identity key. When Juliet sends Romeo a message for the first time, her Signal app downloads a copy of his identity key and stores it on her phone and visa versa. So long as these identity keys are valid — the key that Juliet has stored for Romeo is actually Romeo’s real key and not some attacker’s key — then the messages they send to each other are secure.

Because it’s unlikely that anyone is trying to attack your encrypted messages the very first time you send a contact a message, Signal automatically trusts the identity key that it downloads. This makes Signal easy to use: All you need to do to have an encrypted conversation is send someone a message, and that’s it. But if you discuss anything sensitive, you still might want to confirm.

To verify the identity key, you first navigate to the verification screen.

If you’re using Android:

  • Open the Signal app and tap on a conversation to open it
  • Tap the contact’s name and phone number at the top of the screen
  • Tap “Verify identity”

If you’re using an iPhone:

  • Open the Signal app and tap on a conversation to open it
  • Long-press the contact’s name at the top of the screen until the verification screen appears


Verifying a Text Contact in Person

If you are using Signal to communicate with someone who you can meet up with in real life, you have another method of verifying a contact’s identity. There’s an automated method of scanning each user’s QR codes and a more painstaking solution where you can compare each key by looking them both over to spot differences. Obviously scanning a QR code is easier. The Intercept_ lays it out in an understandable fashion.

If you’re using Android:

  • To be verified, tap the barcode icon in the top-right of the verification screen and select “Display your QR code” (you may be prompted to install the Barcode Scanner app the first time you do this; it is safe to install).
  • To verify someone else, tap the barcode icon on the verification screen and choose “Scan contact’s QR code,” and then point your camera at the contact’s QR code.

If you’re using an iPhone:

  • To be verified, tap the QR code icon on the verification screen.
  • To verify someone else, tap the camera icon on the verification screen, and then point the iPhone camera at the person’s QR code.

When you successfully verify a contact, Signal should pop up a message that says, “Verified!”

Remotely verifying a contact.

This is one that people overlook fairly often; if you’re trying to verify your contact is who he or she says they are, sending your key over a Signal text message is not a good idea. Here’s what they wrote:

If you can’t meet up in person, you can still verify that you have the right identity key by comparing fingerprints — however, it’s kind of annoying.

You need to share your fingerprint with your contact using some out-of-band communication channel — that is, don’t share it in a Signal message. Instead, share it in a Facebook message, Twitter direct message, email, or phone call. You could also choose to share it using some other encrypted messaging app, such as WhatsApp or iMessage. (If you’re feeling paranoid, a phone call is a good option; it would be challenging for an attacker to pretend to be your contact if you recognize their voice.)

Once your contact gets your fingerprint, they need to navigate to the verification screen and compare, character by character, what you sent them with what they see. If they match, your conversation is secure.

Your contact should share their fingerprint with you in the same way, and you should confirm that what they sent you matches what’s on your verification screen as well.

If you’re using Android, unfortunately there’s no way to copy your own fingerprint to your phone’s clipboard to paste into another app. If you want to share it using another app on your phone, you’ll have to manually type it.

If you’re using an iPhone, you can copy your own fingerprint to your phone’s clipboard like this: Open the Signal app and click the gear icon in the top-left to get to Signal’s settings. Tap Privacy, then tap Fingerprint.

Verify your contact after they get a new phone

Last but not least, they talk about verifying a user’s identity after they purchase or switch to a new device. This one is fairly important as well and has been an issue in my situation as I switch between Android and iOS fairly often, using the same number. This change shows up to the contact you’ve been conversing with and lets them know that your identity changed. This most likely points to a user getting a new phone or reinstalling the app – but there’s the slight chance it could be law enforcement trying to put their nose where it probably doesn’t belong.

But when you do see a warning telling you that they keychain of of the person you are communication with has changed, you need to go through the process of verifying a text contact, as detailed in the previous section.

It’s worth pointing out a bit about passwords that The Intercept_ wrote in an article about the FBI’s back-door strategy in the FBI’s case against Apple.

Don’t use Touch ID to unlock your phone. Your attacker doesn’t need to guess your passcode if she can push your finger onto the home button to unlock it instead. (At least one court has ruled that while the police cannot compel you to disclose your passcode, they can compel you to use your fingerprint to unlock your smartphone.)

Source: The Intercept

Recommended Reading: A Brief Comparison of Secure Messaging Apps



  1. behind_the_attacker

    Hilarious but reading here nobody mentioned Windows Phone OS

  2. Lol,I guess it’s not even available for the Window’s OS

  3. Signal used to be called Signal & didn’t need fuck all access to run… now it’s called Signal Massaging system & it wants access to so much I have to SCROLL down to see ’em all :::(camera, location, numbers I dial, history of this,that & the other thing + blablabla…

    So my question is: WTF?

    Is it still safe to use Signalmessageingsystem? or should we now switch to… ???

  4. In the end, if you are using a Windows Phone, and have need of these kind of secure features, you’re doing it all wrong.

Leave a Reply

Your email address will not be published. Required fields are marked *


Captcha: *