Signal massively downloaded amid rising tensions, number one in Denmark
1d 22h ago by feddit.org/u/Novocirab in europe@feddit.org from aboutsignal.com
Granted, the part
The globally recommended app by privacy and security experts, Signal, is now being downloaded massively and tops the Danish Google Play Store
is a little ironic, but you gotta push this winning tide and then work from that.
I am from Denmark. I have spent the last 10 years fighting to get schools and government institutions to switch away from American software.
What a waste of time, when all it takes is the threat of an imperialist take-over of Greenland to actually get my fellow countrymen to finally listen and act.
Signal is still centralized US software.
It is the least evil for the ignorant technology end user.
Ignorant feels harsh, technically accurate but harsh. Yes technology permiates our lives but its such a broad term that no one can be fluent in all its aspects and most of us have to have in depth knowledge of at least one part of it to do our day jobs. We can't expect everyone to have the time to learn about the inner workings of communications infastructure.
Concerning the usability, yes. Otherwise Matrix would be the best option, it can be hosted locally.
Why do you think that? The owner of it is alt right and the fascists are using it. Why feel safe on it? Doesn’t make sense.
Problem is if they change to Signal now they are less likely to change again to something "better".
There's no better. When that hopeful better comes we will all think about it.
pretty big fan of http://delta.chat/ secure and decentralised
Is that not just chat over email? I thought it used to be, and some of the language on the site is still kind of suggestive of it, but it does sound kinda different. Maybe I'm confusing it with something else. If it's still just fancy email, I'm not sure I like that idea since email has so many privacy issues baked in deep.
i dont know much sorry, think you would want to start with https://chatmail.at/
They are supreme denialists and try to gaslight people into believing that Foward Security is a thing you don't need. I may have it installed and the ui is cute enough, but I can't even consider it hitting close to the level of security Signal employs. It's basically a toy experiment.
bummer, i had not realised that forward security was not there :/
sounds like its a while off.
https://delta.chat/en/help#pfs
I went there to read it again and their position changed recently. So it's not there, but now they claim that a design is planned to include it in the future, maybe, eventually. Which is better than before since they were really trying to tell people with manyyyy arguments why we shouldn''t need it, which was a completely insane position to have in the world we live in.
Telegram is still better, while not being ideal, of course. But at least its servers aren't located in the USA.
The ideal options are decentralized/p2p, but for now they have very few users (not many less than Signal, to be fair).
Telegram is worse. There's only pedos and russians on it, not to mention the french government having full access to the servers.
The software with encryption disabled by default, no security audits, and rampant spam is better?
E2E encryption it's not the only feature that matters. By the way, I am not promoting Telegram, I only mean that relying on US-centric infrastructure is bad because you can be disconnected away at any moment.
telegram is the absolute wirst when it comes to constant spam from scams and bullshit group chats... it's an utter cesspool.
Elaborate please.
True. I was more referring to the fact that nobody has wanted to move away from Meta, Google and Microsoft solutions because of convenience (until now).
But at least the US government can't listen in on your conversations, and if they don't know your phone number, can't block your specific communications either.
That you know of.
This is from 2020 after the news discovered that yeah actually, the US gov could read your encrypted messages. https://www.forbes.com/sites/daveywinder/2020/02/12/cia-secretly-bought-global-encryption-provider-built-backdoors-spied-on-100-foreign-governments/
Edit: how fascinating! I've been downvoted. Really makes you wonder who is pushing for this adoption of this.
You were downvoted because what you posted is completely irrelevant to Signal. The only way to read the messages is to install spyware on your phone.
Well yeah, but if you take into account theoretical vulnerabilities, then nothing is safe, including your self-hosted decentralised server (let alone your conversation partner's).
It's the fediverse, signal is sacred and will not be questioned nor criticiced, anyone else who wishes to have a non-US instant messenger gets downvoted to hell.
Wish I was joking but just look at the other guy who dared to like Telegram.
It's basically signal or matrix in here.
I personally don't use it, it's much more suspicious that other messengers get so much flak and signal is defended so fiercely... And it's also USA based.
It's the fediverse, signal is sacred and will not be questioned nor criticiced
you can question signal just as much as you want, but you’d better come with actual arguments rather than just conspiracy, because signal has counters to pretty much every claim that non-experts try to make
signal was built and is run by one of the worlds foremost security researchers and privacy activists
it uses standard encryption that is used in huge numbers of things. if there were a problem with any part of that, the world would have a much bigger problem than individual communications. the US government does not behave in a way that suggests these algorithms are compromised
it has been repeatedly audited by 3rd parties
the fact that it’s US-based is barely worth mentioning… why is that a problem? are you sure it’s not solely a knee-jerk reaction?
it’s free (so you’re not supporting the US economy), the client - and server, though that’s not important because E2EE - is FOSS (so it’s auditable and extendable by anyone: AFAIK they also ensure repeatable builds), the encryption is basically as good as it gets (they even have various protections for quantum computing), their architecture means they can’t even see metadata like senders… so, again, in this case what are you giving up by having it US-based? perhaps a little bit of soft power, perhaps an acknowledgment that in this 1 case the US produced a good product counter to their governments interests
the other guy who dared to like Telegram
because telegram is not for security or privacy conscious people, despite their marketing: they actively muddy the waters and make people less safe
their encryption is custom, written by mathematicians not cryptographers so doesn’t include features like perfect forward secrecy, replay protection, etc
and their default chat mode isn’t even e2ee - only secret chats use their custom encryption, and nobody actually uses them!
there are numerous sources documenting these problems, and plenty more
it’s okay to like telegram: i like it as a chat app, and i use it for the features it provides… but it’s not okay to say in a privacy and security context that they’re even remotely comparable
signal was built and is run by one of the worlds foremost security researchers and privacy activists
Small sidenote, but Moxie is no longer running Signal. (He's doing Confer now.)
Weren't it Signal devs who made e2e for WhatsApp? So what's the point of switching?
Signal punished their spec and WhatsApp re-implemented it, yes but critically only the messaging parts rather than all the other privacy parts
the reasons to switch basically start with WhatsApp is owned by Meta, and given that these things become more important:
- WhatsApp is closed source so it’s difficult to confirm if their implement is “correct”
- they may have the ability to extract your keys from your device somehow
- i’m not sure who is the ultimate key-holder for whatsapp: if it’s like apple, they hold your private keys and thus can decrypt anything they like (different to signal where devices transfer your keys between each other via qr codes etc)
- on that last point, i can confirm that to login with whatsapp on the browser just now my process was: enter phone number, type an 8-digit code from my phone… this could be an temporary key of some kind used to e2ee between the devices to transfer my master key or something, but i’m very suspect on this being anything more than plain text verification that meta could man in the middle
- whatsapp stores your contacts, and message metadata… that’s all i personally need to avoid it: meta doesn’t need to know who and how often i message people to add to their profile on me
meta says whatsapp is secure exactly for this reason: people think “why switch?” when it’s really about the metadata for them… they are experts and building a profile with scraps of metadata
writing a secure application is about more than technically rock-solid encryption and protocol
the reasons to switch basically start with WhatsApp is owned by Meta
So both are the US companies susceptible to backdoors and other USA shenanigans.
WhatsApp is closed source so it’s difficult to confirm if their implement is “correct”
Valid point, however I doubt that most(or any) of the people installing Signal now do it from f-droid or alternatives, so for them there's no difference, they receive whatever Google/Apple give them which may be quite different from what's in the source code.
they may have the ability to extract your keys from your device somehow
If they can then Signal can as well, right? Or more likely Google and Apple will. Same for your next points.
I mean not using anything Meta is good just because we know Meta is bad. But as I understand it any US company will have to store and provide metadata, logs, etc when the government agencies tell them to. With that context I don't see much difference between using Signal or WhatsApp apart from the "Meta bad"(which in itself is a valid reason).
susceptible to backdoors and other USA shenanigans.
that’s pretty much the major difference here: Signal is provably not back-doored:
- it’s frequently independently audited
- all their code is open, so there are plenty of eyes on it to catch shenanigans
- they have reproducible builds which means you can prove that the code that you can read is exactly the same code that produced the binary running on your device
- if you don’t know what this means, basically every time you compile the code it produces the exact same binary result
- there are people that do this automatically so that if there were different source code that created a binary - with a secret backdoor or something - it would be very obvious, and public
- given that, it’s reasonable to assume that the binary running on your device was produced using the same open code everyone can read: you don’t need to do it yourself
- whilst you can’t prove their server is the exact same as what’s in their open repos, it doesn’t really matter… the point of their architecture is that it doesn’t matter what the server is running: it could be announcing all data publicly and it’d still be secure because the encryption, security, and privacy feature are all ensured by the client
they receive whatever Google/Apple give them which may be quite different from what's in the source code.
i don’t disagree: it’d be better if we all had the time, skill, and energy to invest into auditing our own systems… but realistically nobody does, let alone people that don’t really care about privacy
with that in mind, it’s all about getting as close as possible… given signals reputation, you can be pretty sure the source code has a lot of eyes on it, and that if there were back doors found it would be news
and given reproducible builds, as i said earlier, you can (or rather, i certainly do) assume that if there were a mismatch between the binaries and the source you’d also hear about it
of course, that doesn’t stop targeted attacks by nation states, but that’s never what we talk about in personal security and privacy situations… it’s just not the threat model that most (i’d wager any) of us should be thinking about because that is not just a full time job: that is an entire teams full time job… we just aren’t being directly targeted like that, and if we are then tbh it’s all over. we protect against general surveillance… we can’t protect against zero days, physical device access, etc
If they can then Signal can as well, right?
kinda… again, reproducible builds: either of them could technically put code in their app that sends private keys to their servers somehow, but if you break it down it’s far more likely to be caught in signal than in whatsapp
more likely Google and Apple will
i’m not sure what you mean by this… sure, apple or google could send you an update to ios/android to extract data from apps, but again that seems much more likely a very large-scale attack… you can protect against this by running graphene etc which does similar reproducible builds, but in that case we aren’t talking about the app: signal is absolutely the app you would rely on if you’re going that far… you just wouldn’t ensure your hardware and OS integrity and then just skip the app integrity lol
or perhaps you mean that google or apple could send you specifically a binary of signal that’s been modified? but that’s actually not really likely because apps are signed by developers: apple and google can’t actually send you something that the developer hasn’t “approved”… sure, they control the OS so they can circumvent all the restrictions, but again that’s a massive attack, and really far beyond what’s reasonable to consider for most people (and again, that applies to both whatsapp and signal so it’s not really a point in favour of whatsapp)
But as I understand it any US company will have to store and provide metadata, logs, etc when the government agencies tell them to
absolutely correct… the point of privacy like signal does is that they hand everything over and it’s useless: the information signal themselves can extract, even by modifying their code is completely worthless. they have your IP address, phone number, some timestamps, and encrypted blobs (AFAIK they don’t store a lot of that, but that’s not provable so we should assume that it’s stored either accidentally or because of coercion)… they can see when you messaged, but not even things like who you messaged
if signals infra and private keys etc were literally handed over to the US government right now and they specifically wanted to target you personally, it’s highly unlikely they would be able to do anything particularly useful with any of that before it’s noticed, and then you can stop using signal before they actually intercept new communications (and old communications are protected, assuming you wipe the app and all its stored info before they can send you a poisoned update)
and with all of this, it doesn’t really matter where signal is based: US, China, Russia, Guam, Switzerland, Iran: doesn’t matter… the structure is built in such a way that if Signal the organisation is coerced, it’s either:
- obvious, and therefore noticed by the community at large and thus you’d hear about it
- not useful: ie all information that Signal has is provably garbage
- such a large scale that we globally have huge problems (and we do, but that’s not something you can solve)
- targeted, in which case you have big problems and whilst this may be part of it, you need to have a lot more resources to detect and solve it. this just isn’t the reality for most people
it’s about your threat model: you can’t worry about massive scale, and you can’t worry about being individually targeted… unless that is part of your threat model, in which case signal is still part of your solution (along with auditing and validating every part of the chain from hardware to OS to the apps which all require reproducibility or building from your audited source) and whatsapp fundamentally is not
Or, or...hear me out in this.. Just maybe
You're fucking wrong and there is no conspiracy to make you look bad
Crazy, I know
Italian in Denmark here.
I thank you so much for this! I am amazed at the dependence of all facets of social life and information on Meta and Google's properties.
I am cut out of my building's initiatives because I don't have a Facebook account. There are no events (such as dance events, protests, etc) published anywhere else than on Facebook's Events.
When I propose to be contacted on Signal people look at me as if I was an alien.
You are doing God's work, as a Christian would say.
Are they switching in the hope they'll get added to a group chat planning the invasion?
It was though, to be fair, that's definitely not what's the bit to blame for government officials adding the incorrect people to their own group chats.
Nope, signal.
Kinda ironic that if the danish representatives in the EU got their way with chat control, danish people wouldn't even be able to install signal (officially at least), since Signal said they would leave the EU in such a case.
I'm pretty sure this isn't irony, but rather a reaction from the population that is realizing the shit their government is doing.
That is one fucked up looking flag
greenland officially adopted it 3 hours ago (10000% real)
What's she flag equivalent of blasphemy? This is what it would look like.
Mushing two nation flags plus an app logo plus some sort of pattern overlay into a headline image is just so wrong.
Unfortunately Threema the European alternative that’s at least as secure as Signal costs money - and that one time fee is enough to send everyone to Signal.
It's also not open source.
The Threema client is open-source. Which is about the same as with Signal, who release partial open-source code of their server, but it is impossible to actually use.
But as far as I understand, for e2e programs that doesnt matter as long as the client is open-source, isn't it?
As much as I praise Threema… it frankly sucks compared to the alternatives. Delayed message delivery, sometimes no notifications, somehow dated looking Ui…
Especially as there are open source alternatives such as matrix
Imagine EU sponsoring a messaging app as part of public infrastructure.
Great Idea. It will probably be called ChatControlsEU and every message is archived and data mined at the Bavarian police departments Palantir instance.
Several of good free peer to peer options. We need to completely move away from centralized servers. This list is dated, as there's many new excellent options out there. It would be cool to see a multi client protocol.
https://convos.org/
https://www.messenger-matrix.de/messenger-matrix-en.html
The article dedicated a paragraph to Threema. Just noting and quoting it for context, not necessarily agree.
Another well-known messaging app, Telegram, is not considered a private alternative, as chats are not end-to-end encrypted by default. Only Secret Chats offer optional end-to-end encryption, while group chats have none. Telegram also falls short in other privacy and security areas, such as metadata protection and contact privacy.
Threema and Telegram are the same app?
If only the threat didn't (also) come from inside the house when it comes to privacy. I don't want my national police to have full access to my chats at all times any more than I want the USians to have that access, possibly even less. FBI or CIA isn't going to personally bust down my front door, arrest me and seize all my computing devices because I called a local politician a dick.
Meshtastic. Let’s get some critical mass. Get single points of trust out of the equation.
Or briar, tox...
Tox is not really great for multi-device, is it?
Yeah, a network based on the principle of flooding ain't gonna work across that many people.
Sadly Meshtastic is limited to the number of nodes it'll go through (think it was 7) so pretty limited. MeshCore goes up to something like 64 so is better but still both have huge limitations right now besides the 'no nodes around me' issue.
still, I have some MeshCore nodes and hopefully get 1 fairly high up when I can afford the £100 to buy it but its a lot to waste when no-one around here is interested.
I'll get a node, but the bandwidth is too low. I'm looking into WiFi meshing now.
Or simplex!
Like one of the main things Signal is really terrible at given that it is based in the US and hosted on AWS servers 🤦
Besides being hosted in the AWS servers, there's no way to check if what's running there is the same as the published code. That's why i don't use signal.
When the signal foundation is losing money every year, i can just wonder what will happen when the money runs out. Even the good guys need to eat.
Or what will happen when trump will decide to seize the AWS servers running the signal application server.
You don't need to care about the server code since the secure bits and encryption that matters is all on the client side and verifiable.
i do care about metadata.
as in phone number, IP and timestamps? If I were worried about that I wouldn't have a phone in the first place but if private messaging (content is private) I think signal works fine
If you care about it then just use Signal since it's the one with least amount of metadata fying around. A big central server with many normies using it also ensures that it's very hard to correlate traffic.
If you care about it then just use Signal
No, because of:
When the signal foundation is losing money every year, i can just wonder what will happen when the money runs out. Even the good guys need to eat.
I have seen this film so many times....
It shouldn't matter because you can verify that your data is encrypted and thus not accessible to the server, but also, IIUC, they use secure enclaves so that you can verify that their server is running the published source code.
when trump will decide to seize the AWS servers running the signal application server.
How do we know he hasn't already?
No need to size them. AWS is deeply embedded into the intelligence apparatus of the NSA as one of their prioritized suppliers.
I believe the fact that Signal is hosted on Apple or Google clients is worse than its server host. (I still use and recommend it though)
Convincing people to use an open Android build is much harder than installing another messenger.
It's e2e encrypted. Although, as I noticed, the key is just a short pin, unless you use password, but the recipient might not use it and your messages are just as secure as your recipient.
The PIN isn't actually the encryption key, it's just a display lock for the local client. But if whoever wants to read your messages has physical access to your phone and already bypassed the normal android lockscreen, you're fucked anyway.
The other party is always the weakest link.
But also signal's pins are a little more complicated than that, but you're right, switch to a passphrase.
Plus side, even if signal themselves edited the secure enclave, the world would need a new client pushed and probably notice something was off.
The way signal's encryption works is really an art in paranoia.
the world would need a new client pushed and probably notice something was off.
Not if the US have the support of Google.
Totally not how the APK teardown community works, but ok.
How does APK teardown help if Google can replace the app unnoticed?
Because there will always people running Signal from a different source, and only one of them is sufficient to notice the server has been tampered with.
(And I'm not sure if they have reproducible builds yet, but if they do, people can also verify that even the Google Play-provided APK does or doesn't match the published source code.)
notice the server has been tampered with.
Which server?
doesn’t match the published source code
People don't control their phone. There is no way of knowing if the installed app is the one that is running.
Which server?
The server running Signal's server-side code.
People don’t control their phone. There is no way of knowing if the installed app is the one that is running.
Some do, and that's the point: if there's an attempt at tampering, interested security researchers can detect it.
The server running Signal’s server-side code.
What could a client detect? Signal is a US company and will comply with the government. The server can't be trusted.
Some do, and that’s the point: if there’s an attempt at tampering, interested security researchers can detect it.
They can detect if a different app was installed from the store on their phone. That's not useful for anybody to know if their own app is unaltered. Only people of interest will receive a manipulated client. So there is no security in knowing that some people received the original app.
Besides, Google runs the OS. They can change the app at runtime.
Facebook Messenger also claims to be end-to-end encrypted... There's literally no way of knowing if they can decrypt your messages.
The only way to know is to host it yourself and preferably use post-quantum secure encryption.
And? That doesn't help at all if the US government decides to force Signal to stop servicing Denmark.
It helps in that they still can't read your messages. The EU is likely to make e2e messaging illegal before the USA cuts access.
You can't really make e2ee messaging illegal, at least it is impossible to enforce with decentralized open-source messengers.
It is much more likely that the US will mess with Signal, than that you will stop being able to use an e2ee messenger like XMPP, which is just as secure as Signal regarding the e2e encryption.
The issue is that it's already pretty hard to convince people to use something easy like Signal, most people just don't care enough for something "complicated" like XMPP-based messengers, especially if mainstream app stores had to stop letting EU-based users install messengers with these features.
Well, yes. But when it comes to digital independence Signal isn't better than WhatsApp. At least recommend something like Threema if you think the much better alternatives are too hard.
Except Meta fully owns the WhatsApp metadata, and frankly Signal is a lot more trustworthy about its e2e implementation being actually, in practice, secure.
at least it is impossible to enforce with decentralized open-source messengers.
All you need is a central registry where licensed messengers register their e2ee connections. Then network providers only have to report all ip addresses with connections that are not on that list.
Impossible with VPNs, but politicians have already announced their desire to make them illegal.
What? You are not making much sense. What is a "e2ee connection"?
An encrypted connection between two endpoints.That's required for "decentralized open-source messengers".
Currently it's impossible to prevent because of all the encrypted video calls of the Meta messengers and similar connections between endpoints.
If those video streams are marked then it is known which endpoints use software that evades surveillance.
I am not sure you understand what you are talking about. There is no easy way to distingish between different connections and pretty much all internet traffic is encrypted these days.
My argument is that a central registry, where all controlled software registers their connections, is all that is needed to identify the connections that are outside the control of the surveillance state.
How would you register all connections of the internet?
Only e2e connections have to be registered.
If every human has 10 e2e connections per hour, that's 80G connections. If that requires 10k bytes for communication that would be 800T bytes per hour, 250G byte per second. That should be possible.
Use the routers of the exchange points to track the connections. Let them report any connection that hasn't received a validation from the registry.
Again, what is a "e2e connection"? There is no such thing and it is nearly impossible to distingish a e2e encrypted data stream inside a TLS connection from regular TLS encrypted connection.
Again, what is a “e2e connection”?
It is a connection between network Endpoints. The connection that is e2e Encrypted.
impossible to distingish a e2e encrypted data stream inside a TLS connection from regular TLS encrypted connection.
IP ranges show which IP belongs to a server in a data center and which is an endpoint.
Yes, but how do you distinguish between two identical TLS connections? You can't and hence you can't figure out if the content inside is additionally e2e encrypted. So what you are suggesting just doesn't work technically.
The registry tells me if a connection is from an app that uses encryption that I can break. Everything else is suspect, needs investigation and after an introduction time, will be forbidden. Routers can easily discard everything that is not approved by the registry.
How? You have two arbitrary computers exchanging TCP packets. There is no way to tell any difference.
As I wrote before, trustworthy apps register their connection at the registry.
You are not making sense. You can register as many apps as you want, if there is no way to distinguish non-registered app traffic from regular internet traffic.
There is no need to distinguish the traffic. IP adresses and ports identify the streams.
The app creates a connection and registers both IPs and ports at the registry.
Then the app starts sending data.
The first router at an internet exchange point asks the registry if the IPs and ports are registered. If they are, the packets are delivered, if not they are dropped.
That way no unregistered app can exchange data.
So you are saying the entire internet needs to be shut down?
All websites keep working. All commercial apps will be adjusted and keep working. At first users just receive warnings and all apps keep working.
The internet won't shut down when finally the packets are dropped. Only democracy will die, silently.
Look, this discussion is going nowhere, as you clearly have no idea how the internet actually functions. If websites keep working you can continue sending e2e encrypted messages from an unregistered app. Please educate yourself first and then you will realize how nonsensical your idea is.
If websites keep working you can continue sending e2e encrypted messages from an unregistered app.
You can also send e2ee messages with Whatsapp if you copy and paste them. At some point, encryption of messages doesn't help because it's suspicious enough that further investigations are triggered.
Of course you can create a secret messenger service hidden on a regular website. But it's either unknown which makes it useless, or popular which will attract an investigation.
No, any normal easy to use federated XMPP app will work with built in e2ee. There is no real difference between an app communicating with a server and a browser communicating with a webserver, and for an outside observer there is no easy way to tell them apart.
Please educate yourself better about this topic. You make yourself look really stupid 🤷
Oh and WhatApp is already e2ee.
The problem is
The EU is likely to make e2e messaging illegal before the USA cuts access.
So everything on a server must be accessable and all regular messengers with e2ee must have a backdoor.
So the only possibility for secure communications are direct connections that no server can scan with AI.
Shut that down, too, and no community bigger than a couple of people can communicate unsupervised.
The EU can try to make it illegal, but as I said, there is no way to enforce such a law and no real way to prevent decentralized e2ee messengers from continuing to work.
So really what you are saying makes little sense.
Oh that's another consideration indeed.
Is it about the geopolitics or did SaveSocial's marketing campaign "digital independence day" last weekend (look for #DIday and #DIDit) also contribute? I'm not sure how visible that was internationally or if it was just a German campaign.
DID stemms from a Talk AG the CCC this year. It is a month old and was held in german. I think this isnt DIDs work here
Welcome to the club!
The people that are orchestrating the takeover of Greenland literally owns that fucking platform you fucking idiots.
Does no one in the west have a fucking brain?
Perfect is the enemy of the good.
Just see it as a first step. Signal is still better than WhatsApp being owned by Meta. If we get more people of WhatsApp, in the future there might be more European alternatives.
There are no big European alternatives the majority of people are willing to switch.
I got rid of WhatsApp last year myself and could only convince 8 people to use Signal. I tried Threema and Matrix, but most normal people are not willing to do this and don't care they give up their data and so on...
Thank you for contributing to the critical mass o7
I joined Signal for the very few people in my contact list that use it, but I am holding out for the further establishment / gaining traction of a non-walled-garden solution before I start evangelizing Signal... So that I don't get more people to switch, and then after a few months/years have to try to get them to switch again e.g. to a Matrix solution (and once again losing my chat history in the process).
From one american service to another american service? Good job m'Danes, that'll show'em.
Less flippantly though, Signal is a better american service, and incremental improvements are good too.