#Room641A

Kevin Karhan :verified:kkarhan@infosec.space
2025-11-04

@Mer__edith No.

The fact that @signalapp CHOSE to host the most expensive way possible at a #US military contrator and in spittibgbditance to #CIA & #NSA is so deliberate, it makes #ANØM aka. #OperationIronside aka. #OperationTrojanShield professional by comparison for taking the time and effort to setup shell companies and servers in #Lithuania.

Or to ask bluntly: What Guarantees are there to prevent the #Trump Regime from taking down #Signal once it outlived it's usefulness at skirting #SubshineLaws and #Accountability and #Recordkeeping laws?

  • Even if we assume you and all the coders are willing to "choose death over surrendering the keys" or implementing #Govware #Backdoors (which are wholly unnecessary with you demanding #PII like #PhoneNumbers and #Room641A-Style equipment doing the whole #metadata shit)…

If you don't own and physically control the hardware it's run on, the mere existance of #Signal depends on the goodwill of #JeffBezos!

Kevin Karhan :verified:kkarhan@infosec.space
2025-10-07

$INSTANCE defederating infosec.space cuz 'Feds are there' is like the most dense idea I've heard.

  • Sorry to break it to you, but @snowden and the whole #PRISM affair seems to have gone over your head...

We live in the age of #33ThomasStreet & #Room641A, so unless you put your stuff behind a #VPN that endpoints in #Tor, they'll #BULLRUN you for the lulz.

  • If you are genuinely frightened about the #NSA aka. #AmericanStasi - (and you should) - then you need to realize that your threat assessment either accepts that and treats all comms in the #Fediverse as public and insecure (Which #Mastodon explicitly warns you about in it's DMs: They are not secure!) or you stop using #Fedi entirely.

Like you guys honestly believe that using #Signal will be more secure than #XMPP+#OMEMO when the confirmation-#SMS sent by @signalapp will earmark you as 'Person of Interest' and it's very centralized nature among many problems makes it a #HoneyPot run by #UsefulIdiots from my POV!

.
.
.

Look, I hate to be the one poppin' bubbles and you with your instance have your right to choose to (de-)federate with whomever you want.

  • Which is why I don't callout said instance. Dogpiling wouldn't fix people that densely wrapped in tinfoil.

  • You have the right to block me if that's too painful for ya.

But just like looking away doesn't make problems go away, neither will ignoring the truth.

I'm sorry if this #venting seems bitter, but some folks really need to get the fuck outside and #TouchGrass since there are folks on said instance working in that whole MIL/INTEL complex they so despise.

Kevin Karhan :verified:kkarhan@infosec.space
2025-09-18

@Uair That's some cold OSINT...

  • Ever heard of 33 Thomas Street, #Room641A & "LIthium" ?

As for #Signal, I dispute that even if you want 1:1 voice and video calling...

OFC we all know that the #BulkSurveillance is not about "#NatSec" or whatever but to have compromizing material on hand when someone becomes a problem.

Kevin Karhan :verified:kkarhan@infosec.space
2025-04-16

@adisonverlice it's not just re: #Governments (tho #Project2025 explicitly endorses unsactioned comms to twart attempts at #FIOA or any #accountability for that matter), but individuals or any organization:

And if #EncroChat got pwned, who's gonna guarantee @signalapp won't if it's actually secure or isn't an #InsideJob like #ANØM.

After all, both #Signal's Organization and key people like @Mer__edith are known to the authorities by more than just their legal name.

  • What's gonna prevent #Trump from doing a "bag&drag" on her or getting his goons to put a gun on,the developers' heads and force them to,#d0x all users and #backdoor everything (if they didn't already got forced to have some "#LafwulInterception" gear in a closet like #Room641A...

After all, Signal can't pull the 5th and refuse to comply!

Kevin Karhan :verified:kkarhan@infosec.space
2025-03-27

@Andromxda @pixelcode How can you claim something you can't evidence?

It makes you look like one of those folks shilling #VPN|s that ain't logless after all...

  • I don't believe in #marketing #lies and #Signal can't (and won't) be able to evidence that they don't log shit.

At least they should be honest about things and not claim bs, cuz demanding a #PhoneNumber is just #KYC with extra steps like demanding any #SSN or other #PII. Makes them look like chinese MMORPGs that demand ID card numbers for account signups, thus #paywalling the ability to use their service anonymously...

Kevin Karhan :verified:kkarhan@infosec.space
2025-03-27

@pixelcode @taylan @signalapp the #centralization, espechally without means to hide it's traffic via @torproject / #Tor makes it trivial to detect and track @signalapp / #Signal users.

  • Add to that the fact that Signal has #PhoneNumbers = #PII on them and the fact they are incorporated in the #USA, thus subject to #CloudAct and it's not a matter if they snitch on users but how many thousands if not millions got subopena'd to this day.

And with no self-custody of keys it's trivial to #Room641A the users if the devs get "motivated" under threat of spending the rest of theor lives in jail.

Martin SchmiedeckerFr333k@infosec.exchange
2025-03-14

To this day, I still wonder what exactly is/was behind that door #room641a

Orange door in a AT&T facility in San Francisco with room number 641A on it
Doc Edward Morbius ⭕​dredmorbius@toot.cat
2025-03-12

In Memoriam: Mark Klein, AT&T Whistleblower Who Revealed NSA Mass Spying

[W]hat Mark told us changed everything. Through his work, Mark had learned that the National Security Agency (NSA) had installed a secret, secure room at AT&T’s central office in San Francisco, called Room 641A. Mark was assigned to connect circuits carrying Internet data to optical “splitters” that sat just outside of the secret NSA room but were hardwired into it. Those splitters—as well as similar ones in cities around the U.S.—made a copy of all data going through those circuits and delivered it into the secret room.

eff.org/deeplinks/2025/03/memo

Klein provided one of the pre-Snowden disclosures of massive communications surveillance in the United States. I'd included him in an earlier toot from May 2021: toot.cat/@dredmorbius/10625139

His story also demonstrates that "surveillance state" and "surveillance capitalism" aren't separate things, but part of the same larger surveillance octopus.

#MarkKlein #Room641a #ATT #MassSurveillance #SurveillanceState #SurveillanceCapitalism

Kevin Karhan :verified:kkarhan@infosec.space
2025-01-02

@ginaintheburg could be.

#Room641A is everywhere...

#CloudAct

2024-01-29

@tek Makes me wonder if #Room641a and the likelihood of many more of them in existence, combined with centralization of HTTPS certificate control (Let's Encrypt), means that all of our traffic has been recorded for the better part of 20 years. Not to mention most web searches include URL attributes which are inherently insecure. Perhaps it's just paranoia, but I don't think the true nature of those bifurcated fiber pipes is completely understood.

Kevin Karhan :verified:kkarhan@mstdn.social
2023-10-08
Kevin Karhan :verified:kkarhan@mstdn.social
2023-08-24

@Brainclean I mean if you choose the highest end Xilinx FPGAs you can get realtime dreamcast emulation clock-cycle perfect.

It's just that you can expect to pay 5 digits per piece if you buy a roll of 500+ ...

Those things are otherwise used for realtime 100GBit/s fiber interception...

So if you'd ever get your hands on a #Glimmerglass #FiberSplitter out of #Room641A-Style facilities that is fried except said FPGA, you might get lucky.

en.wikipedia.org/wiki/Room_641

Kevin Karhan :verified:kkarhan@mstdn.social
2023-01-27

#FriendlyReminder: #Room641A is still up and running - as is the #PRISM program - to this very day.

en.wikipedia.org/wiki/Room_641

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst