Signal says it can provide only a couple of timestamps in response to a grand jury subpoena for user data that it recently received from the District Court for the Central District of California.
The official document requests a large amount of user information from the end-to-end encrypted, privacy-focused communication service, including a target’s username, name, date of birth, photos, address, email address, financial information, job-related information, activity logs, online behavior information, records of correspondence, and more.
Furthermore, Signal is asked to refrain from informing the respective user of the subpoena.
“Signal still knows nothing about you, but inexplicably the government continues to ask,” the communication platform notes in a blog post.
Furthermore, the company explains that the only pieces of information it can provide as response to the subpoena include the Unix timestamps “for when each account was created and the date that each account last connected to the Signal service.”
Basically Signal doesn’t have access to a user’s messages, name, address, photos, calls, or other data associated with the account, except for the aforementioned timestamps.
The response to the subpoena, in which the American Civil Liberties Union represents Signal, explains that the communication service was designed in such a manner that prevents it from tapping into users’ information or correspondence and that messages and calls are always encrypted and out of reach of third-parties.
“Users’ calls and messages are always encrypted, so they can never be shared or viewed by anyone except a user and their intended recipients. Likewise, Signal does not have access to its users’ profiles, group membership or group data, contacts, social graphs, searches, or the like,” the response reads.
Thus, as response to the subpoena, Signal provided only the information it could deliver, namely the aforementioned timestamps.
Related: Signal Adds Face Blurring Tool to Protect User Privacy

More from Ionut Arghire
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- 820k Impacted by Data Breach at Zacks Investment Research
- US Government Agencies Warn of Malicious Use of Remote Management Software
- Chinese Hackers Adopting Open Source ‘SparkRAT’ Tool
- CISA Provides Resources for Securing K-12 Education System
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
