The Sweet Lies project aims to make the server for Signal secure and private chat available to everyone. Only the phone and desktop client is available today.
Privacy is closely related to fundamental human rights because private communications protect the rights of individuals, often including their personal safety. Private chat gives protection to people and groups who may be vulnerable or afraid, or just want to avoid the risk of embarrassment. Free speech and transparency are also very important, and they can only exist if there is first privacy.
In the 21st century we have learned a lot about how to keep communications private. Mathematics is used to encrypt messages sent by software apps, and the big question is whether or not those apps have had the mathematics weakened to allow people listen in on all messages sent. Signal has chosen not to weaken its mathematics to the disappointment of many criminals and governments.
This makes the Signal chat app the best existing solution for private communication. Signal consists of an app available in appstores, and also a Signal Server app run on a cluster of computers in one particular datacentre.
If you are using Signal, you are likely secure against some of the most common ways that someone would use to listen to what you say. But due to some transparency issues, there is a lot more that could be done.
NLnet has awarded some funding to Sweet Lies and we thank them very much.

Why Signal is Good
Signal is the only personal messaging codebase which has good privacy and is all of:
- β Validated by independent, academic, cybersecurity peer review
- β Open Source, see https://github.com/signalapp
- β Multi-platform apps (Android, Apple, Desktop), and the apps are reasonably accessible
- β Mainstream - many tens of millions of users. Even the EU parliament recommends Signal for internal communications
- β Seemingly, so far, resistant to efforts of criminals and also government authorities to break into its most detailed security
- β Full of features. Signal can be compared to mainstream commercial apps like WhatsApp and Telegram, and yet still provides extra-good security. No geeky knowledge required
Technical Problems with Signal Server
Signal Server also has some urgent problems:
- β Nobody can deploy a Signal server themselves (calling it something other than “Signal”, of course).
- β Inspection of the Signal server code shows that it uses at least six US-based closed source cloud services. These US services are an opportunity for sidechannel attacks and traffic analysis. Signal is still the most secure messaging system: Signal is end-to-end and does not store user data except to forward when necessary.
- β Signal is not legal or even suitable to use for communications in Europe, because of the US cloud dependencies and also because of the lack of reproducibility. Something as vital as Signal (recommended for use by the EU parliament!) needs to fully comply with EU privacy regulations, for the benefit of all users everywhere.
- β Signal is currently entirely hosted in the US, in an Amazon datacentre. This is legally and technically unacceptable for EU organisations given the above potential vulnerabilities.
- β Signal Server is configured to give some security information about individual end users to Content Delivery Networks without disclosure or consent. This point alone is sufficient to show that Signal does not preserve privacy as it should.
- β Signal no longer enables federation of user data, meaning interoperability is not testable and that the servers run by Signal Messaging LLC are a single point of failure. Denying access to secure messaging is one way of attacking vulnerable people.
- β Signal is not reproducible. Reproducibility is a first basic requirement for security and therefore trust. Many applications are not reproducible and reproducibility can be difficult, but a critical security app must be.
Introducing Sweet Lies
The Sweet Lies goal is to create a reproducible build of Signal client and server code, and then uses this to set up a Signal network.
The outcomes will be a recipe for creating a Signal-identical network, with evidence that this recipe gives correct results.
The next stage is hopefully to enable federation for connecting to other, independent Signal server instances, but since federation in Signal has been deprecated since 2016 there are many unknowns.
Sweet Lies relies on the production Not Forking tool developed for LumoSQL. This is about reproducibility and there are other tools and techniques, but this one works and is very well documented.
It seems very likely that when we can turn on a clone Signal network, that organisations of all kinds would very much like to have that same system themselves so they can be assured they have their own private Signal.
(Why the name “Sweet Lies”? Several other names proved unusable, and the Fleetwood Mac song is about keeping secrets safe!)
Sweet Lies FAQ
Signal is an old design. Why not just write a modern distributed chat system?
Because that will take years to build and have verified, and people need secure chat now, sometimes for life-and-death reasons. In 5β10 years probably nobody will be using Signal, but today there really isn’t a choice.
How long will this take?
Some time. We have some good estimates.
If Signal has all these problems, why not do a hard fork and fix them?
Because the Signal team are doing a really good job, and I would not want to try to duplicate what they do without having a large team with plenty of funding. Especially if it was just to try to replicate all the best parts of Signal which we could have for free already! This is about more than computer science, it’s about product engineering and release engineering. This is a really difficult thing to get right.
What about Matrix? They are open source and they just got lots of funding!
The Matrix team are lovely and I wish them every success, and they do produce quite a functional federated chat solution. I do not think it can be expected to pass rigorous security review; more to the point, I am unaware of any effort having been made to build security in from the start. Perhaps this is unfair, but chat services are very much the pointy end of security and there aren’t any shortcuts.