The security community spends significant energy arguing about whether Signal is better than WhatsApp, whether iMessage metadata is a problem, whether Telegram's encryption is real. These are reasonable discussions for the consumer privacy context. They are the wrong discussions for organizations managing genuinely sensitive communications.
Signal is an excellent consumer application. Its Signal Protocol — the double ratchet algorithm combined with the X3DH key agreement protocol — is peer-reviewed, open-source, and represents a genuine cryptographic achievement. For a journalist protecting a source, for a dissident communicating with colleagues, for an individual who wants meaningful privacy from commercial surveillance, Signal is a legitimate tool.
The question for enterprise and government is not whether Signal is good. It is whether Signal was built for your threat model. It was not.
The Consumer vs. Enterprise Threat Model Gap
| Requirement | Consumer Signal | Enterprise Communications |
|---|---|---|
| Key management | Device-managed, no organizational control | Centralized, auditable, revocable |
| Group membership control | Any admin can add members | Policy-enforced, authenticated |
| Audit trail | None by design | Complete, tamper-evident |
| Post-quantum encryption | Partial — PQXDH added 2023, not complete | Required at every layer |
| Infrastructure sovereignty | Signal's servers, Signal's jurisdiction | Organizational or custodian control |
| Device requirement | Personal phone number required | Identity separate from carrier |
| Regulatory compliance | Not designed for regulated industries | Built to framework requirements |
| Communication channels | Messaging and calls only | Voice, video, email, messaging, file |
The Group Membership Problem
The incident that made global headlines in early 2025 — a senior official inadvertently added to a sensitive group conversation — illustrated a structural vulnerability that exists in every consumer communications application. Group membership in Signal, like most consumer platforms, is managed by trust in individual administrators. Any administrator can add any contact. There is no policy layer, no authentication of the addition, no verification that the new member is authorized to access the conversation's content.
"The vulnerability was not the encryption. The encryption worked. The vulnerability was the access control architecture — the assumption that group membership would be managed correctly by humans, every time, without error."
Enterprise communications security requires that group membership — and more broadly, access to any communication channel — be governed by policy, not by individual user decisions. Who can add whom, under what conditions, with what verification, subject to what audit trail. These are organizational security requirements that consumer applications were explicitly designed to avoid implementing, because they create friction in the consumer user experience.
The Infrastructure Dependency
Signal's encryption is end-to-end. But the ends of that encryption are Signal's servers for message relay, Signal's infrastructure for key distribution, and Signal's organizational structure as the governing entity for the service. Signal is a US company operating under US jurisdiction, subject to US legal process, with its own operational continuity risk profile.
For government communications, for legal privilege communications, for communications that need to remain confidential under defined legal frameworks, the infrastructure dependency matters. Who operates the servers that relay your messages when they cannot be delivered immediately? Whose key distribution infrastructure ensures your contacts can find each other? These are not questions Signal was designed to let organizations answer independently.
The Post-Quantum Gap
Signal added PQXDH — post-quantum extended Diffie-Hellman — to its protocol in 2023. This was a meaningful step. It is not a complete post-quantum implementation. PQXDH addresses the initial key establishment. It does not address the double ratchet's ongoing symmetric key evolution under a post-quantum threat model. The metadata associated with Signal communications — who communicates with whom, when, at what frequency, from what locations — is not encrypted at all.
A complete post-quantum communications implementation requires that every cryptographic operation — key encapsulation, authentication, session establishment, message encryption — uses post-quantum algorithms. Partial implementation leaves partial exposure. For organizations whose communications are being collected under harvest now, decrypt later programs, partial implementation means partial protection of what is being collected today.
Signal is better than most. Better than most is not the security standard required for organizations whose communications carry the weight of legal privilege, national security, or competitive confidentiality.
If your organization is evaluating communications security beyond consumer-grade solutions, we'd like to hear from you.
Get in Touch