ForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 6 months agoSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comexternal-linkmessage-square254fedilinkarrow-up1513arrow-down130cross-posted to: cybersecurity@sh.itjust.workstechnology@lemmy.worldfoss@beehaw.orgprivacyguides@lemmy.oneprivacy@lemmy.ca
arrow-up1483arrow-down1external-linkSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 6 months agomessage-square254fedilinkcross-posted to: cybersecurity@sh.itjust.workstechnology@lemmy.worldfoss@beehaw.orgprivacyguides@lemmy.oneprivacy@lemmy.ca
minus-squareuis@lemm.eelinkfedilinkarrow-up1·edit-26 months ago which is an online component. So, storing on Signal’s server key to decrypt keys. Welcome back to apple-isms and online-only. It will fail immediately and you will be alerted. Provided you have some other non-compromised way of communications.
minus-square9tr6gyp3@lemmy.worldlinkfedilinkarrow-up1·6 months agoYes, verified boot will have out-of-bands alerts for you by design. Without the online component, you will risk not being able to detect tampering.
So, storing on Signal’s server key to decrypt keys. Welcome back to apple-isms and online-only.
Provided you have some other non-compromised way of communications.
Yes, verified boot will have out-of-bands alerts for you by design. Without the online component, you will risk not being able to detect tampering.