this post was submitted on 15 Apr 2024
85 points (94.7% liked)

Privacy

32442 readers
703 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I'm thinking of the things listed on the Privacy Guides real-time communication section

https://www.privacyguides.org/en/real-time-communication/

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 8 months ago (2 children)

master_key is never stored or sent to the SGX, only c2, the entropy bits. The user's password is still required to generate the key.

[–] [email protected] 4 points 8 months ago* (last edited 8 months ago) (1 children)

Brute forcing 4-6 digit pins is trivial.

And even if the user set a actual password, it's still very trivial

https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/

[–] [email protected] 2 points 8 months ago (1 children)

"Very trivial" if they set a proper password? Yet the source you provide says it's robustly secure

[–] [email protected] 0 points 8 months ago

I can't find the phrase robustly secure in the last link:

https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/

Signal asks users to set a pin/password which needs to be periodically reentered. This discourages people from using high entropy passwords like BIP38.

[–] Gooey0210 3 points 8 months ago (1 children)

The password is literally a pin

[–] [email protected] 3 points 8 months ago (1 children)

If you set a small pin, perhaps. Most people set a password

[–] Gooey0210 2 points 8 months ago (1 children)

Pin is the suggested option, so I really doubt "most" of the people choose password

[–] [email protected] 3 points 8 months ago (1 children)

Most people who care* I guess would be more apt

[–] [email protected] 1 points 8 months ago (1 children)

For the people who really care, they can disable The pin. I believe the client will generate a BIP 38 password randomly, and use that for the data encrypted in the SVR. But all the data is still uploaded to the cloud. So if there's a problem with the SVR encoding, the BIP 38 password generation etc the data is still exploited

Not only do you have to care, everyone you talk to has to do the same thing, because if your counterparty has their key in the cloud, the conversation is at risk.

[–] [email protected] 2 points 8 months ago (1 children)

Regardless, the master key is never uploaded

[–] [email protected] 1 points 8 months ago* (last edited 8 months ago)

All the bits to reconstruct the master key minus the pin code are uploaded. So it's equivalent to uploading to the cloud The master key itself.

Very few people are using BIP 38 level passwords. So the vast majority of people have their key constructively uploaded fully in the cloud