this post was submitted on 06 Jul 2024
61 points (80.8% liked)

privacy

2914 readers
1 users here now

Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.

Partners:

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] gravitas_deficiency 8 points 3 months ago (8 children)

Wow that is actually pretty egregious for such a generally security-conscious organization.

[–] [email protected] 33 points 3 months ago (7 children)

Aside from needing a passkey/passphrase every time you open Signal, what would be the solution? If the user can read the unencrypted messages, then so can malware running as the user.

Heck, even if you required some sort of authentication to open the messages, malware could just capture that.

It's the same problem with browser credential stealing, you can grab all the cookies from an authenticated browser session and copy it to a new system.

Really, the biggest issue is that Signal doesn't detect multiple instances running of the same session, but that's also extremely difficult to do without malware being able to work around it.

Not saying there's no solution here, but there is not a simple solution aside from trusting your computer and cancelling sessions if you suspect someone compromised your system (or just not using a desktop app.)

[–] [email protected] 11 points 3 months ago

Storing the encryption keys in the Credentials Manager (Windows) or the Keychain (macOS, Linux) would be a better choice than a plaintext file.

And using Bitlocker / VeraCrypt / Filevault / LUKS will at least protect the data at rest.

But as you said, it's game over if the machine is compromised.

load more comments (6 replies)
load more comments (6 replies)