Signal under fire for storing encryption keys in plaintext on desktop app

ForgottenFlux@lemmy.world to Technology@lemmy.world – 369 points –
stackdiary.com
65

You are viewing a single comment

Signal should change this, but it's typical of the traditional desktop OS security model in which applications running under the user's account are considered trustworthy. Security-oriented software like Signal should take a more hardened approach, but this is not some glaring security hole.

That’s what I was thinking, my private keys are also chilling in plaintext on my filesystem.

With even email clients and web browsers running arbitrary and untrusted remote code on a regular basis, that model needs serious reconsideration.

This xkcd shouldn’t still be insightful. https://xkcd.com/1200/

Maybe its time to rethink desktop security. I realize that there is credential manager on windows, keychain on mac, and similar on gnu/linux; even with that it seems for a lot of services "all" you need to do is steal a cookie and all of a sudden you are someone else.

seems to be the way both apple and MS are going.

fuck no. It's imbossible to be productive on an android or ios phone, where the os is hostile to you actually using it the way you want.

For an example of rethinking desktop security, see wayland in linux, and how ll accessibility programs now don't cannot possibly work.

DeX mode: Am I a joke to you?

i do have and use that. But it's still running android apps. which are designed for a touchscreen.

Termux is great though

1 more...
1 more...
8 more...