- cross-posted to:
- cybersecurity@sh.itjust.works
- cross-posted to:
- cybersecurity@sh.itjust.works
Signal should change this, but it’s typical of the traditional desktop OS security model in which applications running under the user’s account are considered trustworthy. Security-oriented software like Signal should take a more hardened approach, but this is not some glaring security hole.
That’s what I was thinking, my private keys are also chilling in plaintext on my filesystem.
With even email clients and web browsers running arbitrary and untrusted remote code on a regular basis, that model needs serious reconsideration.
This xkcd shouldn’t still be insightful. https://xkcd.com/1200/
Maybe its time to rethink desktop security. I realize that there is credential manager on windows, keychain on mac, and similar on gnu/linux; even with that it seems for a lot of services “all” you need to do is steal a cookie and all of a sudden you are someone else.
Idea of using a web browser for a platform was dumb enough and the reason why none of the keys were stored in appropriate services.
seems to be the way both apple and MS are going.
fuck no. It’s imbossible to be productive on an android or ios phone, where the os is hostile to you actually using it the way you want.
For an example of rethinking desktop security, see wayland in linux, and how ll accessibility programs now
don’tcannot possibly work.DeX mode: Am I a joke to you?
i do have and use that. But it’s still running android apps. which are designed for a touchscreen.
Termux is great though
I mean if somebody has physical access and is logged in they have your data anyways right?
For Linux not much of a problem since amount of malware is not that big. On Windows however a different story.
End-to-end encryption stops being secure… at the end… Who would’ve thought
What a useless app decrypts messages on my own screen when I log in with my passwords & other protections/protocols just for me to read them?
No, ty, I’ll decrypt everything in my mind only, securely under a tinfoil protection device.
Under normal circumstances I wouldn’t expect any privacy between processes on a desktop OS under the same UID.
If you use Chrome’s password manager on Windows your password database is unlocked with your password upon login and is available to every process you run.
There’s only so much you can do, as an app, to protect against OS deficiencies.
The desktop app on Windows is a sacrifice of security for convenience.
Storing stuff as plain text is so hot right now.
The image is of the iOS app, but the headline is about the desktop app 🧐
unplayable
There’s a desktop application?
I don’t see what the big deal is. I store all kinds of sensitive information in plain text. SSNs, credit card numbers, birthdates and religious and political affiliation information.
The guy I bought it all from said it was okay, he stores it in plain text, too. (I’m joking, of course! Any information about you all that I’ve bought on the dark web, I’m storing responsibly.)
phew!
I don’t care what you do with your data… As long as your being careful with my data.
I wonder where one can go to buy data about themselves.
I trust my computer and operating system. And there are several other keys and credentials stored on that laptop. I think it’s better for me to have a file that I can backup and understand how the encryption works, than to do some trickery to hide it mostly from me and maybe a bit from malware, or tie it to some hardware TPM device or something. I’m always not sure if I should rely on those too much.
Am I missing something? Hasn’t this been known for years now? I think they previously commented on this before.
It has been known and they can’t really change it. I think it’s only now that people are realizing this is an issue or at least something happened to start the avalanche.
According to the article there is a pull request which should fix it.
At least convert it to wingdings or something.
Wingdings is a font so… it already is.
But surely if it was stored encrypted, it would still need a key to unlock that info. Which would be on your PC. And could therefore be used by anything else to unlock your data.
The only safe way would be encrypt it with a password that only you know, and you’d need to enter before getting back into the software. And there couldn’t be any “I forgot my password” function either. You lose it, the data is gone.
Why not password protect the keys (ala Linux ssh / gpg symmetric encryption for local storage of PPK)
I told the guy I buy a certain thing that should be legal in this state from that trusting Signal is a bad idea and he should use some coded language if we were going use it. I do anyway, but I doubt that matters.
😳😬
Anyone who uses Windows can’t be that concerned with security in the first place.
I don’t understand the issue here.
Yes, you don’t understand that the story is about the Mac client and then later it was found out that Linux and Windows are equally affected. Did you even attempt to read it?