• root@precious.net
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    Under normal circumstances I wouldn’t expect any privacy between processes on a desktop OS under the same UID.

    If you use Chrome’s password manager on Windows your password database is unlocked with your password upon login and is available to every process you run.

    There’s only so much you can do, as an app, to protect against OS deficiencies.

    The desktop app on Windows is a sacrifice of security for convenience.

  • Blackmist@feddit.uk
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    But surely if it was stored encrypted, it would still need a key to unlock that info. Which would be on your PC. And could therefore be used by anything else to unlock your data.

    The only safe way would be encrypt it with a password that only you know, and you’d need to enter before getting back into the software. And there couldn’t be any “I forgot my password” function either. You lose it, the data is gone.

  • ForgottenFlux@lemmy.worldOP
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    Summary:

    • Signal’s desktop app stores encryption keys for chat history in plaintext, making them accessible to any process on the system
    • Researchers were able to clone a user’s entire Signal session by copying the local storage directory, allowing them to access the chat history on a separate device
    • This issue was previously highlighted in 2018, but Signal has not addressed it, stating that at-rest encryption is not something the desktop app currently provides
    • Some argue this is not a major issue for the “average user”, as other apps also have similar security shortcomings, and users concerned about security should take more extreme measures
    • However, others believe this is a significant security flaw that undermines Signal’s core promise of end-to-end encryption
    • A pull request was made in April 2023 to implement Electron’s safeStorage API to address this problem, but there has been no follow-up from Signal
    • ilickfrogs@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      3 months ago

      Researchers were able to clone a user’s entire Signal session by copying the local storage directory, allowing them to access the chat history on a separate device

      This has actually been useful for me in the past when reinstalling my OS lmao. In an ideal world we could reverify by entering a code from our phones to unlock the desktop local storage after moving it. My biggest wish for Signal is more seamless message history movement across devices and ecosystems. Fuck even proper back ups would be nice.

      • NinjaCheetah@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Not having backups here on iOS stresses me out. I like using iOS beta updates, but knowing I’m one bad beta from having to restore my phone (where every other little thing except Signal is backed up and waiting) and lose my conversation history forever really bugs me.

      • EngineerGaming@feddit.nl
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        My biggest issue with Signal is it being so mobile-oriented. Mobile use seems to be encouraged, and even to register you are directly told to go to the mobile app (and if you register in a VM, you’re then stuck using it because it wants you to scan a QR code which is so easy to do in a VM!) No thanks, I don’t trust my mobile - they’re much harder to make private and “yours” than a desktop. Was it that hard to just add a field for entering the verification code in the desktop client? Sure, I did end up using signal-cli, but it is not mentioned anywhere officially. Point is about how the Signal itself tries to push you onto mobile.

        • Balder@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          I don’t trust my mobile - they’re much harder to make private and “yours” than a desktop.

          Still mobile phones are designed with much more security in mind than desktop environments, and basically everybody has a device.

  • hendrik@palaver.p3x.de
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    I trust my computer and operating system. And there are several other keys and credentials stored on that laptop. I think it’s better for me to have a file that I can backup and understand how the encryption works, than to do some trickery to hide it mostly from me and maybe a bit from malware, or tie it to some hardware TPM device or something. I’m always not sure if I should rely on those too much.

  • Zak@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    Signal should change this, but it’s typical of the traditional desktop OS security model in which applications running under the user’s account are considered trustworthy. Security-oriented software like Signal should take a more hardened approach, but this is not some glaring security hole.

    • cestvrai@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      That’s what I was thinking, my private keys are also chilling in plaintext on my filesystem.

  • MajorHavoc@programming.dev
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    I don’t see what the big deal is. I store all kinds of sensitive information in plain text. SSNs, credit card numbers, birthdates and religious and political affiliation information.

    The guy I bought it all from said it was okay, he stores it in plain text, too. (I’m joking, of course! Any information about you all that I’ve bought on the dark web, I’m storing responsibly.)

    • Evil_Shrubbery@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      What a useless app decrypts messages on my own screen when I log in with my passwords & other protections/protocols just for me to read them?

      No, ty, I’ll decrypt everything in my mind only, securely under a tinfoil protection device.

  • Flying Squid@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    I told the guy I buy a certain thing that should be legal in this state from that trusting Signal is a bad idea and he should use some coded language if we were going use it. I do anyway, but I doubt that matters.