Conversation

1/3 Thankyou I entirely agree. "My major issue with SVR is that it’s something I basically don’t want, and don’t trust." Yep. And thanks for telling me I can at least generate a high-entropy password instead of a PIN - that is not at all obvious from the UI.
Quote Tweet
I wrote a post about why Signal’s “Secure Value Recovery” backup system (and decision to force users to choose PIN codes) has made me so concerned. blog.cryptographyengineering.com/2020/07/10/a-f
Show this thread
5
24
3/3 "Signal has added a “disable PINs” feature into its latest beta. Encrypted data still goes to Signal servers, but it’s now encrypted in a way that nobody can access." Really? I'm going to need more detail about that, or I'm going to need a new messaging app.
4
10
Replying to
It generates a high entropy key on your behalf instead of deriving it from a passphrase. The issue is asking users for a PIN to secure this data. Encouraging them to use a weak PIN makes it worse, but even if it did tell users to choose a secure passphrase we know they won't.
1
1
Replying to and
SGX is used as a way to throttle an attempt to decrypt it, but it depends on the security of SGX and SGX attestation which is based on a root of trust. They're using that to justify this design and encouraging a weak PIN. At the moment, they just backup contacts, settings, etc.
1
Replying to and
Most users are going to use a weak PIN especially since they're encouraged by the app to do it. Even power users are likely to be misled by their hand waving with SGX. People who know better than relying on SGX security + attestation based on a root of trust can avoid this.
1
1
Replying to and
Worth noting there was an existing encrypted backup feature in the Android app, which generates a strong key and has you record it as a series of numbers. That backs up message and your keys so you can migrate phones without losing safety numbers. Could have done it like that.
1
1
Show replies