Conversation

No. Not even close, sorry. The Cellebrite article was an extremely weird flex, amounting to "it was hard, but we figured out how to decrypt a file having both the key and the source code". Congrats? If you have an unlocked phone, of course you can read the messages.
Quote Tweet
Cellebrite Can Break Signal schneier.com/blog/archives/
10
267
You’re unable to view this Tweet because this account owner limits who can view their Tweets. Learn more
You’re unable to view this Tweet because this account owner limits who can view their Tweets. Learn more
Replying to
I think the app lock is more about "handed over unlocked phone to friend to look at pictures" than "defeat memory forensics on unlocked phone". Relatedly, I don't really believe in wiping specific secrets from memory without (inexistent) language support.
1
3
You’re unable to view this Tweet because this account owner limits who can view their Tweets. Learn more
Replying to
Honestly, I don't think it works even with native languages. You might wipe the key, but won't wipe the AES key schedule, or the RSA CRT values, or other derived values. The only thing that works today is having a separate process and nuking its address space, IMHO.
2
6
Doesn't mean that it's not useful to clear freed memory opportunistically though. Clearing pages on free in the kernel is just one example with major benefits. Even in a shared address space, a thread going away deals with a lot of the harder aspects if stacks are freed/cleared.
1
1
github.com/mollyim/mollyi does exist. IIRC, it uses low-level runtime functionality to clear pages held by the GC. Haven't reviewed it beyond taking a quick look at it. It could be done properly and meaningfully reviewed for a specific runtime version but it's not trivial to do it.
1
3
Show replies