There is no magical pixie dust encryption algorithm that will protect your messages in such a way that whatever new version of Signal can access them but no other app or user can (on a desktop). If you have local access it's game over.
-
-
How about a non-magical average good encryption scheme where messages stores are encrypted using a password as salt? I don't know why you need to be condescending or exasperated about something as basic as encryption at rest.
1 reply 0 retweets 3 likes -
Replying to @dreamandghost @msuiche
What's the point? So you save the messages encrypted, import them, and then what? They're going to be decrypted to be useful, with credentials that any other app can hijack out of the running Signal instance even if they're encrypted "at rest".
6 replies 0 retweets 3 likes -
Methods for defense in depth can seem crude and inelegant to system designers; changing modes of security throughout the work cycle just doesn't feel streamlined. This does not change it's usefulness.
1 reply 0 retweets 0 likes -
Replying to @dreamandghost @msuiche
Throwing encryption at a wall to see what sticks isn't "defense in depth". Defense in depth is adding layers of security on a solid foundation. Putting crypto bullet points up on a slide isn't DiD, it's how Sony builds game console security and look how well that worked.
1 reply 0 retweets 0 likes -
And if you're talking about keys stored in memory being useless, you're also sort of implying old fashioned, non-PFS style encryption is useless. Anyway, you're being condescending and it's annoying. Encryption at rest isn't "magic pixie dust" or "throwing encryption at a wall".
1 reply 0 retweets 0 likes -
Replying to @dreamandghost @msuiche
You keep trying to straw man me. I never said encryption at rest is useless. I said you need to know your threat model. Encryption at rest is only useful when (attack surface of storage) > (attack surface of active system).
1 reply 0 retweets 1 like -
Of course you can concoct artificial scenarios where encryption at rest helps on a desktop, but the benefit is *minimal*, won't stop a dedicated attacker, and thus Signal not encrypting at rest backups on a desktop is not a WTF.
1 reply 0 retweets 0 likes -
If you want encryption at rest against external attackers, *use FDE*. If you want security across app boundaries, *use different users or sandboxing*. There are much better solutions to real attack scenarios than Signal throwing some random crypto onto its backups.
1 reply 0 retweets 0 likes -
You've successfully exhausted me. The last thing I'll say is: most desktop systems do not isolate apps as individual users, even though they should. The model of "once an attacker has access to a userspace, stop even trying" is not legit, though I do understand deprioritizing it.
1 reply 0 retweets 0 likes
They should, and this is not something for *Signal* to fix. It's something for OSes to fix (and some do, for some subset of apps, and then Signal doesn't have to care since its backup file should be isolated too).
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.