Am I tripping or if you upgrade Signal Desktop, it saves all your messages in plain text (messages.json) + attachments locally so you can re-import them in the newer version? #fail #wtf
-
-
Replying to @msuiche
There is no magical pixie dust encryption algorithm that will protect your messages in such a way that whatever new version of Signal can access them but no other app or user can (on a desktop). If you have local access it's game over.
5 replies 1 retweet 12 likes -
How about a non-magical average good encryption scheme where messages stores are encrypted using a password as salt? I don't know why you need to be condescending or exasperated about something as basic as encryption at rest.
1 reply 0 retweets 3 likes -
Replying to @dreamandghost @msuiche
What's the point? So you save the messages encrypted, import them, and then what? They're going to be decrypted to be useful, with credentials that any other app can hijack out of the running Signal instance even if they're encrypted "at rest".
6 replies 0 retweets 3 likes -
If you encrypt at rest with a password based key (using KDF) that you don't store anywhere, and decrypt only chunks of the data at rest to store in memory, then you are limiting the attack surface. Also, this helps against device theft where they don't conrol your running app
1 reply 0 retweets 1 like -
Unless you want to input your password for every single message you view, the key has to be in memory while you use the app, at which point any other process can grab it.
2 replies 0 retweets 3 likes -
'Chunks' can mean 'your last 5 days of messages'. Scrolling further would require a retype. But even if it is kept in memory, it's still good against device theft.
1 reply 0 retweets 1 like -
We already have FDE to protect against device theft. Doing it in the app would require you to log in on every boot. It makes a lot more sense to have FDE for the whole system rather than each app implementing its own thing.
1 reply 0 retweets 0 likes -
The FDE is 1. optional 2. a single 'gate'. Are you saying (and I don't mean this to be a strawman) that everything on q device should be protected by a single password? In my payment app I have a PIN, in addition to my device unlock pattern. It does add security
1 reply 0 retweets 0 likes -
Credential minimization is desirable and good security practice, otherwise users just write them down. Sure, if you *really* want an app-level PIN every time you switch to an app you can implement that with crypto, but *nobody* wants that for a messaging app.
3 replies 0 retweets 0 likes
Again, on mobile we have more options because OSes are e.g. not designed to expose debugging capabilities without explicit user action and all apps are sandboxed. But the lack of these things on desktop makes many security models impossible to implement properly and usably.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.