Signal under fire for storing encryption keys in plaintext on desktop app (stackdiary.com)
from ForgottenFlux@lemmy.world to privacy@lemmy.ml on 06 Jul 2024 17:59
https://lemmy.world/post/17288973

#privacy

threaded - newest

[deleted] on 06 Jul 2024 17:59 next collapse
.
GolfNovemberUniform@lemmy.ml on 06 Jul 2024 18:02 next collapse

Oh wow that’s quite a red flag ngl

poVoq@slrpnk.net on 06 Jul 2024 18:06 next collapse

If your system is compromised to such an extend, it really doesn’t make much difference how the keys are stored at rest.

GolfNovemberUniform@lemmy.ml on 06 Jul 2024 18:51 next collapse

But my system is not compromised?

poVoq@slrpnk.net on 06 Jul 2024 19:08 next collapse

Did you read the article?

refalo@programming.dev on 07 Jul 2024 01:02 collapse

How do you know?

GolfNovemberUniform@lemmy.ml on 07 Jul 2024 09:47 collapse

Because I check my system and I don’t even use Signal?

refalo@programming.dev on 07 Jul 2024 09:53 collapse

“checking” does not prevent anything bad from happening. and if that file were read by a malicious actor, it would likely be immediate and you’d never even notice.

GolfNovemberUniform@lemmy.ml on 07 Jul 2024 09:56 collapse

Did you see that I said “I don’t use Signal”?

phoneymouse@lemmy.world on 06 Jul 2024 21:44 collapse

If the keys are accessible to any process, your system doesn’t need to be compromised. All it takes is an App that you”trust” to break that trust and snatch everything up. Meta has already been caught fucking around with other social media apps on device. They even intercepted Snapchat traffic on some users devices in order to collect that data. It could be as simple as you installed WhatsApp and they went and pillaged your Signal files.

nekusoul@lemmy.nekusoul.de on 07 Jul 2024 00:57 collapse

All it takes is an App that you”trust” to break that trust

I get what you’re trying to say, but that’s something I’d classify as “compromised” as well.

phoneymouse@lemmy.world on 07 Jul 2024 01:18 collapse

For sure, just suggesting that “compromised” doesn’t necessarily mean you got hacked by someone because they tricked you into giving a password, or they scraped it from another website, or you installed something sketchy. It could be as simple as Microsoft scans all your files with AI, or Meta snoops other social media (which it has been caught doing).

Zpiritual@lemm.ee on 07 Jul 2024 12:38 collapse

So you’re saying that the os itself is compromised? Gee, good luck protecting your processes from the fucking os, no matter how you do it.

possiblylinux127@lemmy.zip on 06 Jul 2024 19:51 collapse

Why? They would need access to the device

refalo@programming.dev on 07 Jul 2024 01:04 collapse

Thanks ChatGPT.

jsomae@lemmy.ml on 06 Jul 2024 18:20 next collapse

The real problem is that the security model for apps on mobile is much better than that for apps on desktop. Desktop apps should all have private storage that no other non-root app can access. And while we’re at it, they should have to ask permission before activating the mic or camera.

Cuntessera@sh.itjust.works on 06 Jul 2024 19:02 next collapse

macOS has nailed it*, even though it’s still not as good as iOS or Android, but leagues and bounds better than Windows and especially Linux.

ETC: *sandboxing/permission system

Vash63@lemmy.world on 06 Jul 2024 21:34 next collapse

What’s wrong with the Flatpak permissions system on Linux?

Cuntessera@sh.itjust.works on 06 Jul 2024 21:45 collapse

It’s a joke. Apps have defined permissions already allowed on install and some of them have too many things set to allow like home or host access. Also, changing any permission requires restarting the app. It’s heading in the right direction, but it has a looooong way to go to catch up with macOS, let alone Android and iOS.

tmpod@lemmy.pt on 06 Jul 2024 21:46 collapse

What does Windows do? Genuine question, I’ve not used it since the 7 days. Regarding Linux, that’s true for stuff installed through regular package managers and whatnot, but Flatpak is pushing a more sandboxed and permission oriented system, akin to Android.

ruse8145@lemmy.sdf.org on 06 Jul 2024 23:52 collapse

You have granular control over universal windows apps (ie windows 8+ apps) and one global lock over all desktop apps (non uwp), and one global lock over everything. It’s pretty solid considering how little control Microsoft has and it’s wonderful fetish for compatibility.

Tldr basically same as Linux, except app distribution in Linux was bad enough for so long that more stuff is in the new restricted format while windows still has tons of things which will never go away and aren’t in the sandbox. I think not finding a way to sandbox all desktop apps was a mistake.

possiblylinux127@lemmy.zip on 06 Jul 2024 19:51 next collapse

They do sort of with Flatpak

refalo@programming.dev on 07 Jul 2024 01:06 collapse

Firejail and bwrap. Flatpaks. There are already ways to do this, but I only know of one distro that separates apps by default like Android does (separate user per app), which is the brand new “EasyOS”.

thayer@lemmy.ca on 06 Jul 2024 18:25 next collapse

While it would certainly be nice to see this addressed, I don’t recall Signal ever claiming their desktop app provided encryption at rest. I would also think that anyone worried about that level of privacy would be using disappearing messages and/or regularly wiping their history.

That said, this is just one of the many reasons why whole disk encryption should be the default for all mainstream operating systems today, and why per-app permissions and storage are increasingly important too.

BearOfaTime@lemm.ee on 06 Jul 2024 18:37 next collapse

Exactly.

I’ll admit to being lazy and not enabling encryption on my Windows laptops. But if I deployed something for someone, it would be encrypted.

Tywele@lemmy.dbzer0.com on 06 Jul 2024 19:11 next collapse

Does encrypting your disks change something for the end user in day to day usage? I’m honest, I’ve never used encrypted disks in my life.

communism@lemmy.ml on 06 Jul 2024 19:16 next collapse

Whole disk encryption wouldn’t change your daily usage, no. It just means that when you boot your PC you have to enter your passphrase. And if your device becomes unbootable for whatever reason, and you want to access your drive, you’ll just have to decrypt it first to be able to read it/write to it, e.g. if you want to rescue files from a bricked computer. But there’s no reason not to encrypt your drive. I can’t think of any downsides.

lemmyvore@feddit.nl on 07 Jul 2024 09:18 collapse

If any part of the data gets corrupted you lose the whole thing. Recovery tools can’t work with partially corrupted encrypted data.

communism@lemmy.ml on 07 Jul 2024 13:38 collapse

I don’t think that’s a big deal with Signal data. You can log back into your account, you’d just lose your messages. idk how most people use Signal but I have disappearing messages on for everything anyway, and if a message is that important to you then back it up.

devfuuu@lemmy.world on 06 Jul 2024 19:53 next collapse

It’s transparent for end user basically, but protects the laptop at least when outside and if someone steals the computer. As long as it was properly shutdown.

ruse8145@lemmy.sdf.org on 06 Jul 2024 23:48 collapse

Define properly shut down. Do your thieves usually ask first?

devfuuu@lemmy.world on 07 Jul 2024 00:52 next collapse

If you suspend the laptop when moving locations instead of shutting down or hibernating to disk then disk encryption is useless.

thayer@lemmy.ca on 07 Jul 2024 07:37 collapse

Most operating systems will require your desktop password upon resume, and most thieves are low-functioning drug users who are not about to go Hacker Man on your laptop. They will most likely just wipe the system and install something else; if they can even figure that out.

refalo@programming.dev on 07 Jul 2024 00:58 collapse

I think they’re just referring to an outdated concept of OSes with non-journaling filesystems that can cause data corruption if the disk is shut off abruptly, which in theory could corrupt the entire disk at once if it was encrypted at a device level. But FDE was never used in the time of such filesystems anyways.

thayer@lemmy.ca on 06 Jul 2024 20:31 next collapse

No, the average user will never know the difference. I couldn’t tell you exactly what the current performance impact is for hardware encryption, but it’s likely around 1-4% depending on the platform (I use LUKS under Linux).

For gamers, it’s likely a 1-5 FPS loss, depending on your hardware, which is negligible in my experience. I play mostly first and third person shooter-style games at 1440p/120hz, targeting 60-90 FPS, and there’s no noticeable impact (Ryzen 5600 / RX 6800XT).

ruse8145@lemmy.sdf.org on 06 Jul 2024 23:47 next collapse

If it has to go to disk for immediate loading of assets while playing a video game you’re losing more than 1-5 fps

refalo@programming.dev on 07 Jul 2024 01:01 next collapse

Maybe, but not every frame while you’re playing. No game is loading gigs of data every frame. That would be the only way most encryption algorithms would slow you down.

gaylord_fartmaster@lemmy.world on 07 Jul 2024 04:34 next collapse

You’re more likely going to get stuttering or asset streaming issues which are going to have more impact than losing a few fps.

ruse8145@lemmy.sdf.org on 08 Jul 2024 03:26 collapse

Yeah was thinking about that (edited to add immediate) – games are certainly background loading nowadays but the stuff needed is intended to be in ram by the time it’s needed, afaik.

thayer@lemmy.ca on 07 Jul 2024 07:31 collapse

Yeah, I’m sure there are a lot of variables there. I can only say that in my experience, I noticed zero impact to gaming performance when I started encrypting everything about 10 years ago. No stuttering or noticeable frame loss. It was a seamless experience and brings real peace of mind knowing that our financial info, photos, and other sensitive files are safely locked away.

ruse8145@lemmy.sdf.org on 08 Jul 2024 03:25 collapse

For sure I’m just saying i’d guess that’s because at play time you’re loading everything into ram. For bulk loading I would encryption perf follows the general use case.

(Tldr encryption shouldn’t matter for games)

refalo@programming.dev on 07 Jul 2024 00:55 collapse

For gamers, it’s likely a 1-5 FPS loss

I highly doubt it… would love to see some hard data on that. Most algorithms used for disk encryption these days are already faster than RAM, and most games are not reading gigabytes/sec from the disk every frame during gameplay for this to ever matter.

refalo@programming.dev on 07 Jul 2024 01:00 collapse

It depends on how you set it up. I think the default in some cases (like Windows Bitlocker) is to store the key in TPM, so everything becomes transparent to the user at that point, although many disagree with this method for privacy/security reasons.

The other method is to provide a password or keyfile during bootup, which does change something for the end user somewhat.

ooterness@lemmy.world on 06 Jul 2024 19:31 next collapse

Full disk encryption doesn’t help with this threat model at all. A rogue program running on the same machine can still access all the files.

thayer@lemmy.ca on 06 Jul 2024 19:56 collapse

It does help greatly in general though, because all of your data will be encrypted when the device is at rest. Theft and B&Es will no longer present a risk to your privacy.

Per-app permissions address this specific threat model directly. Containerized apps, such as those provided by Flatpak can ensure that apps remain sandboxed and unable to access data without explicit authorization.

Zak@lemmy.world on 06 Jul 2024 22:53 collapse

I don’t recall Signal ever claiming their desktop app provided encryption at rest.

I’m not sure if they’ve claimed that, but it does that using SQLCipher.

catalog3115@lemmy.world on 06 Jul 2024 18:26 next collapse

E2EE is not supposed to protect if device get compromised.

NegativeLookBehind@lemmy.world on 06 Jul 2024 19:03 next collapse

One could argue that Windows is compromised right out of the box.

refalo@programming.dev on 07 Jul 2024 00:53 collapse

Source:

Vilian@lemmy.ca on 07 Jul 2024 04:58 next collapse

source: 93% of ransomware are windows based

refalo@programming.dev on 07 Jul 2024 05:00 next collapse

Correlation is not causation.

uis@lemm.ee on 08 Jul 2024 04:30 collapse

Causation was never stated nor implied

WldFyre@lemm.ee on 07 Jul 2024 19:15 next collapse

99% of people in France are French

Rai@lemmy.dbzer0.com on 08 Jul 2024 04:20 next collapse

BUT WHAT OF QUEBEC

Neon@lemmy.world on 08 Jul 2024 20:26 collapse

Are they in france?

Rai@lemmy.dbzer0.com on 08 Jul 2024 21:57 collapse

I mean… basically

uis@lemm.ee on 08 Jul 2024 04:29 collapse

Therefore France is french righr out of box

[deleted] on 08 Jul 2024 04:23 collapse
.
it_depends_man@lemmy.world on 07 Jul 2024 09:32 next collapse

“The computer” decides when to install updates and which ones to install.

Zpiritual@lemm.ee on 07 Jul 2024 12:35 collapse

Microsoft are integrating adware and spyware straight into the os.

refalo@programming.dev on 08 Jul 2024 17:34 collapse

Source:

far_university1990@feddit.de on 08 Jul 2024 17:43 next collapse

Try setup fresh windows 11 system.

refalo@programming.dev on 09 Jul 2024 05:23 collapse

I don’t understand how that would prove anything.

far_university1990@feddit.de on 09 Jul 2024 06:42 collapse

A lot of tracker and spyware already mention in setup. And without bypass you cannot setup without microsoft account.

Zpiritual@lemm.ee on 09 Jul 2024 12:10 collapse

It’s right there in the open. Install windows and you’ll see it. There is personalised ads in the start menu and the os is uploading your private files to the cloud automatically, taking screenshots and uploading them, etc. It’s not hidden whatsoever.

potatopotato@sh.itjust.works on 06 Jul 2024 22:16 next collapse

Intrinsically/semantically no but the expectation is that the texts are encrypted at rest and the keys are password and/or tpm+biometric protected. That’s just how this works at this point. Also that’s the government standard for literally everything from handheld devices to satellites (yes, actually).

At this point one of the most likely threat vectors is someone just taking your shit. Things like border crossings, rubber stamped search warrants, cops raid your house because your roommate pissed them off, protests, needing to go home from work near a protest, on and on.

9tr6gyp3@lemmy.world on 07 Jul 2024 00:39 next collapse

If your device is turned on and you are logged in, your data is no longer at rest.

Signal data will be encrypted if your disk is also encrypted.

If your device’s storage is not encrypted, and you don’t have any type of verified boot process, then thats on you, not Signal.

douglasg14b@lemmy.world on 07 Jul 2024 01:39 next collapse

That’s not how this works.

If the stored data from signal is encrypted and the keys are not protected than that is the security risk that can be mitigated using common tools that every operating system provides.

You’re defending signal from a point of ignorance. This is a textbook risk just waiting for a series of latent failures to allow leaks or access to your “private” messages.

There are many ways attackers can dump files without actually having privileged access to write to or read from memory. However, that’s a moot point as neither you nor I are capable of enumerating all potential attack vectors and risks. So instead of waiting for a known failure to happen because you are personally “confident” in your level of technological omnipotence, we should instead not be so blatantly arrogant and fill the hole waiting to be used.


Also this is a common problem with framework provided solutions:

www.electronjs.org/docs/latest/api/safe-storage

This is such a common problem that it has been abstracted into apis for most major desktop frameworks. And every major operating system provides a key ring like service for this purpose.

Because this is a common hole in your security model.

9tr6gyp3@lemmy.world on 07 Jul 2024 03:09 collapse

Having Signal fill in gaps for what the OS should be protecting is just going to stretch Signal more than it already does. I would agree that if Signal can properly support that kind of protection on EVERY OS that its built for, go for it. But this should be an OS level protection that can be offered to Signal as an app, not the other way around.

douglasg14b@lemmy.world on 07 Jul 2024 18:00 collapse

Having Signal fill in gaps for what the OS should be protecting is just going to stretch Signal more than it already does. I would agree that if Signal can properly support that kind of protection on EVERY OS that its built for, go for it. But this should be an OS level protection that can be offered to Signal as an app, not the other way around.

Damn reading literacy has gone downhill these days.

Please reread my post.

But this should be an OS level protection that can be offered to Signal as an app, not the other way around.

  1. OSs provide keyring features already
  2. The framework signal uses (electron) has a built in API for this EXACT NEED

Cmon, you can do better than this, this is just embarrassing.

9tr6gyp3@lemmy.world on 08 Jul 2024 02:10 collapse

Why exactly am I re-reading your post? Im in complete agreement with you? Should I not be?

uis@lemm.ee on 08 Jul 2024 04:32 collapse

Signal data will be encrypted if your disk is also encrypted.

True.

and you don’t have any type of verified boot process

How motherboard refusing to boot from another drive would protect anything?

9tr6gyp3@lemmy.world on 08 Jul 2024 08:28 collapse

Its more about protecting your boot process from malware.

uis@lemm.ee on 08 Jul 2024 21:51 collapse

Well, yes. By refusing to boot. It can’t prevent booting if motherboard is replaced.

EDIT: s/do anything/prevent booting/

9tr6gyp3@lemmy.world on 08 Jul 2024 22:02 collapse

Thats correct. Thats one of the many perks.

uis@lemm.ee on 08 Jul 2024 22:45 collapse

EDIT: s/do anything/prevent booting/

9tr6gyp3@lemmy.world on 08 Jul 2024 23:04 collapse

If the hardware signatures don’t match, it wont boot without giving a warning. If the TPM/Secure Enclave is replaced/removed/modified, it will not boot without giving a warning.

uis@lemm.ee on 09 Jul 2024 00:20 collapse

If the hardware signatures don’t match

Compromised hardware will say it is same hardware

If the TPM/Secure Enclave is replaced/removed/modified, it will not boot without giving a warning.

Compromised hardware controls execution of software. Warning is done in software. Conpromised hardware won’t let it happen.

9tr6gyp3@lemmy.world on 09 Jul 2024 00:52 collapse

Compromised hardware doesn’t know the signatures. Math.

uis@lemm.ee on 09 Jul 2024 01:18 collapse

Compromised hardware can’t create new signatures, but it doesn’t matter because it controls execution of software and can skip any checks.

9tr6gyp3@lemmy.world on 09 Jul 2024 01:46 collapse

If the hardware is tampered, it will not pass the attestation test, which is an online component. It will fail immediately and you will be alerted. Thats the part of verified boot that makes this so much harder for adversaries. They would have to compromise both systems. The attestation system is going to be heavily guarded.

uis@lemm.ee on 09 Jul 2024 02:04 collapse

which is an online component.

So, storing on Signal’s server key to decrypt keys. Welcome back to apple-isms and online-only.

It will fail immediately and you will be alerted.

Provided you have some other non-compromised way of communications.

9tr6gyp3@lemmy.world on 09 Jul 2024 03:48 collapse

Yes, verified boot will have out-of-bands alerts for you by design. Without the online component, you will risk not being able to detect tampering.

Redjard@lemmy.dbzer0.com on 07 Jul 2024 01:12 collapse

TPM isn’t all that reliable. You will have people upgrading their pc, or windows update updating their bios, or any number of other reasons reset their tpm keys, and currently nothing will happen. In effect people would see Signal completely break and loose all their data, often seemingly for no reason.

Talking to windows or through it to the TPM also seems sketchy.

In the current state of Windows, the sensible choice is to leave hardware-based encryption to the OS in the form of disk encryption, unfortunate as it is. The great number of people who loose data or have to recover their backup disk encryption key from their Microsoft account tells how easily that system is disturbed (And that Microsoft has the decryption keys for your encrypted date).

RealFknNito@lemmy.world on 07 Jul 2024 01:44 next collapse

Plaintext should never be used in any application that deals with security, ever.

lemmyvore@feddit.nl on 07 Jul 2024 08:49 next collapse

Oh no, tell that to SSH.

eager_eagle@lemmy.world on 07 Jul 2024 10:33 next collapse

unless you’re reading ciphertext yourself, this doesn’t make sense

possiblylinux127@lemmy.zip on 07 Jul 2024 16:30 collapse

It doesn’t use plain text. It is end to end encrypted but that isn’t what this “issue” is

AlexWIWA@lemmy.ml on 07 Jul 2024 03:14 next collapse

Mfw end to end can be compromised at the end.

That said, they should fix this anyway

uis@lemm.ee on 08 Jul 2024 04:28 collapse

Indeed, End-to-End Encryption protects data between those ends, not ends themselves. If ends are compromised, no math will help you.

HappyTimeHarry@lemm.ee on 06 Jul 2024 18:52 next collapse

That applies to pretty much all desktop apps, your browser profile can be copied to get access to all your already logged in cookie sessions for example.

kryllic@programming.dev on 06 Jul 2024 20:14 next collapse

IIRC this is how those Elon musk crypto livestream hacks worked on YouTube back in the day, I think the bad actors got a hold of cached session tokens and gave themselves access to whatever account they were targeting. Linus Tech Tips had a good bit in a WAN show episode

douglasg14b@lemmy.world on 07 Jul 2024 01:41 collapse

And there are ways to mitigate this attack (essentially the same as a AiTM or pass-the-cookie attacks, so look those up). Thus rendering your argument invalid.

Just because “something else might be insecure”, doesn’t in any way imply “everything else should also be insecure as well”.

possiblylinux127@lemmy.zip on 07 Jul 2024 16:30 collapse

It is the same concept. Once your machine is pwded you are screwed

douglasg14b@lemmy.world on 07 Jul 2024 17:57 collapse

That’s all hinges on the assumption that your computer is pwned. Which is wrong

You don’t necessarily have to have privileged access to read files or exfiltrated information.

That point doesn’t matter anyways though because you’re completely ignoring the risk here. Please Google “Swiss cheese model”. Your comment is a classic example of non-security thinking… It’s the same comment made 100x in this thread with different words

Unless you can list out all possible risks and exploits which may affect this issue, then you are not capable of making judgement calls on the risk itself.

possiblylinux127@lemmy.zip on 07 Jul 2024 19:46 collapse

You act as though you somehow have more knowledge than everyone else. They problem is that you don’t understand encryption and permissions. You can’t just magically make something unreadable by programs with the same permission level. If you encrypt it there will need to be a key to decrypt it. That can could conceivably be encrypted with a password but that would require someone to enter a password. If they don’t enter a password they key will be stored plain text so anyone could easily decrypt your messages. Programs running as a user have the same permissions as that user. Does that make sense? You can’t just make something selectively unreadable with the current security model. I guess you could try to implement some sort or privileged daemon but that would open up more issues than it solved.

I would have a problem if Signal claimed that the desktop messages were encrypted at rest. However, they don’t make any such claim. If you are concerned about security I would recommend running everything in virtual machines and flatpaks. This way the chances of something misbehaving in a way that causes harm is minimized.

douglasg14b@lemmy.world on 07 Jul 2024 22:06 collapse

I’m not claiming some grand level of knowledge here. I also cannot enumerate all risks. The difference is that I know that I don’t know, and the danger that poses towards cognitive biases when it comes to false confidence, and a lack of effective risk management. I’m a professional an adjacent field, mid way into pivoting into cybersecurity, I used to think the same way, that’s why I’m so passionate here. It’s painful to see arguments and thought processes counter to the fundamentals of security & safety that I’ve been learning the past few years. So, yeah, I’m gonna call it out and try and inform.

All that crap said:

And you are right, the problem gets moved. However, that’s the point, that’s how standardization works, and how it’s supposed to work. It’s a force multiplier, it smooths out the implementation. Moving the problem to the OS level means that EVERYONE benefits from advanced in Windows/Macos/Linux. Automatically.

It’s not signal’s responsibility, it shouldn’t be unless that’s a problem they specifically aim to solve. They have the tools available to them already, electron has a standardized API for this, secureStorage. Which handles the OS interop for them.

I’m not arguing that signal needs to roll their own here. The expectation is that they, at least, utilize the OS provided features made available to their software.

kbal@fedia.io on 06 Jul 2024 19:08 next collapse

Alternative headline: Someone has a feature request for Signal which would be of interest to a few people with very specific security needs.

communism@lemmy.ml on 06 Jul 2024 19:20 next collapse

It’s not a bad feature to ensure that eg if there’s a malicious process running on your computer it can’t send all your signal data to whomever

kbal@fedia.io on 06 Jul 2024 20:21 collapse

Needing to enter a secure passphrase each time you want to use signal in exchange for one more fragile layer of defence for that one part of your data in a scenario that would normally mean you've already lost unless you're running a super-secure compartmentalized operating system like qubes or something is probably not worth it for most people.

communism@lemmy.ml on 06 Jul 2024 20:48 collapse

I already enter a passphrase every time I want to use Signal; I use the Molly client on my phone. It’s really not a big deal. I also enter a passphrase every time I launch my password manager, every time I launch my two-factor authentication app on my phone, and every time I open my email client. I think it’s fairly standard to protect sensitive data on your computer with encryption at rest and to decrypt it upon launching the application that handles the data.

kbal@fedia.io on 06 Jul 2024 20:52 next collapse

Huh. I would've thought most desktop users just leave it running all day long like I do. Obviously there is the disk encryption passphrase at boot, adding another one for signal would in my case be redundant.

But the point is not only how easy it is to enter a passphrase, but also how much security that actually gains you. I don't think it does much on the typical desktop, be it windows or linux, where there are so many ways to escalate or persist privilege for anyone that has user-level access.

communism@lemmy.ml on 06 Jul 2024 22:36 next collapse

Obviously there is the disk encryption passphrase at boot, adding another one for signal would in my case be redundant.

I also have full disk encryption, but I still have some databases on my disk encrypted because I decrypt my disk when I boot my computer. But yeah if you have Signal open (& its db decrypted) all the time it would probably be minimal. I don’t have Signal open all the time though, only when I want to check messages or am actively using it

I don’t think it does much on the typical desktop, be it windows or linux, where there are so many ways to escalate or persist privilege for anyone that has user-level access.

The point would be encryption, even the root user wouldn’t be able to read encrypted data if they don’t have the passphrase

kbal@fedia.io on 06 Jul 2024 22:42 collapse

If you have root, intercepting all the user's keystrokes is trivial.

refalo@programming.dev on 07 Jul 2024 01:11 collapse

I would’ve thought most desktop users just leave it running all day long like I do.

They do. OP is not a normal user.

tmpod@lemmy.pt on 06 Jul 2024 21:29 next collapse

This has nothing to do with the mobile app, which also has password/biometric unlocking, it’s about the desktop electron app.

communism@lemmy.ml on 06 Jul 2024 22:35 collapse

I know. I never said it was about the mobile app?

kbal@fedia.io on 06 Jul 2024 22:41 collapse

You did but it says "desktop" right in the page title.

communism@lemmy.ml on 06 Jul 2024 23:13 collapse

I’m now genuinely not sure what you’re saying. I did what? I said it was about the mobile app? I didn’t say it was about the mobile app?

kbal@fedia.io on 06 Jul 2024 23:29 collapse

If I'm not mistaken you were talking about how things work "on my phone" but I suppose you had in mind that the principle would apply to desktop as well.

In practice it does somewhat come down to how well containerized and locked-down the environment is, so I think the difference does matter. Android for instance sucks in very many ways, but it's somewhat reliable in usually keeping apps from interfering with each other. There are a few desktops that try to do that, but they're still not too popular I think. Desktop users are used to having full control of everything. Seems to me the pervasive compartmentalization of everything (it wouldn't be sufficient for the purposes we're talking about to put only Signal in a secure container) is accepted as necessary on mobile devices mostly because so many of the apps are terrible.

communism@lemmy.ml on 07 Jul 2024 02:04 collapse

If I’m not mistaken you were talking about how things work “on my phone” but I suppose you had in mind that the principle would apply to desktop as well.

Yes, I was using it as a comparator as an example as to why it’s not a big deal to type a password every time you open an app, which I don’t think is any different between mobile and desktop.

refalo@programming.dev on 07 Jul 2024 01:09 collapse

It’s really not a big deal

For most casual users, it is a deal-breaker. And it’s hard to get everyday people to use your software with roadblocks like that.

every time I open my email client.

You must not get email very often, this is absolutely a non-starter for me.

communism@lemmy.ml on 07 Jul 2024 02:07 collapse

For most casual users, it is a deal-breaker. And it’s hard to get everyday people to use your software with roadblocks like that.

That’s fair enough, but the way the mobile app works is that you can opt in to having encryption at rest with a passphrase, so if you want to leave your signal database unencrypted you can.

You must not get email very often, this is absolutely a non-starter for me.

Once you open it you can leave it open if you need notifications. Sometimes I leave it open, sometimes I just want to check my emails and then close it. Idk, I really think typing in a password for authentication/decryption regularly is such a non-issue, like for instance do you not regularly type in a password when you run a command with sudo? Again, if it’s opt-in I also don’t see the issue, except for the issue of allowing people to not encrypt their Signal data thus potentially compromising the people they’re messaging, but obviously that issue is currently universal for Signal desktop.

AbidanYre@lemmy.world on 06 Jul 2024 19:53 collapse

You mean the types of people who would use signal to communicate with others?

possiblylinux127@lemmy.zip on 06 Jul 2024 19:52 next collapse

They could just add a password

notannpc@lemmy.world on 06 Jul 2024 20:43 next collapse

This just in: threat actors compromising your devices is bad. More at 11.

notannpc@lemmy.world on 06 Jul 2024 20:45 collapse

Obviously the keys could be stored more securely, but if you’ve got malware on your machine that can exploit this you’ve already got bigger problems.

douglasg14b@lemmy.world on 07 Jul 2024 01:52 collapse

That’s not how this works.

This sort of “dismissive security through ignorance” is how we get so many damn security breaches these days.

I see this every day with software engineers, a group that you would think would be above the bar on security. Unfortunately a little bit of knowledge results in a mountain of confidence (see Dunning Kruger effect). They are just confident in bad choices instead.

We don’t need to use encryption at rest because if the database is compromised we have bigger problems” really did a lot to protect the last few thousand companies from preventable data exfiltration that was in fact the largest problem they had.

Turns out that having read access to the underlying storage for the database doesn’t necessarily mean that the database and all of your internal systems are more compromised. It just means that the decision makers were making poor decisions based on a lack of risk modeling knowledge.


That said the real question I have for you here is:

Are you confident in your omniscience in that you can enumerate all risks and attack factors that can result in data being exfiltrated from a device?

If not, then why comment as if you are?

ssm@lemmy.sdf.org on 06 Jul 2024 20:45 next collapse

So many better standards like XMPP and IRC yet people use Signal and Telegram. I hate marketing.

ruse8145@lemmy.sdf.org on 06 Jul 2024 23:45 collapse

Signal is an objectively better experience than xmpp, and has about identical security (same with matrix). Irc isn’t secure afaik. Telegram isn’t secure afaik.

A better wish would be that people in 2024 would stop being fuckign weird about their cell number. Some people don’t want to give it out despite white pages being the standard for years (and how the Terminator knows who to kill). Other people refuse to use a messaging app where they can’t use their phone to sign up. Some people want to sign up with their number but not give it out.

yogthos@lemmy.ml on 06 Jul 2024 22:10 next collapse

This shows an incredibly cavalier approach to security on the part of the team working on signal.

ruse8145@lemmy.sdf.org on 06 Jul 2024 23:42 collapse

Moxie would be spinning in his grave if he weren’t still working there…

dessalines@lemmy.ml on 07 Jul 2024 19:49 collapse

Moxie tried to put a crypto-coin into signal. He is not to be trusted in the slightest.

ruse8145@lemmy.sdf.org on 08 Jul 2024 03:21 collapse

That’s quite a take given the source of most current end to end encrypted messaging algorithms.

But also, whooosh

DemBoSain@midwest.social on 06 Jul 2024 22:11 next collapse

Why is Signal almost universally defended whenever another security flaw is discovered? They’re not secure, they don’t address security issues, and their business model is unsustainable in the long term.

But, but, if you have malware “you have bigger problems”. But, but, an attacker would have to have “physical access” to exploit this. Wow, such bullshit. Do some of you people really understand what you’re posting?

But, but, “windows is compromised right out of the box”. Yes…and?

But, but, “Signal doesn’t claim to be secure”. Fuck off, yes they do.

But, but, “just use disk encryption”. Just…no…WTF?

Anybody using Signal for secure messaging is misguided. Any on of your recipients could be using the desktop app and there’s no way to know unless they tell you. On top of that, all messages filter through Signal’s servers, adding a single-point-of-failure to everything. Take away the servers, no more Signal.

GlenRambo@jlai.lu on 06 Jul 2024 22:17 next collapse

Whats the next best alternative?

Isoprenoid@programming.dev on 06 Jul 2024 22:23 next collapse

Meeting in person.

SendMePhotos@lemmy.world on 06 Jul 2024 23:41 next collapse

With a helicopter over you, loud music next to you, and a dude mowing next to you.

nikaro@jlai.lu on 06 Jul 2024 23:54 collapse

And no smartphone in your pocket, of course.

GlenRambo@jlai.lu on 07 Jul 2024 01:03 collapse

I’ll organise a time and place to meet in person via … Carrier pigeon?

We’re citizens raging against phones Lazlow.

ruse8145@lemmy.sdf.org on 06 Jul 2024 23:41 next collapse

Matrix or xmpp, bonus points with a personal server

Thanks to interest of late, the conversations and gajim apps have come a long way in recent years, and matrix has made good strides too with element-x

refalo@programming.dev on 07 Jul 2024 00:02 next collapse

I would only ever suggest matrix if you’re running a private self-hosted instance that is NOT federated, which you can do even easier with Signal anyways.

ruse8145@lemmy.sdf.org on 07 Jul 2024 00:28 collapse

That’s fine, but why?

refalo@programming.dev on 07 Jul 2024 00:40 collapse

It is a privacy and GDPR nightmare, basically all federated services right now are.

github.com/libremonde-org/…/README.md

web.archive.org/web/20240611200030/…/matrix.html

anarc.at/blog/2022-06-17-matrix-notes/

web.archive.org/web/20210804205638/…/matrix

ruse8145@lemmy.sdf.org on 08 Jul 2024 03:27 next collapse

Interesting, thanks for the links I’ll take a look

uis@lemm.ee on 08 Jul 2024 05:05 collapse

Looked into anarc blog. What there wss said about Matrix can be said about SMTP and probably XMPP. To do GDPR you need to know every server you have sent message to. And compared to IRC defaults(forward and remove) anything will look like GDPR nightmare. GDPR was not designed for federated(like matrix and activitypub) communications and especially wasn’t designed for peer-to-peer communications.

GlenRambo@jlai.lu on 07 Jul 2024 01:21 next collapse

I’d tried matix but without a high level of technical experience it was pretty difficult to setup. I got as far as docker, that needed ansible, that wouldn’t compile. I also recall there was services I could pay for, but then I’d rely on them to provide the security/servers.

Matrix doesn’t seem for the majority of people taking a first step away from big tech.

toastal@lemmy.ml on 07 Jul 2024 09:13 collapse

Snikket is meant to be super simple to self-host. Ejabberd has a web GUI that can make configuration easier.

uis@lemm.ee on 08 Jul 2024 04:52 collapse

bonus points with a personal server

Only with appservices. Doesn’t make sense otherwise.

refalo@programming.dev on 07 Jul 2024 00:06 next collapse

(for Android) molly.im

ivn@jlai.lu on 07 Jul 2024 00:45 collapse

I can find the desktop client, am I missing something?

[deleted] on 07 Jul 2024 01:22 collapse
.
refalo@programming.dev on 07 Jul 2024 01:26 collapse

That depends on your threat model. What are you worried about?

SeattleRain@lemmy.world on 06 Jul 2024 22:24 next collapse

What app stops a pre install keylogger. I’m all for hearing criticism of Signal but it’s always about things they can’t control.

DemBoSain@midwest.social on 07 Jul 2024 01:59 collapse

They can’t control if the encryption keys are stored in plaintext?

SeattleRain@lemmy.world on 07 Jul 2024 02:57 collapse

Ok I didn’t mean that in particular

Zak@lemmy.world on 06 Jul 2024 22:47 next collapse

If someone can read my Signal keys on my desktop, they can also:

  • Replace my Signal app with a maliciously modified version
  • Install a program that sends the contents of my desktop notifications (likely including Signal messages) somewhere
  • Install a keylogger
  • Run a program that captures screenshots when certain conditions are met
  • [a long list of other malware things]

Signal should change this because it would add a little friction to a certain type of attack, but a messaging app designed for ease of use and mainstream acceptance cannot provide a lot of protection against an attacker who has already gained the ability to run arbitrary code on your user account.

gomp@lemmy.ml on 06 Jul 2024 23:07 next collapse

Those are outside Signal’s scope and depend entirely on your OS and your (or your sysadmin’s) security practices (eg. I’m almost sure in linux you need extra privileges for those things on top of just read access to the user’s home directory).

The point is, why didn’t the Signal devs code it the proper way and obtain the credentials every time (interactively from the user or automatically via the OS password manager) instead of just storing them in plain text?

9tr6gyp3@lemmy.world on 07 Jul 2024 00:14 next collapse

Feel free to submit a pull request. We could use your help.

gomp@lemmy.ml on 07 Jul 2024 02:35 collapse

I don’t see the reasoning in your answer (I do see its passive-aggressiveness, but chose to ignore it).

I asked “why?”; does your reply mean “because lack of manpower”, “because lack of skill” or something else entirely?

In case you are new to the FOSS world, that being “open source” doesn’t mean that something cannot be criticized or that people without the skill (or time!) to submit PRs must shut the fu*k up.

9tr6gyp3@lemmy.world on 07 Jul 2024 03:21 collapse

It’s in the draft phase from what I can see.

github.com/signalapp/Signal-Desktop/pull/6849

Zak@lemmy.world on 07 Jul 2024 00:54 next collapse

You’d need write access to the user’s home directory, but doing something with desktop notifications on modern Linux is as simple as

dbus-monitor “interface=‘org.freedesktop.Notifications’” | grep --line-buffered “member=Notify\|string” | [insert command here]

Replacing the Signal app for that user also doesn’t require elevated privileges unless the home directory is mounted noexec.

douglasg14b@lemmy.world on 07 Jul 2024 01:32 collapse

They’re arguing a red herring. They don’t understand security risk modeling, argument about signals scope let’s their broken premise dig deeper. It’s fundamentally flawed.

It’s a risk and should be mitigated using common tools already provided by every major operating system (ie. Keychain).

Liz@midwest.social on 07 Jul 2024 02:34 collapse

“Highways shouldn’t have guard rails because if you hit one you’ve already gone off the road anyway.”

refalo@programming.dev on 07 Jul 2024 00:49 next collapse

(for Android) molly.im restores the encryption to this file and adds other useful things

douglasg14b@lemmy.world on 07 Jul 2024 01:29 collapse

Not necessarily.

en.m.wikipedia.org/wiki/Swiss_cheese_model

If you read anything, at least read this link to self correct.


This is a common area where non-security professionals out themselves as not actually being such: The broken/fallacy reasoning about security risk management. Generally the same “Dismissive security by way of ignorance” premises.

It’s fundamentally the same as “safety” (Think OSHA and CSB) The same thought processes, the same risk models, the same risk factors…etc

And similarly the same negligence towards filling in holes in your “swiss cheese model”.

“Oh that can’t happen because that would mean x,y,z would have to happen and those are even worse”

“Oh that’s not possible because A happening means C would have to happen first, so we don’t need to consider this is a risk”

…etc

The same logic you’re using is the same logic that the industry has decades of evidence showing how wrong it is.

Decades of evidence indicating that you are wrong, you know infinitely less than you think you do, and you most definitely are not capable of exhaustively enumerating all influencing factors. No one is. It’s beyond arrogant for anyone to think that they could 🤦🤦 🤦

Thus, most risks are considered valid risks (this doesn’t necessarily mean they are all mitigatable though). Each risk is a hole in your model. And each hole is in itself at a unique risk of lining up with other holes, and developing into an actual safety or security incident.

In this case

  • signal was alerted to this over 6 years ago
  • the framework they use for the desktop app already has built-in features for this problem.
    • this is a common problem with common solutions that are industry-wide.
  • someone has already made a pull request to enable the electron safe storage API. And signal has ignored it.

Thus this is just straight up negligence on their part.

There’s not really much in the way of good excuses here. We’re talking about a run of the mill problem that has baked in solutions in most major frameworks including the one signal uses.

www.electronjs.org/docs/latest/api/safe-storage

fuzzzerd@programming.dev on 07 Jul 2024 04:58 collapse

I was just nodding along, reading your post thinking, yup, agreed. Until I saw there was a PR to fix it that signal ignored, that seems odd and there must be some mitigating circumstances on why they haven’t merged it.

Otherwise that’s just inexcusable.

ChairmanMeow@programming.dev on 07 Jul 2024 12:23 collapse

The PR had some issues regarding files that were pushed that shouldn’t have been, adding refactors that should have been in separate PRs, etc…

Though the main reason is that Signal doesn’t consider this issue a part of their threat model.

refalo@programming.dev on 07 Jul 2024 00:04 next collapse

98% of desktop apps (at least on Windows and Linux) are already broken by design anyways. Any one app can spy on and keylog all other apps, all your home folder data, everything. And anyone can write a desktop app, so only using solutions that (currently) don’t have a desktop app version, seems silly to me.

AProfessional@lemmy.world on 07 Jul 2024 02:19 next collapse

Linux has a sandbox solution growing in popularity, flatpak.

possiblylinux127@lemmy.zip on 07 Jul 2024 16:26 collapse

And Wayland. Xorg is a complete and utter mess

explore_broaden@midwest.social on 07 Jul 2024 12:30 collapse

I don’t think apps can read keystrokes for other apps on Wayland.

possiblylinux127@lemmy.zip on 07 Jul 2024 16:26 next collapse

Unless you have root

explore_broaden@midwest.social on 08 Jul 2024 01:45 collapse

If you have root you could just update the kernel to one that lets you do whatever you want on the system, so there’s no way to stop the attacker from viewing the passwords if the app is capable of displaying them.

refalo@programming.dev on 08 Jul 2024 17:38 collapse
lemmyvore@feddit.nl on 07 Jul 2024 09:33 next collapse

Now replace “signal” in your comment with “ssh” and think it over.

todd_bonzalez@lemm.ee on 07 Jul 2024 13:49 collapse

It’s true, anyone using SSH for secure messaging is absolutely misguided.

roguetrick@lemmy.world on 07 Jul 2024 16:46 collapse

Ah the old Lemmy SHHwitcharoo.

uis@lemm.ee on 08 Jul 2024 04:50 collapse

SSHwitcharoo

roguetrick@lemmy.world on 08 Jul 2024 05:44 collapse

Thank you.

todd_bonzalez@lemm.ee on 07 Jul 2024 13:52 next collapse

Anybody using Signal for secure messaging is misguided. Any one of your recipients could be using the desktop app and there’s no way to know unless they tell you.

That’s why I only communicate face-to-face inside of a soundproofed faraday cage.

If the app manages the keys, then you can’t trust the app.

If the recipient manages their own keys, then you can’t trust the recipient.

Encryption is fundamentally insecure. Once I encrypt something, nobody should be able to decrypt it ever again.

possiblylinux127@lemmy.zip on 07 Jul 2024 16:25 next collapse

I hope you are joking

dessalines@lemmy.ml on 07 Jul 2024 19:48 next collapse

Basically for the same reason people often defend apple: the user interface is shiny, and they claim to be privacy oriented.

Signal is a centralized US hosted service, that alone should be enough to disqualify it, outside of our many other criticisms.

uis@lemm.ee on 08 Jul 2024 04:48 collapse

But, but, “just use disk encryption”. Just…no…WTF?

So not encrypting keys is bad, but actually encrypting them is bad too? Ok.

Any on of your recipients could be using the desktop app and there’s no way to know unless they tell you.

Another applefan? How it THIS supposed to be in scope of E2EE? Moreover, how having a way to know if recepient is using desktop app is not opposite of privacy?

On top of that, all messages filter through Signal’s servers, adding a single-point-of-failure to everything. Take away the servers, no more Signal.

Indeed. This is why I use Matrix. Also, fuck showing phone numbers to everyone(I heard they did something about it) and registration with phone numbers.

DemBoSain@midwest.social on 08 Jul 2024 15:50 collapse

Any “secure” so that relies on someone else for security is not secure.

Fuck the scope of E2EE. Signal makes a lot of claims on their website that are laughable. The desktop app is their main weakness. Attachments are stored unencrypted, keys in plaintext. If they were serious about security, they would depricate the windows app and block it from their servers.

WTF does Apple have to do with anything?

uis@lemm.ee on 08 Jul 2024 21:16 collapse

Any “secure” so that relies on someone else for security is not secure.

Fuck the scope of E2EE.

When someone has FSB/NSA agent behind them reading messages, no amount of encryption will help. Biggest cybersecurity vulnreability is located between monitor and chair. When you are texting someone else, that someone else’s chair-monitor space is also vulnreable.

Signal makes a lot of claims on their website that are laughable.

Well, maybe. I didn’t read their claims, nor I use signal.

Attachments are stored unencrypted, keys in plaintext.

Is OS-level encryption plaintext or not? If yes, then they are encrypted, provided user enables such feature in OS. If not - nothing if encrypted fundamentally.

If they were serious about security, they would depricate the windows app and block it from their servers.

WTF does Apple have to do with anything?

You just used applefans’ argument. Yeah, I wonder what.

DemBoSain@midwest.social on 09 Jul 2024 20:53 collapse

Well, maybe. I didn’t read their claims, nor I use signal.

Your opinions are invalid.

istanbullu@lemmy.ml on 06 Jul 2024 22:39 next collapse

Signal has so many red flags that I’m beginning to wonder if it is a honeypot.

Bogasse@lemmy.ml on 06 Jul 2024 23:02 next collapse

What other red flags do you have in mind?

livestreamedcollapse@lemmy.ml on 06 Jul 2024 23:22 next collapse

Back when the Signal org used to be called Open Whisper Systems it received grants and auditing from the Open Technology Fund which, at the time, was still a part of Radio Free Asia.

web.archive.org/web/…/open-whisper-systems

ruse8145@lemmy.sdf.org on 06 Jul 2024 23:39 collapse

So tldr, since you didn’t finish your thought, is that they got a grant like 3+ layers down, from the US government.

I have some news for you, or perhaps I can offer you a bridge.

livestreamedcollapse@lemmy.ml on 06 Jul 2024 23:47 collapse

People are free to draw their own conclusions from it. Do you have anything material to contribute, or will you just be putting more smarmy words in my mouth from here on out?

ruse8145@lemmy.sdf.org on 07 Jul 2024 00:30 next collapse

You didn’t explain the implications of what radio free Asia is, I did. I don’t know what words I’m putting in your mouth.

refalo@programming.dev on 07 Jul 2024 00:53 collapse

Attack the argument, not the person.

istanbullu@lemmy.ml on 07 Jul 2024 10:26 collapse

Signal is actively hostile to alternative clients, or decoupling from Google.

refalo@programming.dev on 07 Jul 2024 00:52 collapse

Got some sources for that, chief?

brayd@discuss.tchncs.de on 06 Jul 2024 22:52 next collapse

Does anyone know how iMessage handles this on desktop (on Macs) as they (as far as I know) upgraded their encryption recently?

bloodfart@lemmy.ml on 07 Jul 2024 18:20 collapse

It’s handled through keyring I think.

x1gma@lemmy.world on 07 Jul 2024 00:08 next collapse

How in the fuck are people actually defending signal for this, and with stupid arguments such as windows is compromised out of the box?

You. Don’t. Store. Secrets. In. Plaintext.

There is no circumstance where an app should store its secrets in plaintext, and there is no secret which should be stored in plaintext. Especially since this is not some random dudes random project, but a messenger claiming to be secure.

Edit: “If you got malware then this is a problem anyway and not only for signal” - no, because if secure means to store secrets are used, than they are encrypted or not easily accessible to the malware, and require way more resources to obtain. In this case, someone would only need to start a process on your machine. No further exploits, no malicious signatures, no privilege escalations.

“you need device access to exploit this” - There is no exploiting, just reading a file.

refalo@programming.dev on 07 Jul 2024 00:45 next collapse

How in the fuck are people actually defending signal for this

Probably because Android (at least) already uses file-based encryption, and the files stored by apps are not readable by other apps anyways.

And if people had to type in a password every time they started the app, they just wouldn’t use it.

Liz@midwest.social on 07 Jul 2024 02:26 next collapse

Popular encrypted messaging app Signal is facing criticism over a security issue in its desktop application.

Emphasis mine.

ChapulinColorado@lemmy.world on 07 Jul 2024 02:33 collapse

I think the point is the developers might have just migrated the code without adjustments since that is how it was implemented before. Similar to how PC game ports sometimes run like shit since they are a close 1-1 of the original which is not always the most optimized or ideal, but the quickest to output.

x1gma@lemmy.world on 07 Jul 2024 12:07 collapse

Been a few days since using electron, but AFAIK electron can’t be used as a wrapper for android apps, or can it? Or is their android app a web app wrapped into a “native” android app too?

Also, since this seems to be an issue since 2018, 6 years should be plenty to rewrite using a native secure storage…

uis@lemm.ee on 08 Jul 2024 04:18 collapse

AFAIK Android encrypts entire fs with one key. And ACL is not encryption.

lemmyvore@feddit.nl on 07 Jul 2024 09:16 next collapse

You. Don’t. Store. Secrets. In. Plaintext.

SSH stores the secret keys in plaintext too. In a home dir accessible only by the owning user.

I won’t speak about Windows but on Linux and other Unix systems the presumption is that if your home dir is compromised you’re fucked anyway. Effort should be spent on actually protecting access to the home personal files not on security theater.

floquant@lemmy.dbzer0.com on 07 Jul 2024 09:28 next collapse

Not true, SSH keys need their passphrase to be used. If you don’t set one, that’s on you.

dave@programming.dev on 07 Jul 2024 10:15 next collapse

Well yes, but also how would users react if they had to type in their passphrase every time they open the app? This is also exactly what we’re giving up everywhere else by clicking ‘remember this device’.

Mubelotix@jlai.lu on 07 Jul 2024 10:29 next collapse

Come on, 95% of users don’t set passwords on their ssh keys

idunnololz@lemmy.world on 07 Jul 2024 17:50 collapse

Where are these stays from lmao.

Mubelotix@jlai.lu on 07 Jul 2024 18:08 collapse

Counting my friends

keystome@lemmy.kde.social on 07 Jul 2024 20:35 collapse

You can count me too

lemmyvore@feddit.nl on 07 Jul 2024 10:31 collapse

If someone gets access they can delete your keys, or set up something that can intercept your keys in other ways.

The security of data at rest is just one piece of the puzzle. In many systems the access to the data is considered much more important than whether the data itself is encrypted in one particular scenario.

x1gma@lemmy.world on 07 Jul 2024 11:09 next collapse

Kinda expected the SSH key argument. The difference is the average user group.

The average dude with a SSH key that’s used for more than their RPi knows a bit about security, encryption and opsec. They would have a passphrase and/or hardening mechanisms for their system and network in place. They know their risks and potential attack vectors.

The average dude who downloads a desktop app for a messenger that advertises to be secure and E2EE encrypted probably won’t assume that any process might just wire tap their whole “encrypted” communications.

Let’s not forget that the threat model has changed by a lot in the last years, and a lot of effort went into providing additional security measures and best practices. Using a secure credential store, additional encryption and not storing plaintext secrets are a few simple ones of those. And sure, on Linux the SSH key is still a plaintext file. But it’s a deliberate decision of you to keep it as plaintext. You can at least encrypt with a passphrase. You can use the actual working file permission model of Linux and SSH will refuse to use your key with loose permissions. You would do the same on Windows and Mac and use a credential store and an agent to securely store and use your keys.

Just because your SSH key is a plaintext file and the presumption of a secure home dir, you still wouldn’t do a ~/passwords.txt.

uis@lemm.ee on 08 Jul 2024 04:12 collapse

SSH has encrypted keys

possiblylinux127@lemmy.zip on 07 Jul 2024 16:23 next collapse

If someone has access to your machine you are screwed anyway. You need to store the encryption key somewhere

x1gma@lemmy.world on 07 Jul 2024 16:52 collapse

Yes, in your head, and in your second factor, if possible, keeping derived secrets always encrypted at rest, decrypting at the latest possible moment and not storing (decrypted) secrets in-memory for longer than absolutely necessary at use.

uis@lemm.ee on 08 Jul 2024 04:11 next collapse

You. Don’t. Store. Secrets. In. Plaintext.

Ok. Enter password at every launch.

pedroapero@lemmy.ml on 12 Jul 2024 22:07 collapse

All your session cookies are stored in plaintext.

x1gma@lemmy.world on 12 Jul 2024 22:16 collapse

Chrome cookies are encrypted, for exactly the reasons stated. If malware gains access to your system and compromises it in a way that DPAPI calls can be replicated in the way Chrome does it, then your sessions will also be compromised. But this is way harder to do, and at least prevents trivial data exfiltration.

GENTLEMANNEofLEISURE@lemmy.ml on 07 Jul 2024 00:35 next collapse

dawg what the shitfuck

Prethoryn@lemmy.world on 07 Jul 2024 00:56 next collapse

Ah yes, another prime example that demonstrates that Lemmy is no different than Reddit. Everyone thinks they are a professional online.

Nothing sensitive should ever lack encryption especially in the hands of a third party company managing your data claiming you are safe and your privacy is protected.

No one is invincible and it’s okay to criticize the apps we hold to high regards. If your are pissed people are shitting on Signal you should be pissed Signal gave people a reason to shit on them.

Midnight1938@reddthat.com on 07 Jul 2024 03:19 next collapse

I presume keys are already sort of encrypted?

hexabs@lemmy.world on 07 Jul 2024 05:11 collapse

Nope. Your presumption is wrong.

Midnight1938@reddthat.com on 07 Jul 2024 06:03 collapse

👍

todd_bonzalez@lemm.ee on 07 Jul 2024 13:46 next collapse

especially in the hands of a third party company managing your data claiming you are safe and your privacy is protected.

Yeah, especially in this specific situation that isn’t relevant to this situation.

possiblylinux127@lemmy.zip on 07 Jul 2024 16:21 next collapse

Where are you going to store the encryption key? At the end of the day the local machine is effectively pwded anyway

[deleted] on 07 Jul 2024 18:29 next collapse
.
keystome@lemmy.kde.social on 07 Jul 2024 20:39 next collapse

If your device gets compromised, it’s no longer the company’s problem.

uis@lemm.ee on 08 Jul 2024 04:25 collapse

lack encryption especially in the hands of a third party company managing your data

Are we still talking about local-only keys?

mlg@lemmy.world on 07 Jul 2024 01:06 next collapse

Bruh windows and linux have a secrets vault (cred manager and keyring respectively, iirc) for this exact purpose.

Even Discord uses it on both OSs no problem

unrushed233@lemmings.world on 07 Jul 2024 02:26 next collapse

Can we please all just acknowledge that desktop operating systems absolutely suck (in regards to security)?

doodledup@lemmy.world on 07 Jul 2024 07:09 next collapse

How is a Desktop OS any different from a mobile one? This is where you need to be more specific.

thayer@lemmy.ca on 07 Jul 2024 07:51 collapse

There are too many differences for me to list here, but unlike mobile operating systems, Windows and most Linux desktops do not provide sandboxed environments for userspace apps by default. Apps generally have free reign over the whole system; reading/writing data from/to other apps without restriction or notification. There are virtually no safeguards against malicious actors.

Mobile operating systems significantly restrict system-level storage space, making key areas read-only to prevent data access or manipulation. They also protect app storage, so one app can’t arbitrarily access or modify data stored for a different app.

Mobile operating systems also follow an image-based update model, wherein updates are atomic. System software updates are generally applied successfully all at once or not at all, helping to ensure your phone is never left in a partial or unusable state after a system update.

For desktop users, macOS, and atomic Linux distros combined with Flatpak are the closest comparisons.

leanleft@lemmy.ml on 12 Jul 2024 07:37 collapse

This is what flatpak brings to the table

delirious_owl@discuss.online on 07 Jul 2024 03:33 next collapse

Wire does this too :/

refalo@programming.dev on 07 Jul 2024 04:50 next collapse

What is Wire?

southsamurai@sh.itjust.works on 07 Jul 2024 06:30 collapse

A different encrypted messaging service. Decent, but hasn’t taken off despite using email for accounts rather than phone bonkers numbers

[deleted] on 07 Jul 2024 10:34 collapse
.
southsamurai@sh.itjust.works on 07 Jul 2024 11:26 collapse

I mean, not really.

Which standard are they going to be forced to use? What infrastructure? What encryption? Are they going to be forced to develop apps for every platform?

The best you can hope to expect is apps using the same standard being compatible. Xmpp, matrix, whisper, whatever. Even matrix bridges don’t really fix compatibility across standards very well.

It’s nice to think that anyone anywhere, could expect to install any app and communicate with anyone else and maintain encryption as well as full privacy. But as far as anyone I’ve ever seen talk about it that’s actually trained in the technology behind it all, it isn’t possible unless there’s a single, enforced standard in use.

Does it suck to have to deal with multiple apps? Hell yes. But I also don’t like the idea of being forced to use whatever compromise protocol would make it realistic. I’d rather have a dozen apps with no single gatekeeper between them.

delirious_owl@discuss.online on 07 Jul 2024 14:19 collapse

Isn’t this going to be enforced by the EU 3 months ago?

possiblylinux127@lemmy.zip on 07 Jul 2024 16:20 collapse

Don’t use Wire as it isn’t good for privacy or security

delirious_owl@discuss.online on 07 Jul 2024 16:31 collapse

Don’t use signal as its not good for anonymity

possiblylinux127@lemmy.zip on 07 Jul 2024 16:57 collapse

It is better than Wire and cryptography wise it is very solid

delirious_owl@discuss.online on 07 Jul 2024 19:59 collapse

Wire has equal cryptography, but it also has anonymity. I don’t understand why anyone uses signal.

For the Sticker emojis, I guess

Neither encrypts keys on desktop. They really are both about equal with regard to crypto

Majestic@lemmy.ml on 07 Jul 2024 05:08 next collapse

There is just no excuse for not even salting or SOMETHING to keep the secrets out of plaintext. The reason you don’t store in plaintext is because it can lead to even incidental collection. Say you have some software, perhaps spyware, perhaps it’s made by a major corporation so doesn’t get called that and it crawls around and happens to upload a copy of a full or portion of the file containing this info, now it’s been uploaded and compromised potentially not even by a malicious actor successfully gaining access to a machine but by poor practices.

No it can’t stop a sophisticated malware specifically targeting Signal to steal credentials and gain access but it does mean casual malware that hasn’t taken the time out to write a module to do that is out of luck and increases the burden on attackers. No it won’t stop the NSA but it’s still something that it stops someone’s 17 year old niece who knows a little bit about computers but is no malware author from gaining access to your signal messages and account because she could watch a youtube video and follow along with simple tools.

The claims Signal is an op or the runner is under a national security letter order to compromise it look more and more plausible in light of weird bad basic practices like this and their general hostility. I’ll still use it and it’s far from the worst looking thing out there but there’s something unshakably weird about the lead dev, their behavior and practices that can’t be written off as being merely a bit quirky.

possiblylinux127@lemmy.zip on 07 Jul 2024 16:19 next collapse

To encrypt it you would need to store a encryption key

Kajika@lemmy.ml on 07 Jul 2024 16:52 next collapse

The irony

rmuk@feddit.uk on 07 Jul 2024 18:15 collapse

It’s plaintext all the way down.

uis@lemm.ee on 08 Jul 2024 04:15 collapse

for not even salting

Wrong secret

Majestic@lemmy.ml on 09 Jul 2024 00:23 collapse

I mean combined with any kind of function, even a trivial kind. A salt derived from some machine state data (a random install id generated on install, a hash of computer name, etc) plus a rot13 or something would still be better than leaving it plaintext.

uis@lemm.ee on 09 Jul 2024 01:25 collapse

Malware has access to it.

If fs is not encrypted, then malicious hardware(FSB agent’s laptop) also has access to it. If encrypted, then it we are back to statement many people told here about encrypting fs.

plus a rot13

That’s not salting.

mtchristo@lemm.ee on 07 Jul 2024 10:24 next collapse

You are telling me this has been going on for almost a decade now, and no one ever noticed ?

So we trust open source apps under the premise that if malicious code gets added to the code, at least one person will notice ? Here it shows that years pass before anyone notices and millions of people’s communications could have been compromised by the world’s most trusted messaging app.

I don’t know which app to trust after this, if any?

Mubelotix@jlai.lu on 07 Jul 2024 10:26 next collapse

Everyone knew that already tbh

derpgon@programming.dev on 07 Jul 2024 12:48 next collapse

Matrix. You can host any version you want, and when you have to update, just do a version diff between you current and latest versions and check yourself.

possiblylinux127@lemmy.zip on 07 Jul 2024 16:18 collapse

Why is this a shock? Someone would need to have already compromised your device. Even if it was encrypted with a password they still could install a key logger

mtchristo@lemm.ee on 07 Jul 2024 18:51 collapse

It is easier to compromise a device than to try and compromise encrypted communications.

Mubelotix@jlai.lu on 07 Jul 2024 10:27 next collapse

Sure, I was aware. You have the same problem with ssh keys, gpg keys and many other things

mr_satan@monyet.cc on 07 Jul 2024 12:15 collapse

However, you can save encrypted ssh, gpg keys and save that encryption key in the OS keyring.

derpgon@programming.dev on 07 Jul 2024 12:46 next collapse

Is it possible to seamlessly integrate, so when something requests those keys you’ll get a prompt?

todd_bonzalez@lemm.ee on 07 Jul 2024 13:43 collapse

With SSH at least you can password protect the key itself so that you always get a prompt.

derpgon@programming.dev on 07 Jul 2024 13:48 collapse

Nice, didn’t know, I’ll look into it

uis@lemm.ee on 08 Jul 2024 04:08 collapse

Yes, but you STILL need to enter password on every reboot.

sntx@lemm.ee on 07 Jul 2024 12:55 next collapse

I have three things to say:

  1. Everyone, please make sure you’ve set up sound disk encryption
  2. That’s not a suprise (for me at least)
  3. It’s not much different on mobile (db is unecrypted) - check out molly (signal fork) if you want to encrypt it. However encrypted db means no messages until you decrypt it.
Carbophile@lemmy.zip on 07 Jul 2024 17:20 next collapse

The backlash is extremely idiotic. The only two options are to store it in plaintext or to have the user enter the decryption key every time they open it. They opted for the more user-friendly option, and that is perfectly okay.

If you are worried about an outsider extracting it from your computer, then just use full disk encryption. If you are worried about malware, they can just keylog you when you enter the decryption key anyways.

Zak@lemmy.world on 07 Jul 2024 18:51 next collapse

The alternative is safeStorage, which uses the operating system’s credential management facility if available. On Mac OS and sometimes Linux, this means another process running in the user’s account is prevented from accessing it. Windows doesn’t have a protection against that, but all three systems do protect the credentials if someone copies data offline.

Signal should change this, but it isn’t a major security flaw. If an attacker can copy your home directory or run arbitrary code on your device, you’re already in big trouble.

x1gma@lemmy.world on 07 Jul 2024 20:14 next collapse

The third option is to use the native secret vault. MacOS has its Keychain, Windows has DPAPI, Linux has has non-standardized options available depending on your distro and setup.

Full disk encryption does not help you against data exfil, it only helps if an attacker gains physical access to your drive without your decryption key (e.g. stolen device or attempt to access it without your presence).

Even assuming that your device is compromised by an attacker, using safer storage mechanisms at least gives you time to react to the attack.

lengau@midwest.social on 08 Jul 2024 04:04 collapse

Linux has the secret service API that has been a freedesktop.org standard for 15 years.

uis@lemm.ee on 08 Jul 2024 04:07 collapse

Secret service API. Damn. That’s how FSB knows what it knows.

refalo@programming.dev on 09 Jul 2024 05:24 collapse

A better thing to be worried about IMO is that Signal contains proprietary code. Also to my knowledge nobody is publicly verifying the supposed “reproducible builds” if they even still exist.

01189998819991197253@infosec.pub on 07 Jul 2024 18:19 next collapse

Couldn’t they set up a 2fa, where it sends a notification to your mobile Signal (since you must have that anyway, to use desktop)? If you want to decrypt your Desktop Signal, you need to allow it on your Mobile Signal.

ExtremeDullard@lemmy.sdf.org on 07 Jul 2024 20:14 collapse

Whatever its stores and however it stores it doesn’t matter to me: I moved its storage space to my ~/.Private encrypted directory. Same thing for my browser: I don’t use a master password or rely on its encryption because I set it up so it too saves my profile in the ~/.Private directory.

See here for more information. You can essentially secure any data saved by any app with eCryptfs - at least when you’re logged out.

Linux-only of course. In Windows… well, Windows.

uis@lemm.ee on 08 Jul 2024 04:23 collapse

Or ext4 encrytion. Which is overpowered. You can have different keys for different files and directories.