Yo dawg
Comment on Signal under fire for storing encryption keys in plaintext
Blizzard@lemmy.zip 4 months ago
Should the encryption keys be… encrypted?
RagingHungryPanda@lemm.ee 4 months ago
Comment on Signal under fire for storing encryption keys in plaintext
Blizzard@lemmy.zip 4 months ago
Should the encryption keys be… encrypted?
Yo dawg
henfredemars@infosec.pub 4 months ago
With what? Where would you store the encryption key for the encryption key on a desktop system where it would not be accessible to an attacker?
Perhaps there could be a pin or password that must be entered every time to decrypt it into memory.
eco_game@discuss.tchncs.de 4 months ago
As the article states, currently all processes are able to read the file which contains the key. Instead, you could store the key in the macOS Keychain (and Linux/Windows equivalents), which AFAIK is a list of all sorts of sensitive data (think WiFi passwords etc.), encrypted with your user password. I believe the Keychain also only let’s certain processes see certain entries, so the Signal Desktop App could see only its own encryption key, whereas for example iMessage would only see the iMessage encryption key.
TheEntity@lemmy.world 4 months ago
There is no single keychain on Linux, and supposedly on Windows too. Signal would need to either support a few dozens of password managers or require a specific one, both options terrible in their own way. This isn’t something that can be done without making broad assumptions about the user’s system.
eco_game@discuss.tchncs.de 4 months ago
I’m not too knowledgeable on that topic, but doesn’t Linux store WiFi or smb-share passwords in some keychain?
muntedcrocodile@lemm.ee 4 months ago
Wifi passwords are piss easy to read out well at least on windows.
eco_game@discuss.tchncs.de 4 months ago
Only if you’re logged in as an Administrator though. A “standard” user account can’t access WiFi passwords on Windows.
boredsquirrel@slrpnk.net 4 months ago
Something you know, something you have, something you are.
3FA:
You could also start with just one of these
ArcaneSlime@lemmy.dbzer0.com 4 months ago
Nope, I’m out. I’m not giving my unchangeable biological data to the Computer Gods because A) Fuck that and B) the police in my country can compel the use of biometrics to unlock things but cannot compel you to give up your pass as it is protected by the first amendment. Yes I think the bios should be protected too but that isn’t the reality in which I live.
FutileRecipe@lemmy.world 4 months ago
From the person you replied to, emphasis mine:
boredsquirrel@slrpnk.net 4 months ago
Yeah that factor may not be wanted. But it is a security factor.
You could hash it securely so the computer gods dont know your fingerprint. And you could only use it in addition to another factor.
veniasilente@lemm.ee 4 months ago
Isn’t the idea that not everyone has access to your biometrics?
There’s honestly no need to make computers ask people for piss scans:
A password
Access to the password
The person who knows the password
boredsquirrel@slrpnk.net 4 months ago
A password can be cracked and is often very bad.