Signal under fire for storing encryption keys in plaintext on desktop app

Open link in next tab

Signal under fire for storing encryption keys in plaintext

https://stackdiary.com/signal-under-fire-for-storing-encryption-keys-in-plaintext/

Popular encrypted messaging app Signal is facing criticism over a security issue in its desktop application. Researchers and app users are raising

Signal under fire for storing encryption keys in plaintext
See all comments

The third option is to use the native secret vault. MacOS has its Keychain, Windows has DPAPI, Linux has has non-standardized options available depending on your distro and setup.

Full disk encryption does not help you against data exfil, it only helps if an attacker gains physical access to your drive without your decryption key (e.g. stolen device or attempt to access it without your presence).

Even assuming that your device is compromised by an attacker, using safer storage mechanisms at least gives you time to react to the attack.

Linux has the secret service API that has been a freedesktop.org standard for 15 years.

Secret service API. Damn. That's how FSB knows what it knows.