Signal Upgrade Process Leaves Unencrypted Messages on Disk

Discussion in 'privacy problems' started by guest, Oct 22, 2018.

  1. guest

    guest Guest

    Signal Upgrade Process Leaves Unencrypted Messages on Disk
    October 22, 2018
    https://www.bleepingcomputer.com/ne...-process-leaves-unencrypted-messages-on-disk/
     
  2. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    So just create a ramdisk, and nuke it when you're done. But then, Signal could do that for you ;)
     
  3. Beyonder

    Beyonder Registered Member

    Joined:
    Aug 26, 2011
    Posts:
    545
    Wasn't this already posted in another thread?

    Anyway, a crazy idea is to use EFS in Windows 10 Pro to encrypt the Signal folder.
     
  4. guest

    guest Guest

    Signal Desktop Leaves Message Decryption Key in Plain Sight
    October 23, 2018
    https://www.bleepingcomputer.com/ne...leaves-message-decryption-key-in-plain-sight/
     
  5. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    That's rather funny :)

    I can imagine that they were figuring that all bets are off, no matter what, if adversaries have local access to a machine.

    But there are standard mitigations. As GnuPG and OpenSSH do, they could password encrypt the key, and leave it available for some minutes after decrypting. Or like LUKS, store the key in RAM.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.