ForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 4 months agoSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comexternal-linkmessage-square258fedilinkarrow-up1513arrow-down130cross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldtechnology@lemmy.worldprivacyguides@lemmy.oneprivacy@lemmy.ca
arrow-up1483arrow-down1external-linkSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 4 months agomessage-square258fedilinkcross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldtechnology@lemmy.worldprivacyguides@lemmy.oneprivacy@lemmy.ca
minus-squareuis@lemm.eelinkfedilinkarrow-up1·4 months agoMalware has access to it. If fs is not encrypted, then malicious hardware(FSB agent’s laptop) also has access to it. If encrypted, then it we are back to statement many people told here about encrypting fs. plus a rot13 That’s not salting.
Malware has access to it.
If fs is not encrypted, then malicious hardware(FSB agent’s laptop) also has access to it. If encrypted, then it we are back to statement many people told here about encrypting fs.
That’s not salting.