this post was submitted on 06 Jul 2024
212 points (100.0% liked)

Privacy Guides

16754 readers
1 users here now

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more...


Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don't ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don't repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

founded 1 year ago
MODERATORS
top 49 comments
sorted by: hot top controversial new old
[–] [email protected] 120 points 4 months ago (1 children)

on desktop devices

Kinda should have been in the headline

[–] [email protected] 44 points 4 months ago (2 children)

It is a super important detail, but it's still unforgivable for an app that expects privacy to be part of its brand identity.

[–] [email protected] 7 points 4 months ago

unforgivable

yeah absolutely agreed

[–] [email protected] 2 points 4 months ago (1 children)

This is a big difference between privacy and security.

[–] [email protected] 2 points 4 months ago (1 children)

Agreed

But you can't have privacy without security, and any privacy brand must have security in their bones.

[–] [email protected] 7 points 4 months ago

You can't encrypt anything without a key. This is the key. If it wasn't in plaintext then it would be encrypted. Then you'd need a key for that. Where do you put it?

Phone OSs have mechanisms to solve this. Desktop ones do not.

[–] [email protected] 69 points 4 months ago (2 children)

But.. That's how encryption keys are stored.

[–] [email protected] 46 points 4 months ago

No your don't understand, you're supposed to encrypt the keys.

Then you encrypt that key

And then that key

Until it's all encrypted /s

[–] [email protected] 21 points 4 months ago* (last edited 4 months ago)

opportunistic TPM integration would be nice.

I.e. use the security chip of the device, if one is found. Otherwise use password.

OR use a Nitrokey etc, which can act as a secure device to store these keys too.

Take that, Windows. You dont need a builtin TPM if you can use a Nitrokey 3 with a secure element, externally.

[–] [email protected] 51 points 4 months ago (1 children)

This same "discovery" gets reported on once or twice a year; it's starting to feel like a FUD campaign rather than actual research

[–] [email protected] 7 points 4 months ago* (last edited 4 months ago)

Yeah but it really shouldn't be that way. Just add a pin or something, it's way too easy for people to just grab devices or install malware to leak keys. The current standard for security is that everything is encrypted at rest regardless of whole disk encryption.

Signal is still better that most of the stuff out there but it's not above well intentioned criticism

[–] [email protected] 35 points 4 months ago

I just read the full article, and I'm not even that concerned about storing the key in plaintext. I find the possibility of copying the files, and then being able to run the same session simultaneously a lot scarier.

[–] [email protected] 33 points 4 months ago (1 children)

Not storing it in plaintext would require setting up some kind of password, right?

[–] [email protected] 15 points 4 months ago* (last edited 4 months ago)

Some way to encrypt the decryption key.

This could also mean TPM + Pin. Or using a Nitrokey, externally, which stores the password to decrypt the decryption key.

That is how user account unlocking (on GrapheneOS with Pixel phones) is done.

[–] [email protected] 31 points 4 months ago (2 children)

Should the encryption keys be... encrypted?

[–] [email protected] 14 points 4 months ago (2 children)

With what? Where would you store the encryption key for the encryption key on a desktop system where it would not be accessible to an attacker?

Perhaps there could be a pin or password that must be entered every time to decrypt it into memory.

[–] [email protected] 27 points 4 months ago (2 children)

As the article states, currently all processes are able to read the file which contains the key. Instead, you could store the key in the macOS Keychain (and Linux/Windows equivalents), which AFAIK is a list of all sorts of sensitive data (think WiFi passwords etc.), encrypted with your user password. I believe the Keychain also only let's certain processes see certain entries, so the Signal Desktop App could see only its own encryption key, whereas for example iMessage would only see the iMessage encryption key.

[–] [email protected] 7 points 4 months ago (1 children)

There is no single keychain on Linux, and supposedly on Windows too. Signal would need to either support a few dozens of password managers or require a specific one, both options terrible in their own way. This isn't something that can be done without making broad assumptions about the user's system.

[–] [email protected] 2 points 4 months ago* (last edited 4 months ago) (1 children)

I'm not too knowledgeable on that topic, but doesn't Linux store WiFi or smb-share passwords in some keychain?

Edit: missread your comment a little, I'm guessing you meant that there are multiple different keychains on Linux

[–] [email protected] 5 points 4 months ago

Either multiple different keychains or even you can have no keychain-like application in your system at all.

The WiFi passwords are usually stored in /etc/NetworkManager as plain files. Granted, they are not accessible directly by non-root users as they are being managed by the NetworkManager daemon, but there is nothing generic for such a thing. Signal rolling a similar daemon for itself would be an overkill. The big desktop environments (GNOME, KDE...) usually have their own keychain-like programs that the programs provided by these environments use, but that only solves this problem for the users of these specific environments.

To me it's perfectly expected the Signal encryption keys are readable by my user account.

[–] [email protected] 4 points 4 months ago (1 children)

Wifi passwords are piss easy to read out well at least on windows.

[–] [email protected] 2 points 4 months ago (1 children)

Only if you're logged in as an Administrator though. A "standard" user account can't access WiFi passwords on Windows.

[–] [email protected] 2 points 4 months ago (1 children)

Because a non admin account is the default right? Right?

[–] [email protected] 2 points 4 months ago* (last edited 4 months ago) (1 children)

UAC prompts you since vista if you want to let a process elevate it's rights to be able to do that

[–] [email protected] 1 points 4 months ago

Luckily nobody ever just clicks through those.

[–] [email protected] 4 points 4 months ago (2 children)

Something you know, something you have, something you are.

3FA:

  • Pin
  • Security Key/TPM/Secure element
  • fingerprint / iris scan

You could also start with just one of these

[–] [email protected] 5 points 4 months ago (2 children)

fingerprint / iris scan

Nope, I'm out. I'm not giving my unchangeable biological data to the Computer Gods because A) Fuck that and B) the police in my country can compel the use of biometrics to unlock things but cannot compel you to give up your pass as it is protected by the first amendment. Yes I think the bios should be protected too but that isn't the reality in which I live.

[–] [email protected] 4 points 4 months ago* (last edited 4 months ago) (1 children)

Nope, I'm out.

From the person you replied to, emphasis mine:

You could also start with just one of these

[–] [email protected] 2 points 4 months ago* (last edited 4 months ago)

I'm cool with non-biometrics.

(Though "3fa" and "could also" does imply he meant to use all three in concert, but that "just one" would be better than none.)

[–] [email protected] 1 points 4 months ago* (last edited 4 months ago)

Yeah that factor may not be wanted. But it is a security factor, because only you have it.

You could hash it securely so the computer gods dont know your fingerprint. And you could only use it in addition to another factor.

[–] [email protected] 1 points 4 months ago (1 children)

Isn't the idea that not everyone has access to your biometrics?

There's honestly no need to make computers ask people for piss scans:

something you know

A password

something you have

Access to the password

something you are

The person who knows the password

[–] [email protected] 1 points 4 months ago (1 children)

A password can be cracked and is often very bad.

[–] [email protected] 1 points 4 months ago (2 children)

But that can be said of any of the other such called factors:

A yubikey can be stolen

A fingerprint can be scanned and distributed

So its not really an argument against passwords (or passkeys, or passwordless, or whatever marketing want to call them these days).

[–] [email protected] 2 points 4 months ago

Most people just need to fear their passwords being cracked remotely. In masses.

If your threat model is being known, people stealing your stuff to login to your things, this is very high.

[–] [email protected] 2 points 4 months ago (1 children)

My yubikey can be stolen but good luck guessing my PIN in the 3 to 9 tries allowed before it self destructs.

[–] [email protected] 1 points 3 months ago (1 children)

luck? I have a $5* wrench.

* (Actually a $7 wrench. Inflation is murder around here.)

[–] [email protected] 2 points 3 months ago

If you have me... you win. My technology however will never betray me.

[–] [email protected] 6 points 4 months ago
[–] [email protected] 30 points 4 months ago (1 children)

While true I don't get why this is long known and also news at the same time.

For Signal Backup tools for example this isn't a bug but a feature and the only way to make long term archival of chats possible.

[–] [email protected] 4 points 4 months ago (1 children)

You could archive chats encrypted too.

[–] [email protected] 2 points 4 months ago

Yep, decrypt ... export elsewhere to csv txt json ... encrypt

[–] [email protected] 25 points 4 months ago (1 children)

If your computer is compromised to the point someone can read the key, read words 2-5 again.

This is FUD. Even if Signal encrypted the local data, at the point someone can run a process on your system, there's nothing to stop the attacker from adding a modified version of the Signal app, updating your path, shortcuts, etc to point to the malicious version, and waiting for you to supply the pin/password. They can siphon the data off then.

Anyone with actual need for concern should probably only be using their phone anyway, because it cuts your attack surface by half (more than half if you have multiple computers), and you can expect to be in possession/control of your phone at all times, vs a computer that is often left unattended.

[–] [email protected] 6 points 4 months ago

"if you've lost physical security, you've lost all security."

[–] [email protected] 11 points 4 months ago

I've heard criticism of the desktop app before as well, maybe they'll finally rework it?

[–] [email protected] 2 points 4 months ago (3 children)

Always knew this project was a honeypot because of their insistence on needing a phone number. Welp. Let's see how they damage control yet again.

[–] [email protected] 7 points 4 months ago

It originally needed a phone number because it was originally a phone texting app.

[–] [email protected] 4 points 4 months ago

You have the source. Read it if you want.

[–] [email protected] 2 points 4 months ago

I don't think it is a honeypot per se can you supply evidence.

But yes, their "leadership" does appear to ensure that this thing never goes mainstream with their focus on "journalists" or whatever. Exec does not seem to understand the core use base at best.

[–] [email protected] 1 points 3 months ago

Who is behind Stackdiary, btw?