Navigation
Search
|
After Criticism, Signal Agrees to Secure Plain-Text Encryption Keys for Users' Message Databases
Saturday July 13, 2024. 11:55 PM , from Slashdot
'Signal is finally tightening its desktop client's security,' reports BleepingComputer — by changing the way it stores plain text encryption keys for the SQLite database where users' messages are stored:
When BleepingComputer contacted Signal about the flaw in 2018, we never received a response. Instead, a Signal Support Manager responded to a user's concerns in the Signal forum, stating that the security of its database was never something it claimed to provide. 'The database key was never intended to be a secret. At-rest encryption is not something that Signal Desktop is currently trying to provide or has ever claimed to provide,' responded the Signal employee... [L]ast week, mobile security researchers Talal Haj Bakry and Tommy Mysk of Mysk Inc warned on X not to use Signal Desktop because of the same security weakness we reported on in 2018... In April, an independent developer, Tom Plant, created a request to merge code that uses Electron's SafeStorage API '...to opportunistically encrypt the key with platform APIs like DPAPI on Windows and Keychain on macOS,' Plant explained in the merge request... When used, encryption keys are generated and stored using an operating system's cryptography system and secure key stores. For example, on Macs, the encryption key would be stored in the Keychain, and on Linux, it would use the windows manager's secret store, such as kwallet, kwallet5, kwallet6, and gnome-libsecret... While the solution would provide additional security for all Signal desktop users, the request lay dormant until last week's X drama. Two days ago, a Signal developer finally replied that they implemented support for Electron's safeStorage, which would be available soon in an upcoming Beta version. While the new safeStorage implementation is tested, Signal also included a fallback mechanism that allows the program to decrypt the database using the legacy database decryption key... Signal says that the legacy key will be removed once the new feature is tested. 'To be fair to Signal, encrypting local databases without a user-supplied password is a problem for all applications...' the article acknowledges. 'However, as a company that prides itself on its security and privacy, it was strange that the organization dismissed the issue and did not attempt to provide a solution...' Read more of this story at Slashdot.
https://it.slashdot.org/story/24/07/13/2151227/after-criticism-signal-agrees-to-secure-plain-text-en...
Related News |
25 sources
Current Date
Dec, Sun 22 - 07:49 CET
|