Skip Navigation

Signal under fire for storing encryption keys in plaintext

stackdiary.com Signal under fire for storing encryption keys in plaintext

Popular encrypted messaging app Signal is facing criticism over a security issue in its desktop application. Researchers and app users are raising

Signal under fire for storing encryption keys in plaintext
15

You're viewing a single thread.

15 comments
  • I think the issue that they are trying to make is that there are modern ways of protecting the keys with hardware level security, that aren’t being used. As someone who works in AppSec this is all too common. All it takes is one library in an application to be popped (doesn’t have to be signal), and security keys end up leaked. If it isn’t already, I’m sure that signals keys will be included in exfil scripts.

    Tools like TPM and SecureEnclaves (TrustZone,etc) mean that malware, and other nasties have a higher bar that they need to meet.

    • Yeah, and electron already has a secureStorage API that handles the OS interop for you. Which signal isn't using, and a PR already exists to enable...

      • I'm not surprised... I think people ('the ones that care at least') would be horrified to know how much of this stuff slips through, because it's hard (there are so many other things that are pulling at developers that something falls through the cracks). Most of the time the right answer is to bring it up. Then thank them when they resolve the issue (with beer and pizza money at the very least).

        Looks like it's waiting for approval, https://github.com/signalapp/Signal-Desktop/pull/6933 for anyone else thats interested.

15 comments