Nemeski@lemm.ee to Privacy Guides@lemmy.oneEnglish · 6 months agoSignal under fire for storing encryption keys in plaintextstackdiary.comexternal-linkmessage-square49fedilinkarrow-up1214arrow-down10cross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldprivacy@lemmy.mltechnology@lemmy.worldfoss@beehaw.org
arrow-up1214arrow-down1external-linkSignal under fire for storing encryption keys in plaintextstackdiary.comNemeski@lemm.ee to Privacy Guides@lemmy.oneEnglish · 6 months agomessage-square49fedilinkcross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldprivacy@lemmy.mltechnology@lemmy.worldfoss@beehaw.org
minus-squarekakito69@sh.itjust.workslinkfedilinkEnglisharrow-up33·6 months agoNot storing it in plaintext would require setting up some kind of password, right?
minus-squareboredsquirrel@slrpnk.netlinkfedilinkEnglisharrow-up15·edit-26 months agoSome way to encrypt the decryption key. This could also mean TPM + Pin. Or using a Nitrokey, externally, which stores the password to decrypt the decryption key. That is how user account unlocking (on GrapheneOS with Pixel phones) is done.
Not storing it in plaintext would require setting up some kind of password, right?
Some way to encrypt the decryption key.
This could also mean TPM + Pin. Or using a Nitrokey, externally, which stores the password to decrypt the decryption key.
That is how user account unlocking (on GrapheneOS with Pixel phones) is done.