• punkcoderEnglish
    arrow-up
    7
    arrow-down
    0
    ·
    3 months ago
    link
    fedilink

    I think the issue that they are trying to make is that there are modern ways of protecting the keys with hardware level security, that aren’t being used. As someone who works in AppSec this is all too common. All it takes is one library in an application to be popped (doesn’t have to be signal), and security keys end up leaked. If it isn’t already, I’m sure that signals keys will be included in exfil scripts.

    Tools like TPM and SecureEnclaves (TrustZone,etc) mean that malware, and other nasties have a higher bar that they need to meet.

    • douglasg14bEnglish
      arrow-up
      4
      arrow-down
      0
      ·
      3 months ago
      link
      fedilink

      Yeah, and electron already has a secureStorage API that handles the OS interop for you. Which signal isn’t using, and a PR already exists to enable

      • punkcoderEnglish
        arrow-up
        5
        arrow-down
        0
        ·
        3 months ago
        link
        fedilink

        I’m not surprised I think people (‘the ones that care at least’) would be horrified to know how much of this stuff slips through, because it’s hard (there are so many other things that are pulling at developers that something falls through the cracks). Most of the time the right answer is to bring it up. Then thank them when they resolve the issue (with beer and pizza money at the very least).

        Looks like it’s waiting for approval, https://github.com/signalapp/Signal-Desktop/pull/6933 for anyone else thats interested.