87
submitted 1 year ago by AprilF00lz@lemmy.ml to c/privacy@lemmy.ml

I'm thinking of the things listed on the Privacy Guides real-time communication section

https://www.privacyguides.org/en/real-time-communication/

you are viewing a single comment's thread
view the rest of the comments
[-] jet@hackertalks.com 14 points 1 year ago

Signal isn't federated. Signal has centralized servers. Signal requires phone number identification to use it. Signal stores your encryption key on their servers.... Relying on sgx enclaves to 'protrct' your encryption key.

Signal can go down. Signal knows who you talk to, just by message timing. Signal knows how frequently you talk to someone. Signal can decrypt your traffic by attack their own sgx enclaves and extracting your encryption key.

These are all possible threats and capabilities. You have to decide what tradeoff makes sense to you. Fwiw I still use signal.

[-] 7eter@feddit.de 11 points 1 year ago* (last edited 1 year ago)

Signal stores your encryption key on their servers....

That would surprise me. What's your source for this?

[-] jet@hackertalks.com 0 points 1 year ago
[-] ryannathans@aussie.zone 3 points 1 year ago

master_key is never stored or sent to the SGX, only c2, the entropy bits. The user's password is still required to generate the key.

[-] jet@hackertalks.com 4 points 1 year ago* (last edited 1 year ago)

Brute forcing 4-6 digit pins is trivial.

And even if the user set a actual password, it's still very trivial

https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/

[-] ryannathans@aussie.zone 2 points 1 year ago

"Very trivial" if they set a proper password? Yet the source you provide says it's robustly secure

[-] jet@hackertalks.com 0 points 1 year ago

I can't find the phrase robustly secure in the last link:

https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/

Signal asks users to set a pin/password which needs to be periodically reentered. This discourages people from using high entropy passwords like BIP38.

[-] Gooey0210@sh.itjust.works 3 points 1 year ago

The password is literally a pin

[-] ryannathans@aussie.zone 3 points 1 year ago

If you set a small pin, perhaps. Most people set a password

[-] Gooey0210@sh.itjust.works 2 points 1 year ago

Pin is the suggested option, so I really doubt "most" of the people choose password

[-] ryannathans@aussie.zone 3 points 1 year ago

Most people who care* I guess would be more apt

[-] jet@hackertalks.com 1 points 1 year ago

For the people who really care, they can disable The pin. I believe the client will generate a BIP 38 password randomly, and use that for the data encrypted in the SVR. But all the data is still uploaded to the cloud. So if there's a problem with the SVR encoding, the BIP 38 password generation etc the data is still exploited

Not only do you have to care, everyone you talk to has to do the same thing, because if your counterparty has their key in the cloud, the conversation is at risk.

[-] ryannathans@aussie.zone 2 points 1 year ago

Regardless, the master key is never uploaded

[-] jet@hackertalks.com 1 points 1 year ago* (last edited 1 year ago)

All the bits to reconstruct the master key minus the pin code are uploaded. So it's equivalent to uploading to the cloud The master key itself.

Very few people are using BIP 38 level passwords. So the vast majority of people have their key constructively uploaded fully in the cloud

load more comments (28 replies)
this post was submitted on 15 Apr 2024
87 points (94.8% liked)

Privacy

39550 readers
696 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS