July 6th, 2024

Signal under fire for storing encryption keys in plaintext

Signal's desktop app stores encryption keys in plaintext, risking data theft. Users' security responsibility increases post-data arrival. Despite criticism, Signal hasn't fixed the issue. Caution advised for desktop app usage.

Read original articleLink Icon
Signal under fire for storing encryption keys in plaintext

Signal's desktop application has come under scrutiny for storing encryption keys in plaintext, potentially exposing users to data theft. Cybersecurity researchers discovered that Signal's desktop app stores local chat history encryption keys in a plaintext file accessible by any process on the system. This flaw allows for the easy restoration of entire Signal sessions on different devices without detection. Signal's approach to end-to-end encryption focuses on protecting data in transit, shifting the responsibility for security to users once data reaches their devices. Despite past criticism and recommendations to improve security measures, Signal has not addressed the issue. Concerns have been raised about the security implications of storing encryption keys in plaintext, with suggestions for more cautious users to reconsider using the desktop version of Signal. The investigation also highlights similar encryption key storage issues in other applications like WhatsApp and Apple's iMessage, emphasizing the importance of securing locally stored data to prevent unauthorized access.

Link Icon 2 comments