-
-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Desktop app does not support protected storage #5703
Comments
See #5541. |
BTW, Telegram is not really better here - users can set a PIN for locking access, but this is not activated automatically (after some configurable time or so), and message data is not encrypted using it. |
In case someone questions the relevance of data encryption for the desktop client: |
A general remark. |
And please do not repeat the excuse given by @scottnonnenberg back in 2017 Until this is fixed, the workaround is clear: |
A worrying issue here is that even if you do not use the Signal desktop app yourself, |
It's about processes. Leaving this issue open or closing it does nothing to implement this feature, nor does it impact their priorities. They already know it's not there anyway, so it's not helping. It does however make it harder to see which bugs are actionable, since it's essentially noise. But #5541 already explains that. |
This bug is actionable, but apparently nothing has been done about it since 4+ years. |
There would be more detail to mention here w.r.t. technology and effects of this bug, |
That'll be my last comment here, so last try: imagine if you hadn't created this issue. What would be the difference? Given that:
my point (and what #5541 tries to convey) is that there would be no difference, apart from the noise it adds. If you're really interested in getting more impact here, you'd be better off convincing users on the forum. |
Thanks @hiqua for your further comments. Ah, so far I had not paid attention to https://community.signalusers.org/
I am not so much a Signal user, but a security professional currently investigating into messenger security. And I find it even more weird to learn that until early 2018, Signal on Android supported sensible protection, From a security standpoint it is depressing to read that Signal was pledged not to do this, but still did: |
This comment has been minimized.
This comment has been minimized.
All right, I've entered the discussion on this and related topics on https://community.signalusers.org/, |
If you want more security, then you may use a tool that encrypts the filesystem (such as LUKS in Linux): this will hamper access to all your personal data, if the PC/notebook is stolen. This also is more convenient than having encryption keys for each and any program managing sensitive data; indeed you can have a master password in Thunderbird , and you can encrypt documents in LibreOffice, but then in the end encrypting the whole filesystem makes more sense, IMHO. |
Thanks for your response - I agree that FDE is more convenient to use, |
If you are using EXT4, there is provision for encrypting a directory tree, even when it was already filed with data. For BTRFS it is still work in progress. As for protection to spyware... when it is running in the system, there is not much you can do, it could keylog you access to Signal and use the password you insert to read the databases anyway. |
All the system-level protection options strongly depends on the capabilities of the owner/user of the system, which in most case are not sufficient. Concerning spyware, it depends on its capabilities. A pretty targeted one would need to be installed and need to interact with the running app in order to recover or work around the encryption. |
As discussed at various places here and on the user forum, there are various reasons why a user may feel the need to have the (possibly extra) level of protection by a user-defined passphrase. I see no good reason not to offer additional encryption based on a passphrase (optionally) provided by the user, in particular since the ingredients are readily available, even a PR: #5465 that implements this. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This issue has been closed due to inactivity. |
You can mitigate keylogging^^ Depends on the access and the other mitigations of the system. However, where is a plausible, proper argument against the additional protection? Since:
|
This issue was closed automatically after three months of 'inactivity' and after a pretty short warning period of one week. This is bad style. |
The ultimate conclusion from this topic, which is discussed also in many other places is: Signal does not really care about its users. |
At least not about the people who contribute (either in Community or as devs)... ^^ |
Why issues in their opinion there is no issue xD They argue with "this is not a security issue, because you could have keyloggers" lmao |
Right. Those in rule/responsibility of Signal even keep others from contributing what is wanted/needed by users concerned about security. |
People might wonder, WHY. We should send it to an news paper, which reports about tech conflicts. |
The mobile Signal app supports protecting access using, e.g., a pattern or fingerprint.
I hope, but doubt, that this also entails sensibly encrypted data storage,
which would be based on a user-supplied secret that is not stored on the device.
The desktop app obviously does not support anything like this!
There have been multiple reports and requests in this direction since more than
four5 years -see, e.g., #452, #1850, #1895, and #2008, but they were denied and further commenting on them was locked.
There is even a pull request #5465 provided by a user that would have solved the issue, but it was rejected.
Are you serious?
For a messenger that boasts high-grade end-to-end encryption,
this situation is not just a missing feature but a severe security flaw.
The text was updated successfully, but these errors were encountered: