"This attack was possible because, although Signal encrypts the local database containing confidential data (including messages and keys), it stored the database decryption keys in plaintext." - https://cryptographycaffe.sandboxaq.com/posts/protecting-...
-
"This attack was possible because, although Signal encrypts the local database containing confidential data (including messages and keys), it stored the database decryption keys in plaintext." - https://cryptographycaffe.sandboxaq.com/posts/protecting-signal-desktop-keys/
If a guide to a post-Trump online world recommends using centralized services one National Security Letter away from being used against you, that guide hasn't considered you in their threat model.
-
@stevelord glad to see PIV still being relevant; i've used u2f keys for openssh and like that compared to juggling certificates but i do rather like S/MIME for all the good that does me. thanks for sharing that i have to really dig into that later it's pretty dense!
-
@emory Yup. I wonder if there's a route to using an onboard TPM instead of a Yubikey.
-
That should be doable. The issue is mostly how you want to have the key policy.