254
top 50 comments
sorted by: hot top controversial new old
[-] quantumcog@sh.itjust.works 184 points 1 month ago* (last edited 1 month ago)

I understand Signal's stance on this. For this vulnerability, the attacker needs physical access to computer. If the attacker has already gained physical access, the attacker can already access your messages, crypto wallets, password managers.

Many password managers also have this flaw. For example, Someone can change Keepass master password if the user is already logged in to the session, if they have physical access to the PC and lock you out of all your accounts.

[-] thurstylark@lemm.ee 13 points 1 month ago

Yeah, this is why I added a hardware key to my db. The hardware key is required not just for reading the db, but writing to it as well.

Another tip: use something like an OnlyKey that has its own locking and self-destruct mechanisms so this method isn't foiled by simply acquiring the key.

[-] partial_accumen@lemmy.world 6 points 1 month ago

For example, Someone can change Keepass master password if the user is already logged in to the session, if they have physical access to the PC and lock you out of all your accounts.

This seems like easy fix is available. On Windows, Access Shadow copies, restore previous version from $DayBeforeLockout. Or on Linux, specific file systems have automatic volume level snapshotting available. Or on either...restore the keepass file from a backup before the change.

[-] quantumcog@sh.itjust.works 4 points 1 month ago

Yeah, I know about this. That's why backups are so important.

[-] eager_eagle@lemmy.world 83 points 1 month ago* (last edited 1 month ago)

The whole drama seems to be pushing for Electron's safeStorage API, which uses a device's secrets manager. But aren't secrets stored there still accessible when the machine is unlocked anyway? I'm not sure what this change accomplishes other than encryption at rest with the device turned off - which is redundant if you're using full disk encryption.

I don't think they're downplaying it, it just doesn't seem to be this large security concern some people are making it to be.

This is like the third time in the past two months I've seen someone trying to spread FUD around Signal.

[-] priapus@sh.itjust.works 32 points 1 month ago

Yeah they are, this problem is super overblown. Weirdly I've seen articles about this coming up for other apps too, like the ChatGPT app for MacOS storing conversation history in plain text on the device. Weird that this is suddenly a problem.

If someone wants better security, the can use full disk encryption and encrypt their home directory and unlock it on login.

[-] GamingChairModel@lemmy.world 8 points 1 month ago

But aren't secrets stored there still accessible when the machine is unlocked anyway?

I think the OS prevents apps from accessing data in those keychains, right? So there wouldn't be an automated/scriptable way to extract the key in as easy of a way.

[-] eager_eagle@lemmy.world 3 points 1 month ago

But that's the thing: I haven't found anything that indicates it can differentiate a legitimate access from a dubious one; at least not without asking the user to authorize it by providing a password and causing the extra inconvenience.

If the wallet asked the program itself for a secret - to verify the program was legit and not a malicious script - the program would still have the same problem of storing and retrieving that secret securely; which defeats the use of a secret manager.

[-] GamingChairModel@lemmy.world 2 points 1 month ago

I haven't found anything that indicates it can differentiate a legitimate access from a dubious one

It's not about legitimate access versus illegitimate access. As I understand it, these keychains/wallets can control which specific app can access any given secret.

It's a method of sandboxing different apps from accessing the secrets of other apps.

In function, browser access to an item can be problematic because browsers share data with the sites that it visits, but that's different from a specific app, hardcoded to a specific service being given exclusive access to a key.

[-] eager_eagle@lemmy.world 2 points 1 month ago* (last edited 1 month ago)

upon reading a bit how different wallets work, it seems macos is able to identify the program requesting the keychain access when it's signed with a certificate - idk if that's the case for signal desktop on mac, and I don't know what happens if the program is not signed.

As for gnome-keyring, they ackowledge that doing it on Linux distros this is a much larger endeavor due to the attack surface:

An active attack is where the attacker can change something in your security context. In the context of gnome-keyring an active attacker would have access to your user session in some way. An active attacker might install an application on your computer, display a window, listen into the X events going to another window, read through your memory, snoop on you from a root account etc.

While it'd be nice for gnome-keyring to someday be hardened against active attacks originating from the user's session, the reality is that the free software "desktop" today just isn't architected with those things in mind. We need completion and integration things like the following. Kudos to the great folks working on parts of this stuff:

- Trusted X (for prompting)
- Pervasive use of security contexts for different apps (SELinux, AppArmor)
- Application signing (for ACLs) 

We're not against the goal of protecting against active attacks, but without hardening of the desktop in general, such efforts amount to security theater.

Also

An example of security theater is giving the illusion that somehow one application running in a security context (such as your user session) can keep information from another application running in the same security context.

In other words, the problem is beyond the scope of gnome-keyring. Maybe now with diffusion of Wayland and more sandboxing options reducing this context becomes viable.

[-] AProfessional@lemmy.world 1 points 1 month ago

You are absolutely correct. This can help in a world where every app is well sandboxed (thus can be reliably identified and isolated).

[-] mp3@lemmy.ca 8 points 1 month ago* (last edited 1 month ago)

Security comes in layers, still better than storing the keys in plaintext, and FDE is also important.

[-] woelkchen@lemmy.world 6 points 1 month ago

This is like the third time in the past two months I’ve seen someone trying to spread FUD around Signal.

If any other messenger had the same issue, Moxie Marlinspike and fans would have an outcry on biblical proportions.

[-] whostosay@lemmy.world 9 points 1 month ago
[-] douglasg14b@lemmy.world 5 points 1 month ago* (last edited 1 month ago)

Yes but it pushes it to an operating system level and that means everyone wins as the operating system solutions to improve as vulnerabilities are found and resolved.

You also don't need rce access to exfiltrate data. If decrypted keys are held in memory, that mitigates an entire class of vulnerabilities from other applications causing your private chats from leaking.

Full disk encryption is not a solution here. Any application that's already running which can provide read only file system access to an attacker is not going to be affected by your full disk encryption.

[-] eager_eagle@lemmy.world 3 points 1 month ago

Full disk encryption is not a solution here. Any application that’s already running which can provide read only file system access to an attacker is not going to be affected by your full disk encryption.

that's my point

xz? twitter? x11? placeholder?

[-] Tja@programming.dev 11 points 1 month ago

It's an equation. One of those "left for the reader". Please start solving it.

[-] OfficerBribe@lemm.ee 18 points 1 month ago* (last edited 1 month ago)

Windows Recall had the same issue with data storage. Interesting difference between both comment sections, there it was a bit more aggressive.

[-] NicoCharrua@lemmy.ca 47 points 1 month ago

Microsoft was claiming that the data would be inaccessible to hackers (which is not true).

Signal claimed the exact opposite: that once it's on your computer, messages can be seen by malicious programs on your computer.

Signal was caught having less than ideal security. Microsoft was caught lying.

[-] OfficerBribe@lemm.ee -2 points 1 month ago

Could not find much info about that claim, but context probably was that data is not possible to be accessed without compromising device, e.g., not possible to get info over network or by compromising some central location on remote server because there is none and all that data is stored locally.

[-] eager_eagle@lemmy.world 29 points 1 month ago

let me just highlight that if someone has access only to your signal desktop conversations, they have access to your signal desktop conversations.

if someone has access to your windows recall db, they have access to your signal desktop conversations, the pages you've browsed including in private windows, documents you've written, games you've played, social media posts you've seen, and pretty much anything you've done using that machine.

perhaps that does demand a slightly different level of concern.

this post was submitted on 12 Jul 2024
254 points (93.2% liked)

Technology

57226 readers
4652 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS