The company behind the Signal clone used by at least one Trump administration official was breached earlier this month. The hacker says they got in thanks to a basic misconfiguration.
This app…works in almost exactly the same way as Signal, except that it also archives copies of all the messages passing through it, shattering all of its security guarantees.
Later in the article, it talks specifically about the server-side archives being stored in plain text. That’s why the hacker was able to access messages. This isn’t about the local copies on phones.
You are confused. I’m not “intentionally misreading” anything, it was written incorrectly. I’m not trying to argue anything. I’m just reading the (wrong) words used in the article. When I come across a piece of misinformation, I don’t continue reading in the hopes that they clear it up later, I write it off and close it.
Someone else cleared this up. There’s no reason to continue arguing about it.
Seems like willful illiteracy & incomplete evidence fallacy.
There was literally all the resources on the internet & a quick search to check hastily drawn conclusions before posting them.
I’m still not confused and you’re still missing the forest for the trees because you don’t like the common practice of including the server infrastructure when talking about apps.
There was a plaintext archive of messages on a remote server. That’s a security problem no matter what point you’re trying to make about the term app.
Once again, this has already been cleared up elsewhere. Since you seem intent on dragging this out for some reason, you’re going to be blocked. Have a nice night.
This is now the third post in the last 24 hours where I stumble into a needlessly long thread because this user is completely obtuse and can’t handle being wrong or a different opinion.
The passphrase or the unencrypted database are still open in memory. Though that is, of course, a more complicated attack but they could simply read it through the app itself.
You can set it to wipe them from memory on different conditions, including instantly if youre that paranoid, sure its still possible. Its an optional feature most people wont use, but its pretty well thought out.
They weren’t talking about the server:
Later in the article, it talks specifically about the server-side archives being stored in plain text. That’s why the hacker was able to access messages. This isn’t about the local copies on phones.
Yeah I didn’t read past the misinformation
Kinda seems like you’re the misinformation.
You’re confused, I am not the author of this article. I did not write the statement above, just copied and pasted it here.
I’m not confused, you’re intentionally misreading what’s happening for some reason.
“Passing through it” pretty clearly refers to the server as that’s what was hacked into and had plain text archives.
You’re hyper fixating on the fact that the article says “the app” when referring to both the phone and server pieces to try and argue… something.
You are confused. I’m not “intentionally misreading” anything, it was written incorrectly. I’m not trying to argue anything. I’m just reading the (wrong) words used in the article. When I come across a piece of misinformation, I don’t continue reading in the hopes that they clear it up later, I write it off and close it.
Someone else cleared this up. There’s no reason to continue arguing about it.
Seems like willful illiteracy & incomplete evidence fallacy. There was literally all the resources on the internet & a quick search to check hastily drawn conclusions before posting them.
I’m still not confused and you’re still missing the forest for the trees because you don’t like the common practice of including the server infrastructure when talking about apps.
There was a plaintext archive of messages on a remote server. That’s a security problem no matter what point you’re trying to make about the term app.
I do like common terminology, that’s the problem.
Once again, this has already been cleared up elsewhere. Since you seem intent on dragging this out for some reason, you’re going to be blocked. Have a nice night.
Maybe you should start reading up on stuff you don’t know about before adding nonsense to internet threads.
This is now the third post in the last 24 hours where I stumble into a needlessly long thread because this user is completely obtuse and can’t handle being wrong or a different opinion.
Don’t know what you mean. I didn’t add any “nonsense”. Just a direct quote from the article in question.
Totally /s Can’t even read your own comments.
It’s why Molly has local database encryption.
That doesn’t really do anything. Attackers need local access to the device to get the database itself. Chances are, they’ll get the key right with it.
Molly encrypts it using a passphrase instead of a locally stored key for exactly that reason.
The passphrase or the unencrypted database are still open in memory. Though that is, of course, a more complicated attack but they could simply read it through the app itself.
You can set it to wipe them from memory on different conditions, including instantly if youre that paranoid, sure its still possible. Its an optional feature most people wont use, but its pretty well thought out.
Sounds great!
The only backup option I see for Signal is through Android, but it’s optional. There is no backup support for iOS or desktop.
https://support.signal.org/hc/en-us/articles/360007059752-Backup-and-Restore-Messages