Nemeski@lemm.ee to privacy@lemmy.ca · 1 year agoSignal under fire for storing encryption keys in plaintextstackdiary.comexternal-linkmessage-square16fedilinkarrow-up182cross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldfoss@beehaw.orgprivacyguides
arrow-up182external-linkSignal under fire for storing encryption keys in plaintextstackdiary.comNemeski@lemm.ee to privacy@lemmy.ca · 1 year agomessage-square16fedilinkcross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldfoss@beehaw.orgprivacyguides
minus-squarem-p{3}@lemmy.calinkfedilinkarrow-up11·1 year agoStoring the encryption keys in the Credentials Manager (Windows) or the Keychain (macOS, Linux) would be a better choice than a plaintext file. And using Bitlocker / VeraCrypt / Filevault / LUKS will at least protect the data at rest. But as you said, it’s game over if the machine is compromised.
Storing the encryption keys in the Credentials Manager (Windows) or the Keychain (macOS, Linux) would be a better choice than a plaintext file.
And using Bitlocker / VeraCrypt / Filevault / LUKS will at least protect the data at rest.
But as you said, it’s game over if the machine is compromised.