ForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 6 months agoSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comexternal-linkmessage-square258fedilinkarrow-up1504cross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldtechnology@lemmy.worldfoss@beehaw.orgprivacyguidesprivacy@lemmy.ca
arrow-up1504external-linkSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 6 months agomessage-square258fedilinkcross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldtechnology@lemmy.worldfoss@beehaw.orgprivacyguidesprivacy@lemmy.ca
minus-squareuis@lemm.eelinkfedilinkarrow-up3·6 months agoIndeed, End-to-End Encryption protects data between those ends, not ends themselves. If ends are compromised, no math will help you.
Indeed, End-to-End Encryption protects data between those ends, not ends themselves. If ends are compromised, no math will help you.