As mentioned in the comments, plain text keys aren’t bad because they are necessary. You have to have at least one plain text key in order to be able to use encryption

  • limitedduck@awful.systems
    link
    fedilink
    arrow-up
    55
    ·
    6 months ago

    I kind of agree that this may be a little overblown. Exploiting this requires device and filesystem access so if you can get the keys you can already get a lot more stuff.

    • ericjmorey@programming.dev
      link
      fedilink
      arrow-up
      12
      ·
      6 months ago

      A secure enclave can already be accessed by the time someone can access the Signal encryption keys , so there’s no extra security in putting the encryption keys in the secure enclave.

      • limitedduck@awful.systems
        link
        fedilink
        arrow-up
        4
        ·
        6 months ago

        Sorry, I don’t think I understand what you’re suggesting. Are you saying encryption keys should themselves be encrypted?

        FYI this story isn’t about plaintext passwords, it’s about plaintext encryption keys to chat history.

      • TimeSquirrel@kbin.melroy.org
        link
        fedilink
        arrow-up
        10
        ·
        edit-2
        6 months ago

        It’s eventually going to have to be stored in plaintext somewhere. Where are you then putting the encryption key for the encryption keys and how do you start the chain of decryption without the first key?