Natanji
2015-12-07 17:50:19 UTC
Hi all,
I've been using Signal/TextSecure for a really long time and have been
really happy about the additional of Signal Desktop. However, I noticed
that Signal Desktop does not give users the option to encrypt the data
on the device with a user-defined password, which is something the
Android app offers.
I believe this is a very real threat to user's security and no full,
public version of Signal should be released that doesn't offer this
option. This has a lot to do with what I view as the threat model for
Signal Desktop, and I want to explain here why I think that Signal
Desktop should actually *never* store unencrypted data on a user's
device, and perhaps even *force* users to encrypt the data with a
user-defined password.
One reason for this is that on most Desktop OSes (e.g. Windows), the
data folder can be accessed by any program running on the computer. This
is different from the Android and iOS system where each app runs in a
much more sandboxed environment. We've seen in the past that even
popular applications like Skype somehow access delicate data such as the
Firefox password database. What I'm saying is, you cannot prevent apps
on Desktop from reading out all the data that Signal has saved. You
might be able to prevent an app from directly accessing another app's
memory and getting all the files from there though - I don't know enough
about this, I'm not an expert on Linux/Windows permissions.
Also, full device encryption isn't ubiquitous on Desktop OSes, but both
standard on iOS and Android. So when a device gets lost in a turned-off
state, it's arguably worse on a Desktop OS. We also should inform users
about what they need to do if their device ever gets lost (e.g., remove
it from the "devices" listed in the mobile app immediately)
In any case, I am wondering about the current threat model that Whisper
Systems sees for Signal, and in what way this issue has perhaps already
been addressed? Signal Desktop is just out, so it's crucial that users
are informed about ways by which they can protect their data.
(This issue was brought up in Signal Desktop bug #452, and I was
referred to this mailing list there, so here I am.)
Cheers,
Natanji
I've been using Signal/TextSecure for a really long time and have been
really happy about the additional of Signal Desktop. However, I noticed
that Signal Desktop does not give users the option to encrypt the data
on the device with a user-defined password, which is something the
Android app offers.
I believe this is a very real threat to user's security and no full,
public version of Signal should be released that doesn't offer this
option. This has a lot to do with what I view as the threat model for
Signal Desktop, and I want to explain here why I think that Signal
Desktop should actually *never* store unencrypted data on a user's
device, and perhaps even *force* users to encrypt the data with a
user-defined password.
One reason for this is that on most Desktop OSes (e.g. Windows), the
data folder can be accessed by any program running on the computer. This
is different from the Android and iOS system where each app runs in a
much more sandboxed environment. We've seen in the past that even
popular applications like Skype somehow access delicate data such as the
Firefox password database. What I'm saying is, you cannot prevent apps
on Desktop from reading out all the data that Signal has saved. You
might be able to prevent an app from directly accessing another app's
memory and getting all the files from there though - I don't know enough
about this, I'm not an expert on Linux/Windows permissions.
Also, full device encryption isn't ubiquitous on Desktop OSes, but both
standard on iOS and Android. So when a device gets lost in a turned-off
state, it's arguably worse on a Desktop OS. We also should inform users
about what they need to do if their device ever gets lost (e.g., remove
it from the "devices" listed in the mobile app immediately)
In any case, I am wondering about the current threat model that Whisper
Systems sees for Signal, and in what way this issue has perhaps already
been addressed? Signal Desktop is just out, so it's crucial that users
are informed about ways by which they can protect their data.
(This issue was brought up in Signal Desktop bug #452, and I was
referred to this mailing list there, so here I am.)
Cheers,
Natanji