• henfredemars@infosec.pub
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      With what? Where would you store the encryption key for the encryption key on a desktop system where it would not be accessible to an attacker?

      Perhaps there could be a pin or password that must be entered every time to decrypt it into memory.

      • eco_game@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        As the article states, currently all processes are able to read the file which contains the key. Instead, you could store the key in the macOS Keychain (and Linux/Windows equivalents), which AFAIK is a list of all sorts of sensitive data (think WiFi passwords etc.), encrypted with your user password. I believe the Keychain also only let’s certain processes see certain entries, so the Signal Desktop App could see only its own encryption key, whereas for example iMessage would only see the iMessage encryption key.

      • boredsquirrel@slrpnk.net
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Something you know, something you have, something you are.

        3FA:

        • Pin
        • Security Key/TPM/Secure element
        • fingerprint / iris scan

        You could also start with just one of these

        • ArcaneSlime@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          fingerprint / iris scan

          Nope, I’m out. I’m not giving my unchangeable biological data to the Computer Gods because A) Fuck that and B) the police in my country can compel the use of biometrics to unlock things but cannot compel you to give up your pass as it is protected by the first amendment. Yes I think the bios should be protected too but that isn’t the reality in which I live.