Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoSignal under fire for storing encryption keys in plaintextstackdiary.comexternal-linkmessage-square15fedilinkarrow-up135arrow-down118cross-posted to: privacy@lemmy.mltechnology@lemmy.worldfoss@beehaw.orgprivacyguides@lemmy.one
arrow-up117arrow-down1external-linkSignal under fire for storing encryption keys in plaintextstackdiary.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square15fedilinkcross-posted to: privacy@lemmy.mltechnology@lemmy.worldfoss@beehaw.orgprivacyguides@lemmy.one
minus-squaredouglasg14b@programming.devlinkfedilinkEnglisharrow-up2·6 months agoNot necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.
Not necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.