Email or username:

Password:

Forgot your password?
Top-level
Meredith Whittaker

We ask those who are serious about security and privacy to please engage us directly in the future, instead of resorting first to online claims that can confuse non-experts and lead people to make unsafe choices and develop inaccurate mental models based on scary language. We monitor security@signal.org carefully and respond to all legitimate reports.

25 comments
Talya (she/her) 🏳️‍⚧️

@Mer__edith as always, these people act in bad faith, and as always, the only thing they get is making people less secure. heck, this whole thing was already discussed a year and a half ago after the bogus CVEs filed by johnjhacking. but of couse the ones spreading this never bother to check if this has already been discussed before, since they only want attention.

Khürt Williams

@Mer__edith Certain types of people want to be influencers. I think a better word to describe them is infamous.

Bas (Tools on Tech) :verified:

@Mer__edith After reading "trust me I'm lying" asking for this feels like asking water to not be wet. Anyone that knows security would realize that an exploit that requires full system access isn't really an exploit but non-news. So it feels like emotional click farming, with no regards whatsoever for actual fact checking.

David

@toolsontech @Mer__edith The real issue here is the forward access (session cloning), which seems like a pretty big issue. Momentary access to a system (not necessarily “full” access) can get someone the info needed to silently clone a session, intercept future messages, and impersonate the victim.

S1m

@Mer__edith Is it possible to add this address to the footer of signal.org or create a security.txt ? One have to go through the FAQ to find out this email address

0x00

@S1m @Mer__edith It looks like security.txt was already added at the beginning of the month

signal.org/.well-known/securit

DELETED

@Mer__edith

Non-Expert here. Love using Signal with my closest peeps for quality & to avoid data scraping... We understand cyber security is constantly evolving. We also understand in light of recent news everywhere, at any time someone else could be reading everything on our screen and certainly our desktops are vulnerable even with good software protecting us.
If we wanted to say something that could be used against us, we would meet at the beach in swim wear. Glad we don't need to do that.

London Eastfield 🇵🇸

@UrNotTheBossOfUs @Mer__edith

"at any time someone else could be reading everything on our screen and certainly our desktops"

Huh? Who are "someone else", and how can they access your computers?

DELETED

@LawmanLungis @Mer__edith
Sorry, got the chores done.
Want to see something scary, look up Pegasus Spyware. It's old news from several years ago. Imagine how advanced now and a hell of a lot less expensive for law enforcement.
Most people would be shocked to know what local LE capabilities are today.
Tech companies float the idea of screenshots nonstop so they can feed AI. Public asks governments to block that shit.
IMO it's already going on long time before we read about it.
Also, hackers.

Mysk🇨🇦🇩🇪

@Mer__edith

Hi Meredith, let me address your points:

1) The issue we highlighted does not require “full” access to the device. Signal desktop stores the chat database in an unprotected area of the file system that’s accessible by any user process. This would allow any program without any special permissions or user prompts to access the database in full. This can be solved by sandboxing, which relies on the OS to prevent any process from accessing data within the sandbox.

… 🧵 1/4

Mysk🇨🇦🇩🇪

@Mer__edith

2/4

2) The issue was reported to Signal by others back in 2018, so we didn’t find anything new. App sandboxing technology had been available for a long time on desktop (Windows AppContainer and macOS App Sandbox). Even if we ignore sandboxing, while Signal encrypts the chat database, it stores the encryption key insecurely in plaintext.

… 🧵

Mysk🇨🇦🇩🇪

@Mer__edith

3/4

3) We “the posters” didn’t feel the need to reach out to Signal first since the issue had been known to Signal’s developers since 2018. After 6 years without a resolution, we believe it becomes more important to raise awareness than to attempt to directly engage with Signal, or any other vendor. Also, I challenge you to point out any instance of inflammatory language in our posts about Signal.

…🧵

Mysk🇨🇦🇩🇪

@Mer__edith

4/4

Finally, Signal has a huge responsibility towards your users, many of whom rely on Signal to be the most secure way of communicating in areas of the world where their lives would be in danger if their messages were to be compromised. This is not hyperbole, and Signal needs to continue to live up to that responsibility.

DELETED

@mysk @Mer__edith

All I can say as a user who relies on Signal a lot and is one of few who actually supports Signal by monthly donations through its app is this:

The expectation from the paragon of private and secure messaging platform is that it is indeed fully private and secure to a point where even physical access (short of knowing admin credentials), Signal must be made to ensure of anything within it is encrypted, including pictures and documents that may be shared.

DELETED

@mysk @Mer__edith

I love Signal and will continue to use and support and recommend it but it’s things like this that slowly begin to leave a bad taste in your mouth.

I hope this is resolved soon. By the looks of it, it can be as it’s a technical issue and we don’t seem to be limited by technology unless my interpretation and inference from all that I have read is incorrect.

Please look into this more and share an update with a fool proof resolution for the millions relying on it.

Compuguy, Lover of Cats 😸😼

@mysk
@Mer__edith This should be a concern. But one should factor in if a malicious actor has full access to the computer, you're pretty much 💩 out of luck. This doesn't mean that @signalapp couldn't implement a pin/password lock & encryption to the desktop app to make it harder for someone to access that information....

ChiefBongo

@mysk plus Desktop Systems are a lot more vulnerable and susceptible to malware than Mobile OS's, especially Windows. I have always been wary of using Messenger Apps on Desktop - rightfully so, it turns out.

DELETED

@Mer__edith Most of these people are probably serious about attacking Signal for various reasons and not serious about security and privacy. "Experts" who in order to criticize a piece of software pull the OS-security card are not experts at all or have ill intentions to begin with.

Draken BlackKnight

@Mer__edith
Seems like the only difference between "Mysk" and "Musk" is one letter off.

Cameron Otsuka

@Mer__edith This was reported back in 2018 which was closed as “won’t fix” redirecting to this from 2015.

Sapient

@Mer__edith Wasnt this first disclosed in 2018?

bleepingcomputer.com/news/secu

Seems like its been on the back burner for a while and just recently resurfaced.

Go Up