ForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 6 months agoSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comexternal-linkmessage-square258fedilinkarrow-up1513arrow-down130cross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldtechnology@lemmy.worldfoss@beehaw.orgprivacyguides@lemmy.oneprivacy@lemmy.ca
arrow-up1483arrow-down1external-linkSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 6 months agomessage-square258fedilinkcross-posted to: cybersecurity@sh.itjust.worksprivacy@lemmy.worldtechnology@lemmy.worldfoss@beehaw.orgprivacyguides@lemmy.oneprivacy@lemmy.ca
minus-squareuis@lemm.eelinkfedilinkarrow-up3·6 months agoIndeed, End-to-End Encryption protects data between those ends, not ends themselves. If ends are compromised, no math will help you.
Indeed, End-to-End Encryption protects data between those ends, not ends themselves. If ends are compromised, no math will help you.