KidM to [email protected]English • 25 days agoSignal under fire for storing encryption keys in plaintextstackdiary.comexternal-linkmessage-square15fedilinkarrow-up135arrow-down117cross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected]
arrow-up118arrow-down1external-linkSignal under fire for storing encryption keys in plaintextstackdiary.comKidM to [email protected]English • 25 days agomessage-square15fedilinkcross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected]
minus-square@douglasg14blinkEnglish2•25 days agoNot necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.
Not necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.