ForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 5 months agoSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comexternal-linkmessage-square258fedilinkarrow-up1509arrow-down129cross-posted to: cybersecurity@sh.itjust.workstechnology@lemmy.worldfoss@beehaw.org
arrow-up1480arrow-down1external-linkSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 5 months agomessage-square258fedilinkcross-posted to: cybersecurity@sh.itjust.workstechnology@lemmy.worldfoss@beehaw.org
minus-squareuis@lemm.eelinkfedilinkarrow-up3·5 months agoIndeed, End-to-End Encryption protects data between those ends, not ends themselves. If ends are compromised, no math will help you.
Indeed, End-to-End Encryption protects data between those ends, not ends themselves. If ends are compromised, no math will help you.