ForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 4 months agoSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comexternal-linkmessage-square258fedilinkarrow-up1503arrow-down130cross-posted to: cybersecurity@sh.itjust.worksfoss@beehaw.orgprivacyguides@lemmy.oneprivacy@lemmy.ca
arrow-up1473arrow-down1external-linkSignal under fire for storing encryption keys in plaintext on desktop appstackdiary.comForgottenFlux@lemmy.world to Privacy@lemmy.mlEnglish · 4 months agomessage-square258fedilinkcross-posted to: cybersecurity@sh.itjust.worksfoss@beehaw.orgprivacyguides@lemmy.oneprivacy@lemmy.ca
minus-squareuis@lemm.eelinkfedilinkarrow-up3·4 months agoIndeed, End-to-End Encryption protects data between those ends, not ends themselves. If ends are compromised, no math will help you.
Indeed, End-to-End Encryption protects data between those ends, not ends themselves. If ends are compromised, no math will help you.