Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11か月前Signal under fire for storing encryption keys in plaintextstackdiary.comexternal-linkmessage-square15fedilinkarrow-up135arrow-down118cross-posted to: privacy@lemmy.worldfoss@beehaw.orgprivacyguides@lemmy.oneprivacy@lemmy.ca
arrow-up117arrow-down1external-linkSignal under fire for storing encryption keys in plaintextstackdiary.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11か月前message-square15fedilinkcross-posted to: privacy@lemmy.worldfoss@beehaw.orgprivacyguides@lemmy.oneprivacy@lemmy.ca
minus-squaredouglasg14b@programming.devlinkfedilinkEnglisharrow-up2·11か月前Not necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.
Not necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.