douglasg14b@programming.devtoCybersecurity@sh.itjust.works•Signal under fire for storing encryption keys in plaintextEnglish
2·
4 months agoNot necessarily. There are many paths to exfiltrated data that don’t require privileged access, and can be exploited through vulnerabilities in other applications.
I mean… Every serious operating system already has some form of keyring feature right?