by degradas on 12/21/20, 12:23 PM with 6 comments
by upofadown on 12/21/20, 2:14 PM
The context here is that Cellebrite provides a magic box that technically naive people can use to crack cellphones. So you hook up the box and you get what you get. Interpreting the data thus revealed is part of the service.
Interestingly enough, things that use a separate passphrase to protect the saved data are immune to a Cellebrite style attack. Since Signal relies on the security of the underlying device there is still a distinction that can be made here.
Another point that falls out of this is that Signal is more secure on systems with an unbroken hardware enclave. It is also more secure when you have it delete your old messages.
>Cellebrite’s details will make it easier for the Signal developers to patch the vulnerability.
There is no actual Signal vulnerability here so Signal has nothing to patch.
by square_usual on 12/21/20, 12:48 PM
by arpa on 12/21/20, 4:36 PM
by waynesonfire on 12/21/20, 6:12 PM