• Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      5
      ·
      edit-2
      1 month ago

      They weren’t talking about the server:

      This app…works in almost exactly the same way as Signal, except that it also archives copies of all the messages passing through it, shattering all of its security guarantees.

      • ShittyBeatlesFCPres@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        ·
        1 month ago

        Later in the article, it talks specifically about the server-side archives being stored in plain text. That’s why the hacker was able to access messages. This isn’t about the local copies on phones.

            • Ulrich@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              2
              ·
              edit-2
              1 month ago

              You’re confused, I am not the author of this article. I did not write the statement above, just copied and pasted it here.

              • AbidanYre@lemmy.world
                link
                fedilink
                English
                arrow-up
                3
                ·
                1 month ago

                I’m not confused, you’re intentionally misreading what’s happening for some reason.

                “Passing through it” pretty clearly refers to the server as that’s what was hacked into and had plain text archives.

                You’re hyper fixating on the fact that the article says “the app” when referring to both the phone and server pieces to try and argue… something.

          • doodledup@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 month ago

            Maybe you should start reading up on stuff you don’t know about before adding nonsense to internet threads.

            • Ulrich@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              edit-2
              1 month ago

              Don’t know what you mean. I didn’t add any “nonsense”. Just a direct quote from the article in question.

        • 0xD@infosec.pub
          link
          fedilink
          English
          arrow-up
          0
          arrow-down
          1
          ·
          1 month ago

          That doesn’t really do anything. Attackers need local access to the device to get the database itself. Chances are, they’ll get the key right with it.