@[email protected] to [email protected]English • 1 year agoDownsides of Signal alternatives compared to Signal?message-square87fedilinkarrow-up190
arrow-up190message-squareDownsides of Signal alternatives compared to Signal?@[email protected] to [email protected]English • 1 year agomessage-square87fedilink
I’m thinking of the things listed on the Privacy Guides real-time communication section https://www.privacyguides.org/en/real-time-communication/
minus-square@[email protected]linkfedilinkEnglish6•edit-21 year agoBrute forcing 4-6 digit pins is trivial. And even if the user set a actual password, it’s still very trivial https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/
minus-square@[email protected]linkfedilink2•1 year ago“Very trivial” if they set a proper password? Yet the source you provide says it’s robustly secure
minus-square@[email protected]linkfedilinkEnglish1•1 year agoI can’t find the phrase robustly secure in the last link: https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/ Signal asks users to set a pin/password which needs to be periodically reentered. This discourages people from using high entropy passwords like BIP38.
Brute forcing 4-6 digit pins is trivial.
And even if the user set a actual password, it’s still very trivial
https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/
“Very trivial” if they set a proper password? Yet the source you provide says it’s robustly secure
I can’t find the phrase robustly secure in the last link:
https://blog.cryptographyengineering.com/2020/07/10/a-few-thoughts-about-signals-secure-value-recovery/
Signal asks users to set a pin/password which needs to be periodically reentered. This discourages people from using high entropy passwords like BIP38.