| ▲ | nxobject 4 hours ago | |||||||||||||||||||||||||||||||
Sadly, they still got to her Signal on her Desktop – her sources might still be compromised. It's sadly inherent to desktop applications, but I'm sad that a lot more people don't know that Signal for Desktop is much, much less secure against adversaries with your laptop. | ||||||||||||||||||||||||||||||||
| ▲ | tadzikpk an hour ago | parent | next [-] | |||||||||||||||||||||||||||||||
> I'm sad that a lot more people don't know that Signal for Desktop is much, much less secure against adversaries with your laptop Educate us. What makes it less secure? | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||
| ▲ | mrandish an hour ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||
I would have thought reporters with confidential sources at that level would already exercise basic security hygiene. Hopefully, this incident is a wake up call for the rest. | ||||||||||||||||||||||||||||||||
| ▲ | stronglikedan 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||
If people don't have Signal set to delete sensitive messages quickly, then they may as well just be texting. | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||
| ▲ | NewsaHackO 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||
Yea, I also would want to question the conclusions in the article. Was the issue that they couldn't unlock the iPhone, or that they had no reason to pursue the thread? To my understanding, the Apple ecosystem means that everything is synced together. If they already got into her laptop, wouldn't all of the iMessages, call history, and iCloud material already be synced there? What would be the gain of going after the phone, other than to make the case slightly more watertight? | ||||||||||||||||||||||||||||||||
| ▲ | pbhjpbhj 3 hours ago | parent | prev [-] | |||||||||||||||||||||||||||||||
Did she have Bitlocker or FileVault or other disk encryption that was breeched? (Or they took the system booted as TLAs seek to do?) | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||