@zleap @mttaggart that they don't encrypt keys on the desktop isn't. either you can trust a device or you can't. it's trivial to extract the keys in some way by just waiting for them to be unlocked.

what really is a blunder is that they don't do something about multiple concurrent sessions using the same keys.

Follow

@alxlg
freedesktop, the place everything has to use dbus.

to quote the specification you linked:

> You must specify a session when retrieving or storing a secret. The session controls how the secret is encoded during transfer. Since this is a D-Bus API, the data in all method calls and other accesses in this API will go through multiple processes, and may be cached arbitrarilyby the OS or elsewhere.
>
> The Secrets API has provision to encrypt secrets while in transit between the service and the client application. The encryption is not envisioned to withstand man in the middle attacks, or other active attacks. It is envisioned to minimize storage of plain text secrets in memory and prevent storage plain text storage of secrets in a swap file or other caching mechanism.

i'll rest my case.

@alxlg sorry, that was a bit confrontational.

"desktop" linux has a real complexity problem, starting with systemd at the bottom all the way up to the desktop environments. pushing secrets over a message_bus_ is very questionable.

@bonifartius

Signal was supposed to use that API, if you can tell me how:

> it's trivial to extract the keys in some way by just waiting for them to be unlocked.

with that API?

I don't care about your opinion on Dbus.

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.