this post was submitted on 12 Jul 2024
254 points (93.2% liked)

Technology

59288 readers
4851 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] spiderman@ani.social 4 points 4 months ago (1 children)

the point is they could have fixed it by the time it was reported and not waited around until the issue was blown bigger.

[–] sudneo@lemm.ee 3 points 4 months ago (1 children)

A security company should prioritize investments (I.e. development time) depending on a threat model and risk management, not based on what random people think.

[–] spiderman@ani.social 1 points 4 months ago* (last edited 4 months ago) (1 children)

so are you saying that wasn't a security risk?

[–] sudneo@lemm.ee 5 points 4 months ago

I am saying that based on the existing risks, effort should be put on the most relevant ones for the threat model you intend to assume.

In fact the "fix" that they are providing is not changing much, simply because on single-user machines there is borderline no difference between compromising your user (i.e., physical access, you installing malware unknowingly etc.) and compromising the whole box (with root/admin access).

On Windows it's not going to have any impact at all (due to how this API is implemented), on Linux/Mac it adds a little complexity to the exploit. Once your user is compromised, your password (which is what protects the keychain) is going to be compromised very easily via internal phishing (i.e., a fake graphical prompt, a fake sudo prompt etc.) or other techniques. Sometimes it might not be necessary at all. For example, if you run signal-desktop yourself and you own the binary, an attacker with local privileges can simply patch/modify/replace the binary. So then you need other controls, like signing the binary and configuring accepted keys (this is possible and somewhat common on Mac), or something that anyway uses external trust (root user, remote server, etc.).

So my point is: if their threat model assumed that if your client device was compromised, your data was not protected, it doesn't make much sense to reduce 10/20% the risk for this to happen, and focus on other work that might be more impactful.