There is no reason why the message sync that works from phone to phone could not be implemented on the desktop client as well.
Comment on A fresh install of Signal takes up 410MB, blowing both Firefox and Chromium out of the water
Fetus@lemmy.world 4 months agoThe chat continues on all linked devices from the point in time that they are linked.
Imagine two people having a face-to-face conversation, then a third person walks up and joins in. The third person doesn’t know what was said before they joined the conversation, but all three continue the conversation from that point on.
Linked devices are like the above example, if two of those people were married and tell each other every conversation they’ve had since their wedding.
eksb@programming.dev 4 months ago
sudneo@lemm.ee 4 months ago
Does it work phone to phone? I was under the impression that a backup restore was needed if you wanted previous messages. It’s really an unnecessary security risk to have previous message sync. Someone gets your phone in their hand for 20 seconds, links your device and they get every message you have ever sent? No bueno.
eksb@programming.dev 4 months ago
You can sync messages from phone to phone. …signal.org/…/360007059752-Backup-and-Restore-Mes…
Azzu@lemm.ee 4 months ago
Any new client doesn’t get old messages. Phone only allows the possibility of transferring a backup, which desktop doesn’t have.
Fetus@lemmy.world 4 months ago
I haven’t actually synced a new phone to Signal, does everything just carry over? I assumed you needed to transfer your account from phone to phone, not just link a new device.
JoeyJoeJoeJr@lemmy.ml 4 months ago
There is no sharing of messages between linked devices - that would break forward secrecy, which prevents a successful attacker from getting historical messages. See the first bullet of: support.signal.org/…/360007320551-Linked-Devices
Messages are encrypted per device, not per user (signal.org/docs/specifications/sesame/), and forward secrecy is preserved (en.m.wikipedia.org/wiki/Forward_secrecy, for the concept in general, and signal.org/docs/specifications/doubleratchet/ for Signal’s specific approach).
Natanael@slrpnk.net 4 months ago
Message logs doesn’t break forward secrecy in a cryptographic sense, retaining original asymmetric decryption keys (or method to recreate them) does. Making history editable would help against that too.
What Signal actually intends is to limit privacy leaks, it only allows history transfer when you transfer the entire account to another device and “deactivate” the account on the first one, so you can’t silently get access to all of somebody’s history
JoeyJoeJoeJr@lemmy.ml 4 months ago
You’re describing something very different - you already have the messages, and you already have them decrypted. You can transfer them without the keys. If someone gets your device, they have them, too.
Whether Signal keeps the encrypted the messages or not, a new device has no way of getting the old messages from the server.
Natanael@slrpnk.net 4 months ago
I run a cryptography forum, I know the exact definition of these terms. Message logs in plaintext is very distinct from forward secrecy. What forward secrecy means in particular is that captured network traffic can’t be decrypted later even if you at a later point can steal the user’s keys (because the session used session keys that were later deleted).
You can transfer messages as a part of an account transfer on Signal (at least on Android). This deactivates the app on the old device (so you can’t do it silently to somebody’s device)