this post was submitted on 28 Jan 2025
760 points (98.5% liked)

Technology

61227 readers
4363 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Signal has announced new functionality in its upcoming beta releases, allowing users to transfer messages and media when linking their primary Signal device to a new desktop or iPad. This feature offers the choice to carry over chats and the last 45 days of media, or to start fresh with only new messages.

The transfer process is end-to-end encrypted, ensuring privacy. It involves creating a compressed, encrypted archive of your Signal data, which is then sent to the new device via Signal's servers. Despite handling the transfer, the servers cannot access the message content due to the encryption.

With the introduction of a cross-platform archive format, Signal is also exploring additional tools for message transfer to new devices or restoration in case of device loss or damage. Users can begin testing this feature soon, with a wider rollout expected in the coming weeks.

you are viewing a single comment's thread
view the rest of the comments
[โ€“] socsa@piefed.social -1 points 2 days ago* (last edited 2 days ago) (1 children)

This absolutely expands the threat surface in a few different ways though. It's relatively low stakes, but it's non zero. I have not dug into the implementation but I am curious how this doesn't technically violate forward secrecy. A single session key will ostensibly be used to encrypt the entire session key database? Which means if that key is compromised in transit then the entire key history is compromised. Using the long term secret directly for data in transit is definitely not compliant either.

Surely when the chats are on-device they are not encrypted, or encrypted separately with an unrelated secret in storage which can be passed to another device?