Protecting Signal Keys on Desktop

Share:
“A lone man in a desert trying to understand the inner workings of a computer in the style of Moebius”, by DALL-E.

At SandboxAQ, we recently delved into Signal Desktop to identify how its key management could be improved by using security hardware. Our analysis highlights the need for robust and consistent key isolation services across desktop platforms. In this blogpost,

  1. We analyse the security of Signal Desktop’s key management in light of recent attack reports, and
  2. We show how security hardware can protect Signal Desktop’s keys with a proof of concept (PoC)—a fork of Signal Desktop—and explore the tradeoffs with this approach.

Signal is an open-source messaging service that implements end-to-end encryption. Its users benefit from best-in-class privacy when communicating online.1 This level of privacy is made possible by the Signal protocol, considered the gold standard of end-to-end encrypted messaging. Its security protocol depends on cryptographic keys handled on-device. For mobile devices, Signal securely stores them in isolated and controlled locations. However, when it comes to desktop, Signal (just like everyone else) must do without OS-provided secure key management capabilities.

The problem

It all starts with a Twitter post explaining how an attacker running malware could extract all Signal Desktop’s confidential data and run a clone of the victim’s messaging application. This attack was possible because, although Signal encrypts the local database containing confidential data (including messages and keys), it stored the database decryption keys in plaintext.

Attack scenario

  1. Attacker gains access to the local Signal database encryption key. This can be accomplished through either (a) physical access to the disk at rest, bypassing disk encryption, or (b) malware operating with the victim’s privilege rights, like a malicious app.
  2. Attacker decrypts the database and extracts its data. Given that the database encryption was saved in plaintext, this process is straightforward.2
  3. Attacker impersonates the victim or compromises their messages. The compromised database contains the victim’s conversation history on this device and a set of keys used in the Signal protocol.

Here’s a visual representation of the attack vector.

Gaëtan Wattiau

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
2:12 am, Mar 7, 2025
weather icon 11°C
L: 9° | H: 12°
overcast clouds
Humidity: 77 %
Pressure: 1012 mb
Wind: 5 mph S
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 6:32 am
Sunset: 5:50 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
9° | 12°°C 0 mm 0% 11 mph 82 % 1012 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
9° | 14°°C 0 mm 0% 10 mph 78 % 1011 mb 0 mm/h
Sun Mar 09 9:00 pm
weather icon
9° | 16°°C 0 mm 0% 9 mph 80 % 1005 mb 0 mm/h
Mon Mar 10 9:00 pm
weather icon
7° | 13°°C 0 mm 0% 12 mph 87 % 1005 mb 0 mm/h
Tue Mar 11 9:00 pm
weather icon
4° | 7°°C 1 mm 100% 14 mph 91 % 1008 mb 0.13 mm/h
Today 3:00 am
weather icon
11° | 11°°C 0 mm 0% 8 mph 77 % 1011 mb 0 mm/h
Today 6:00 am
weather icon
9° | 10°°C 0 mm 0% 7 mph 82 % 1011 mb 0 mm/h
Today 9:00 am
weather icon
11° | 11°°C 0 mm 0% 9 mph 79 % 1012 mb 0 mm/h
Today 12:00 pm
weather icon
15° | 15°°C 0 mm 0% 11 mph 63 % 1012 mb 0 mm/h
Today 3:00 pm
weather icon
14° | 14°°C 0 mm 0% 10 mph 64 % 1012 mb 0 mm/h
Today 6:00 pm
weather icon
13° | 13°°C 0 mm 0% 7 mph 71 % 1012 mb 0 mm/h
Today 9:00 pm
weather icon
12° | 12°°C 0 mm 0% 7 mph 72 % 1012 mb 0 mm/h
Tomorrow 12:00 am
weather icon
10° | 10°°C 0 mm 0% 6 mph 73 % 1011 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€81,703.99
-3.83%
Ethereum(ETH)
€2,017.12
-4.52%
XRP(XRP)
€2.30
-1.61%
Tether(USDT)
€0.93
0.01%
Solana(SOL)
€130.65
-5.10%
USDC(USDC)
€0.93
0.00%
Dogecoin(DOGE)
€0.183340
-4.34%
Shiba Inu(SHIB)
€0.000012
-1.40%
Pepe(PEPE)
€0.000006
-5.87%
Peanut the Squirrel(PNUT)
€0.201372
5.99%
Scroll to Top