Event JSON
{
"id": "d52f587262f0887cfea449f04490ff870cdb298ba77ebf8926b995f14c288020",
"pubkey": "8596d6c2242ddb831a35fee6cec5069ad621553de4ca6c9d0953d78c478b88f0",
"created_at": 1720296546,
"kind": 1,
"tags": [
[
"t",
"signal"
],
[
"proxy",
"https://mas.to/@yogthos/112741354472752029",
"web"
],
[
"t",
"security"
],
[
"proxy",
"https://mas.to/users/yogthos/statuses/112741354472752029",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mas.to/users/yogthos/statuses/112741354472752029",
"pink.momostr"
],
[
"expiration",
"1722888547"
]
],
"content": "Researchers have uncovered that Signal’s desktop app stores encryption keys in plaintext, leaving users vulnerable to potential data theft.\t\t\t\t\n\nThis sort of stuff makes it clear that the team working on Signal has an incredibly lax approach to security.\n\n#signal #security \n\nhttps://stackdiary.com/signal-under-fire-for-storing-encryption-keys-in-plaintext/",
"sig": "b1b5a5e9837782fb0a6201d6e5ba140dcb8edce8d1816736f3e364815125a13a6c9009a5f95f2d4b51e07c8d528981ee4810be4258261efb949089ca35eb8070"
}