Donno, we just found sqlcipher in the source code.  Perhaps someone can
ask on their forum.  I imagine that the logic of storing the messages is
the same.  Signal was already using an encrypted local store, they just
switched it to SQLCipher.

.hc

VanitasVitae:
> Is there a TL;DR on how they manage to decrypt messages before the database 
> gets unlocked?
> They need to have the keys accessible somewhere right?
> 
> Vanitasvitae
> 
> Am 28. März 2018 21:02:17 MESZ schrieb Hans-Christoph Steiner 
> <[email protected]>:
>>
>> So Signal just switched from its custom encrypted store to good ol'
>> android-database-sqlcipher, which is lovingly maintained by Zetetic:
>>
>> https://github.com/signalapp/Signal-Android/commit/f36b296e2ed211893835372513da57bb135c52c1
>>
>> Its a good example for hooking up SQLCipher to the Android KeyStore
>> API.
>>
>> .hc
>>
>>
>> -- 
>> PGP fingerprint: EE66 20C7 136B 0D2C 456C  0A4D E9E2 8DEA 00AA 5556
>> https://pgp.mit.edu/pks/lookup?op=vindex&search=0xE9E28DEA00AA5556
>> _______________________________________________
>> List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev
>> To unsubscribe, email:  [email protected]
> 
> 
> 
> _______________________________________________
> List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev
> To unsubscribe, email:  [email protected]
> 

-- 
PGP fingerprint: EE66 20C7 136B 0D2C 456C  0A4D E9E2 8DEA 00AA 5556
https://pgp.mit.edu/pks/lookup?op=vindex&search=0xE9E28DEA00AA5556
_______________________________________________
List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev
To unsubscribe, email:  [email protected]

Reply via email to