Donno, we just found sqlcipher in the source code. Perhaps someone can ask on their forum. I imagine that the logic of storing the messages is the same. Signal was already using an encrypted local store, they just switched it to SQLCipher.
.hc VanitasVitae: > Is there a TL;DR on how they manage to decrypt messages before the database > gets unlocked? > They need to have the keys accessible somewhere right? > > Vanitasvitae > > Am 28. März 2018 21:02:17 MESZ schrieb Hans-Christoph Steiner > <[email protected]>: >> >> So Signal just switched from its custom encrypted store to good ol' >> android-database-sqlcipher, which is lovingly maintained by Zetetic: >> >> https://github.com/signalapp/Signal-Android/commit/f36b296e2ed211893835372513da57bb135c52c1 >> >> Its a good example for hooking up SQLCipher to the Android KeyStore >> API. >> >> .hc >> >> >> -- >> PGP fingerprint: EE66 20C7 136B 0D2C 456C 0A4D E9E2 8DEA 00AA 5556 >> https://pgp.mit.edu/pks/lookup?op=vindex&search=0xE9E28DEA00AA5556 >> _______________________________________________ >> List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev >> To unsubscribe, email: [email protected] > > > > _______________________________________________ > List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev > To unsubscribe, email: [email protected] > -- PGP fingerprint: EE66 20C7 136B 0D2C 456C 0A4D E9E2 8DEA 00AA 5556 https://pgp.mit.edu/pks/lookup?op=vindex&search=0xE9E28DEA00AA5556 _______________________________________________ List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev To unsubscribe, email: [email protected]
