https://github.com/n0kovo/signal-desktop-encrypter
This script provides you with the missing local storage-encryption feature in Signal Desktop, that the developers refuse to implement, using VeraCrypt.
https://github.com/n0kovo/signal-desktop-encrypter
signal signal-desktop signal-desktop-encryption signal-encryption signal-messenger
Last synced: 8 months ago
JSON representation
This script provides you with the missing local storage-encryption feature in Signal Desktop, that the developers refuse to implement, using VeraCrypt.
- Host: GitHub
- URL: https://github.com/n0kovo/signal-desktop-encrypter
- Owner: n0kovo
- License: gpl-3.0
- Created: 2023-01-24T18:02:33.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-01-25T10:34:37.000Z (over 2 years ago)
- Last Synced: 2024-12-30T17:43:45.337Z (10 months ago)
- Topics: signal, signal-desktop, signal-desktop-encryption, signal-encryption, signal-messenger
- Language: Shell
- Homepage:
- Size: 259 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Signal Desktop Encrypter
#### _(Since the Signal Desktop devs clearly won't [listen to its users](#proof)\*, we're stuck doing hacky shit like this...)_
This script provides you with the missing local storage-encryption feature in Signal Desktop using VeraCrypt.
It basically just creates an encrypted volume, moves your Signal data to it, symlinks the original data dir to the encrypted volume and creates a laucher that will prompt you for your password, unlock the volume, run Signal and unmount the volume again as soon as Signal exits.
Then just run the launcher instead of Signal and pretend the password prompt is a Signal feature.
It's kinda hacky but it works pretty well.Tested on Debian 11 and MacOS 12.5.
**NOTE:** (For MacOS) - There's a binary blob in launcher.tar.gz. It's an 'Automator Application Stub' used to run an Automator workflow as a MacOS app (for the launcher).
If you're paranoid (which you should be), you can make your own or just compare it to this binary:1. Open Automator
2. New -> Application
3. (leave it blank)
4. Save the .app
5. Binary is located at "theappyoujustsaved.app/Contents/MacOS/Automator Application Stub"(If anyone has a better idea on how to create the .app on MacOS, please don't hesitate to open an issue or a PR)
# *Proof
https://github.com/privacytools/privacytools.io/issues/1789 – Add warning that Signal stores attachments unencrypted and messages unsafely on desktop
https://github.com/signalapp/Signal-Desktop/issues/2815 – All exported data (messages + attachments) are *NOT* encrypted on Disk during (and after) the upgrade process!
https://github.com/signalapp/Signal-Desktop/issues/4042 – encrypted db.sqlite encryptable, hence conversations interceptable
https://github.com/signalapp/Signal-Desktop/issues/5751 – Signal Desktop stores all received attachments unencrypted on filesystem
https://github.com/signalapp/Signal-Desktop/issues/5703 – Desktop app does not support protected storage
https://github.com/signalapp/Signal-Desktop/issues/1017 – Messages are stored in plain text and not encrypted locally
https://github.com/signalapp/Signal-Desktop/issues/452 – Add option to lock the application
https://github.com/signalapp/Signal-Desktop/issues/1318 – What is stored on the pc and where?
https://github.com/signalapp/Signal-Desktop/issues/2793 – The attachments should be encrypted at rest on the drive
[signalusers.org/t/improve-security-of-desktop-apps-encryption-of-data-at-rest](https://community.signalusers.org/t/improve-security-of-desktop-apps-encryption-of-data-at-rest/26494) –
Improve security of desktop app’s encryption of data at rest
[signalusers.org/t/lock-the-desktop-app-with-a-password](https://community.signalusers.org/t/lock-the-desktop-app-with-a-password/1383) –
Lock the desktop app with a password
[signalusers.org/t/securety-pin-on-desktop](https://community.signalusers.org/t/securety-pin-on-desktop/17784) –
Securety PIN on Desktop