I don’t see refenece in this article or any others, but how did prosecutors get access to SBF’s Signal messages?

Was it simply a court order that he unlock his phone (and agreed), or a codefendant who flipped to the prosecution and handed over the thread?

  • essteeyou@lemmy.world
    link
    fedilink
    arrow-up
    6
    ·
    1 year ago

    Yeah, we have separate profiles, but sometimes I just let him use some software on mine, like a game, or whatever, and then I go and do something else. The use-case is there, along with encrypted messages, but people say things like what you said because they don’t personally have that use-case.

    I’d look at implementing it myself, but they wouldn’t merge it, and I’m not going to maintain a fork indefinitely.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      For your use case, running a VM on your desktop should be sufficient. The VM could have disc encryption. So when you’re letting somebody else use your terminal, they can’t access your interesting messages.

      Hyper-V has this built in I believe, QEMU does it as well, UTM on Mac OS makes it pretty easy. But there’s a thousand different ways to skin this cat

      • essteeyou@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        Most sensible way in my opinion would be for the Signal app to have a PIN and encryption on desktop, just like it already does on the mobile apps.