Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Featue Request: Quick way to wipe message database #175

Closed
HadManySons opened this issue May 23, 2013 · 16 comments
Closed

Featue Request: Quick way to wipe message database #175

HadManySons opened this issue May 23, 2013 · 16 comments
Labels

Comments

@HadManySons
Copy link

Say for some reason you're being coerced with force to disclose your password, could you make a quick way (say a button combo + confirm dialogue) to wipe the text message database?

@frioux
Copy link

frioux commented Jul 5, 2013

++

@DaveQB
Copy link

DaveQB commented Jul 9, 2013

You can with 4 button presses now. This is not what you meant?

@HadManySons
Copy link
Author

4 presses of what button? Was this information contained in the wiki somewhere?

@DaveQB
Copy link

DaveQB commented Jul 9, 2013

@HadManySons I had to find this yesterday. Press and hold a conversation. In this select miss you can press the select all button in the bottom right hand corner. Then press the trash can button (bottom left)

@HadManySons
Copy link
Author

Oh, well yeah. I'm saying without inputting your password. Some sort of button combo you can set to wipe everything. Like how you can set a pattern unlock on the android lock screen, some sort of button combo to wipe the database without putting a password.

@frioux
Copy link

frioux commented Jul 10, 2013

Well better would be a custom wipe password so random strangers who have
used TextSecure can't execute the wipe
On Jul 9, 2013 6:00 PM, "HadManySons" notifications@github.com wrote:

Oh, well yeah. I'm saying without inputting your password. Some sort of
button combo you can set to wipe everything. Like how you can set a pattern
unlock on the android lock screen, some sort of button combo to wipe the
database without putting a password.


Reply to this email directly or view it on GitHubhttps://github.com//issues/175#issuecomment-20711514
.

@HadManySons
Copy link
Author

Or that, make it look like you're putting in your password and without behaving any differently, the app wipes the database

@joeykrim
Copy link
Contributor

Added the four steps shared by @DaveQB to the Wiki: https://github.com/WhisperSystems/TextSecure/wiki/Using-TextSecure

Overall, I think this is a very interesting idea. What do you think of my rendition below?

If the database wipe was actioned on the same passphrase entry screen as is used to unlock the database, the user would probably need two passphrases:
First passphrase to decrypt and use the database. This is a standard feature that already exists.
Second (and different from the first) passphrase to immediately wipe the database which could then also create a new blank database and drop the user at the standard conversation list screen. The end result would appear as if the user had no text messages. This could be the new feature added to accomplish the goal raised in this issue.

@DaveQB
Copy link

DaveQB commented Jul 14, 2013

Sounds like a brilliant idea.

@HadManySons
Copy link
Author

@joeykrim I'd say that your idea is the best way so far to execute the idea. Gives the user a plausible deniability "see, I told you it was empty/blank"

@stefanb
Copy link

stefanb commented Aug 29, 2013

Totally empty message lists can raise suspicion, specially when crossing borders, when operators normally bomb you with messages (emergency numbers, their price list...). Why not just hide (or even wipe) encrypted messages and show un-encrypted ones.

@generalmanager
Copy link

I'd support the solution @joeykrim proposed, but in the scenario @stefanb described, either leaving the unencrypted messages would be nice - maybe with the possibility to have a modifiable list of fake messages that will be imported to the database after the wipe - that'd be the TSA/Syria/Ukraine version.

@jeremymasters
Copy link

Following with great interest.

@HadManySons
Copy link
Author

Yeah, some sort pre-defined fake messages left behind after the "wipe" password was entered

@ail1020
Copy link

ail1020 commented Mar 6, 2015

I'd also really like to see this feature. I think the most practical way of implementing if for plausible deniability would be to erase any secured communication while leaving the remaining messages. This way there would be no "fake messages" to maintain or import. Besides, if some law enforcement is trying to persuade you into giving a password, odds are they've already got your unsecured messages from your service provider.

So I think the best way to implement this would be to either remove the secured messages from the database upon entry of the secondary password and continue login as normal (as well as ending any existing secure conversations) and leaving the unsecured messages in the database. Another possibility would be to give an additional option to wipe all the messages instead of just the secured ones.

The thing that worries me about having a set of fake messages is the maintenance. You'd have to maintain it regularly by updating the timestamps and possibly contacts and unless you're purely using the data channel a law enforcement figure would have the meta data about the communications already and probably the unsecure messages making it difficult to say those are the only messages that were kept in your phone when they don't match up with what they got from your service provider.

@signalapp signalapp locked and limited conversation to collaborators Mar 6, 2015
@automated-signal
Copy link

GitHub Issue Cleanup:
See #7598 for more information.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Development

No branches or pull requests

9 participants