[deleted]
- Edited
Nuttso Molly doesn't enforce the unlock state for its keystore key.
On iOS, Signal chat database on iOS uses NSFileProtectionComplete. Only FFS yields Signal database on iOS not AFU extraction.
[this is not correct, it doesn't keep data at rest after first unlock on either Android or iOS even though it could]
File system: Signal database is encrypted. The encryption key is stored in the keychain with the highest protection class. The only way to extract Signal conversations requires extracting the file system images and decrypting the keychain.
https://blog.elcomsoft.com/2020/04/forensic-guide-to-imessage-whatsapp-telegram-signal-and-skype-data-acquisition/
[this is not correct, it doesn't keep data at rest after first unlock on either Android or iOS even though it could]
Nuttso Otherwise Molly wouldn't be able to start in background when the phone is locked and wouldn't be able to show notifications. Same with Signal.
Why wouldn't notification work? The push token can be saved with NSFileProtectionCompleteUntilFirstUserAuthentication while the main database key is saved with NSFileProtectionComplete.
To show a preview of the notification however, I speculate that some ephemeral private key can be saved temporarily with NSFileProtectionCompleteUntilFirstUserAuthentication and then saved to a separate pending database. But to only notify user a new message is received without any preview, almost everything can be secured with NSFileProtectionComplete.
Nuttso So it can't set up its keystore key with the authentication protection (aka require the unlock state).
But Signal on iOS works exactly like this. See above
[this is not correct, it doesn't keep data at rest after first unlock on either Android or iOS even though it could]