TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

TLSNotary – Prove you received a webpage from a server with TLS signatures

63 pointsby crazypythonover 3 years ago

4 comments

KennyBlankenover 3 years ago
Sounds like it&#x27;s been rendered useless since at least late 2020? From the github:<p>&gt; UPDATE October 2020. These instructions will only work if you use an old Firefox version which was around in 2015 (e.g. v37). Additionally the website you plan notarize must support TLS 1.0 or TLS 1.1 (a rare thing in 2020). Finally, you will have to modify &#x2F;src&#x2F;shared&#x2F;pubkeys.txt and provide pubkeys which are up-to-date. Run the auditee like this python2 .&#x2F;src&#x2F;auditee&#x2F;tlsnotary-auditee.py<p>Also, the site fails hard at explaining <i>how the hell it works</i>. If you&#x27;re in a situation where you need something like this, <i>you</i> understanding how it works is irrelevant. It needs to be understood and believed by the person arbitrating the dispute. I&#x27;m a sysadmin, I&#x27;ve read it three times, and I&#x27;m still left blinking in confusion. I can&#x27;t figure out whether it&#x27;s exploiting some TLS weakness, or the plugin is performing a separate fetch of the page with the user&#x27;s session credentials, or what.<p>Can anyone explain?
评论 #29092498 未加载
评论 #29092219 未加载
Ar-Curunirover 3 years ago
There&#x27;s other mechanisms that work with recent TLS protocols, like Deco: <a href="https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;1909.00938" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;1909.00938</a>
评论 #29096865 未加载
nieveover 3 years ago
As far as I can tell &quot;by logging out before delivering the data, he can render any session cookies invalid&quot; means that if you use this mechanism and forget to sign out partway through the process you&#x27;re potentially handing over session cookies. This seems like a really unsafe design.
评论 #29091742 未加载
tdhz77over 3 years ago
<a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=cVknXa1bg2M" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=cVknXa1bg2M</a><p>Why is the video shot in Windows XP? How old is this project?
评论 #29092773 未加载