TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Why no browser-based E2E encryption?

1 pointsby pcloadletter_about 1 year ago
I created a toy web app locally that does single-use e2e encryption. It uses browser subtle crypto (https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;API&#x2F;SubtleCrypto).<p>Essentially the idea is that you land on the page and an asymmetric keypair is generated for you. You send a link to someone else that contains the public key in the URL. When they go to that link, they can encrypt a payload using your public key (envelope encryption, which I believe is needed for arbitrary payload sizes). They send you the encrypted payload back and you can decrypt in your existing browser session.<p>So if it&#x27;s not obvious by now, I&#x27;m clearly no cryptography expert, but I know enough to be horrifyingly dangerous :). Can anyone here help me understand where this model breaks down, assuming someone very smart about this stuff were to do the implementation? Thank you!

3 comments

ahazred8taabout 1 year ago
[where this model breaks down] -- Alice and Bob go to your website and have a conversation. Eve hacks into the website and modifies the E2EE code. She can switch between serving the normal webapp and the malicious non-E2EE webapp. There&#x27;s no good way to detect it. There are people out there who really like end to end security, but don&#x27;t like browser-based e2ee because it doesn&#x27;t have end to end security.<p>Note: <a href="https:&#x2F;&#x2F;www.cyph.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cyph.com&#x2F;</a> is a bbE2EE chat system.
评论 #39737636 未加载
controversial97about 1 year ago
Perhaps search hnn for &quot;cryptocat&quot; which was an attempt to do e2e chat through a website a dozen years ago. It was somewhat controversial at the time.<p><a href="https:&#x2F;&#x2F;hn.algolia.com&#x2F;?q=cryptcat" rel="nofollow">https:&#x2F;&#x2F;hn.algolia.com&#x2F;?q=cryptcat</a><p>The author gave up on it after a while and the website stopped working.
pvgabout 1 year ago
<i>When they go to that link</i><p>If that server is compromised, the whole thing is compromised so it&#x27;s not really e2e.
评论 #39735613 未加载