TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Building a serverless secured dead drop

121 pointsby ayendeabout 1 year ago

15 comments

whartungabout 1 year ago
The one that interests me is inspired by the Blackhat movie.<p>The premise here is that the donor has an app on their phone. They load their data into the app.<p>Then they go to a mall, down town shopping district, someplace busy and they walk around.<p>When they got home they see a green dot showing the data has been transferred.<p>Somewhere hidden where they were walking is a BT receiver. The app and phone sniffed it out and sent the data as they walked by.<p>Once the data is loaded onto the drop, it’s exported out via a mesh of LORA radios.<p>I don’t know how to get BT radios to pair automatically without ever seeing each other, even between cooperating parties. Or maybe it could work with WiFi Direct. Not really familiar with that.
评论 #40593670 未加载
评论 #40595354 未加载
bhkabout 1 year ago
&gt; Both companies will provide any data they have, including the full contents of any messages, if provided with an appropriate court order.<p>As we have learned, many companies hosting your data do not even require a court order. An urgent-sounding email with an official-looking return address is all that is needed.<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30842757">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30842757</a>
jay-barronvilleabout 1 year ago
I’m kind of surprised no one has mentioned IPFS [0]. IPFS x I2P [1] or IPFS x Tor [2] gets you like at least 60%-75% there (depending on individual skills).<p>[0]: <a href="https:&#x2F;&#x2F;ipfs.tech" rel="nofollow">https:&#x2F;&#x2F;ipfs.tech</a><p>[1]: <a href="https:&#x2F;&#x2F;geti2p.net" rel="nofollow">https:&#x2F;&#x2F;geti2p.net</a><p>[2]: <a href="https:&#x2F;&#x2F;www.torproject.org" rel="nofollow">https:&#x2F;&#x2F;www.torproject.org</a>
secfirstmdabout 1 year ago
I think what we are specifically speaking about here is one where it can be done remotely. Intelligence orgs have had secure(ish) digital dead drops for years. Example:<p><a href="https:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;world-europe-16614209" rel="nofollow">https:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;world-europe-16614209</a>
igammaraysabout 1 year ago
I don’t get it. Can’t you just upload the data to an anonymous GitHub repo or other public service? Have a predetermined prefix for the repo name and you can pull it from the firehouse.
评论 #40598429 未加载
redman25about 1 year ago
Could you encrypt a file with a public key and expose it via web server that another server scrapes later. Maybe with a common url like example.com&#x2F;deaddrop. The dead drop server would decrypt the scraped file with the private key. You would have plausible deniability because any other site could have a dead drop endpoint with encrypted files. They would be indistinguishable from any others.
评论 #40592875 未加载
JZL003about 1 year ago
My favorite recent one I read was encoding it in the http packet delays. So the content of the server is innocuous but you measure the timings<p>I wonder how many packet sniffers record exact extremely-accurate timestamps, maybe you could even use synchronized gps clocks so even if the saved a millisecond (or better?) timestamp, you send enough packets with enough exact timings that you need to have saved higher resolution
评论 #40590761 未加载
评论 #40589867 未加载
评论 #40590373 未加载
评论 #40589520 未加载
reportgunnerabout 1 year ago
Article feels like an ad for serverless with a veneer of hackerman wearing a hoodie in a poorly lit room.
wwilimabout 1 year ago
Can&#x27;t a malicious entity running this system identify decoy messages by the fact that they are conveniently published at intervals divisible by 5 minutes? ie. 17:07:43 then 18:42:44
评论 #40590517 未加载
评论 #40590329 未加载
mdhbabout 1 year ago
This is dangerous advice for actually protecting people.
deadbabeabout 1 year ago
What exactly do people put into these dead drops?
评论 #40592734 未加载
hadlockabout 1 year ago
The ultimate serverless dead drop was a USB thumb drive epoxied into a hole in the wall, with only the port sticking out.<p>The only criteria the thumb drive in the wall fails is &quot;Accessible via Tor to protect against traffic analysis.&quot;, however it doesn&#x27;t need network access at all so I think it is kind of a moot point.<p>There is some minor risk of surveillance on the site, but that can be defeated with a fake mustache or whatever. Also physical security risk, the drive might be designed to damage computers that connect to it via a voltage spike.
评论 #40588677 未加载
评论 #40594415 未加载
评论 #40588597 未加载
评论 #40597421 未加载
评论 #40590360 未加载
评论 #40591497 未加载
okhumanabout 1 year ago
Lost me at uses AWS cloud services
评论 #40597605 未加载
tonetegeatinstabout 1 year ago
Serverless.... So a physical location
评论 #40592378 未加载
jongjongabout 1 year ago
One concern I have is the usage of Libsodium. Libsodium is way too popular to be secure. Many non-technical folks seem to think that just because a library has a lot of eyeballs on it, that it&#x27;s secure. Unfortunately, these libraries are very complex and low level. It&#x27;s possible to hide backdoors which look just like regular bugs; e.g. stack overflows can seem like accidental bugs. Also, popular libraries can be attacked at the distribution layer to backdoors may not even show up in the source code on GitHub. I&#x27;ve used Libsodium for Node.js in the past and the installation process was suspiciously heavy because it had to build a ton of C bindings. Red flags.
评论 #40593451 未加载
评论 #40592788 未加载
评论 #40596337 未加载