TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

“End-to-End incompatible with Chrome Update functionality”

28 pointsby hodgesmralmost 11 years ago

12 comments

opendaisalmost 11 years ago
This is the most likely attack vector for any automatically updating program on your computer, not just End-to-End.<p>What would stop a maliciously updated Chrome from recording all your keystrokes in the browser [all of your password; passphrases] as well as copying where you were at the time?<p>Etc.<p>This is one of those things where if you think the Government is going to silence you for being a dissenting voice and&#x2F;or steal your info because of it...you grab an open source project, you compile it, you use that. You don&#x27;t grab closed source software that automagically updates.<p>I don&#x27;t think its reasonable to expect Google to protect the user from -every- potential attack vector.
评论 #7845928 未加载
willvarfaralmost 11 years ago
This is true if you have any program or OS upgrade going, whether manual or automatic.<p>&quot;Ignore&quot; is just a linkbait title :(
评论 #7847468 未加载
antmldralmost 11 years ago
This isn&#x27;t a bug &#x2F; complaint &#x2F; observation of a vulnerability of End-to-End per se, you could argue Microsoft could be NSL&#x27;d to do the same to a user&#x27;s operating system.<p>To counter this you&#x27;d need a secure, distributed way to release updates in Chrome. I don&#x27;t think that&#x27;s quite in scope of what this project is trying to accomplish.
评论 #7845840 未加载
DanBlakealmost 11 years ago
Maybe the solution is to have the automatic downloads of chrome be anonymous and build the system in such a way that changing it would not be possible.<p>Basically, change the chrome automatic updater to not send any identifying information when it requests a update. That way, you can be sure that Google couldn&#x27;t just target &#x27;you&#x27; with a update.<p>Then, you just need to rely on the fact that people would be watching the chromium code for any changes which would negate the above anonymity.<p>The real challenge would be for Google to develop a way where they could not still identify people from their other data (IP, cookies, etc..) when they were requesting a update.<p>Maybe have a third party host&#x2F;store chrome update binaries? Something like amazon S3 or something which would not data share with Google.
评论 #7845830 未加载
Zigurdalmost 11 years ago
It is a hard problem, and it&#x27;s a positive sign that Google acknowledges the problem. Providing end-to-end security also goes against the trend of expanding the non-open parts of their Android app suite.<p>In addition to the reported bug, this plugin is handing cleartext back to Google-controlled code. Web apps and good security are still miles apart.<p>But this is still a significant change from a year ago when we heard internet portal CEO kvetching about the NSA and not even mentioning and-to-end encryption.<p>There is still a VERY long way to go before this counts as democratizing end-to-end security. Any portal that has real time communication tools and a social graph could also provide tools for automating Web-of-trust and key exchange.<p>All journeys etc.
rlx0xalmost 11 years ago
I think its a moot point, if the government is the attacker, who tries to spy on you specifically, there is absolutely NOTHING you can do to prevent that from happening.<p>The US government has (literally) secret laws, that grants themselves the right to go to another country and kill someone without due process or trial or any kind of repercussion if they &#x27;accidentally&#x27; kill innocent bystanders.<p>Its sort of laughable to talk about end to end encryption and possible NSL when you really think about it.
评论 #7850225 未加载
stcredzeroalmost 11 years ago
You know, if we had DRM infrastructure we could actually trust, this wouldn&#x27;t be a problem. Granted, having DRM we can trust may well be itself an insurmountable problem.
评论 #7845898 未加载
raldialmost 11 years ago
It doesn&#x27;t seem like they&#x27;re ignoring it. They just don&#x27;t have a quick fix for this hard problem.<p>If you&#x27;ve got an easy answer, please post it on the bug!
danielweberalmost 11 years ago
What&#x27;s the precedent for a company ever being required to ship backdoored products to their customers by government legal order, NSL&#x27;d or otherwise?<p>&quot;The FBI once lobbied for the government to give them that power!&quot; or &quot;look at these service companies that had evidence in their possession they were required to turn over!&quot; are non-answers.
评论 #7845738 未加载
评论 #7848734 未加载
评论 #7845930 未加载
McDieselalmost 11 years ago
Since when does the google store update an extension not installed through the google store?
评论 #7845762 未加载
comboyalmost 11 years ago
It&#x27;s open source and you don&#x27;t have to install it through the google store.
Foxboronalmost 11 years ago
Couldnt this be countered by writing your own script checking the hash of the files X times a day?
评论 #7845755 未加载
评论 #7845823 未加载