TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Sharelock – Securely share data

87 pointsby woloskiabout 10 years ago

10 comments

lilyballabout 10 years ago
From the &quot;Security&quot; page:<p>&gt; <i>Urls are ephemeral, they are NOT stored anywhere (neither your secrets). The content you share lives encrypted in the URL.</i><p>&gt; <i>The decrypted content can ONLY be accessed by the people that you shared shared the data with by means of login and email verification (as opposed to, let&#x27;s say, Dropbox links which can be accessed by anyone who has the link).</i><p>(note: &quot;shared shared&quot; is present in the original. I hope that gets fixed)<p>&gt; <i>Secrets are signed with HMAC SHA256 and encrypted with AES 256 CTR using keys that live on the Sharelock server</i><p>So it seems that the server holds the keys, and doles them out to users that prove their identity. And the URL holds the secret. So we&#x27;re pretty much taking it on faith that the server never logs the URL anywhere (not just in the actual backend, but in access logs for any middleware or load balancers or anything else).<p>As for authentication, the animated slideshow on the front of the site says the user has to login with a Google, Facebook, Microsoft, or Twitter account (I assume that secrets shared with twitter handles must use the Twitter login, but for emails it presumably uses any of them).<p>I&#x27;m a bit concerned about the identity verification angle. If someone manages to compromise any of those 4 accounts, then that means they can then decrypt any URLs shared with that user (if they manage to get at the URL). Twitter accounts being compromised is not that uncommon. And it would be especially bad if the sharelock URLs are then sent via Twitter (say, Twitter DMs) to that user, because then the attacker has both the URL and the keys. Or perhaps the user doesn&#x27;t even realize they have an old Microsoft account, one with a pathetically weak password, and the attacker breaks into that.<p>In fact, that may very well apply to me (I don&#x27;t use anything that requires a Microsoft login, but I did once have a (rarely-used) Windows Live login, and if Microsoft converted those into whatever their current authentication setup is, then I probably have an account with a terribly weak password).
评论 #9111969 未加载
评论 #9110196 未加载
评论 #9110182 未加载
评论 #9112180 未加载
评论 #9110271 未加载
daddykotexabout 10 years ago
I tried it from my browser to my cellphone. I use a Nexus 5 and it worked very well. I didn&#x27;t have to install the app making it even easier.<p>Good job.
psandersenabout 10 years ago
As others have point out this just means you have to trust Sharelock. While its slightly less user friendly, and it has its own security issues would the following be viable:<p>1) Sender clicks &#x27;share a file&#x27; and no file is uploaded yet. 2) Email is sent to recipient, explaining that they have an encrypted file waiting for them, and takes them through creating a public key done in their browser via JavaScript (biggest vulnerability....) 3) Original user receives email&#x2F;notification with senders public key, and uploads a file that is encrypted with that public key. 4) Recipient receives notification that the file is now ready, and decrypt it with their client side JavaScript.<p>That way Sharelock or another service will never store the unencrypted files, and this service can be made more secure with open source uploader&#x2F;key generation (e.g. for people more security conscious they dont use the webapp, but they use an API with their local app). Sharelock should commit to never holding backups of user data, and deleting all files after they have been &#x27;received&#x27;.<p>It makes sending encrypted files as convenient as is possible, and be useful for many projects where the client doesnt want to share the plaintext data but it needs to be easy to use.<p>Thoughts?
评论 #9110419 未加载
评论 #9111725 未加载
评论 #9110468 未加载
rakooabout 10 years ago
If it&#x27;s text only, there&#x27;s also zerobin (<a href="http://sebsauvage.net/wiki/doku.php?id=php:zerobin" rel="nofollow">http:&#x2F;&#x2F;sebsauvage.net&#x2F;wiki&#x2F;doku.php?id=php:zerobin</a>) that has a lot of features and the added bonus of not storing the key on the server (it&#x27;s using the anchor part)
评论 #9110619 未加载
moeabout 10 years ago
Since this is limited to about the length of a tweet and requires to fully trust a third party (Sharelock), why not just send the message directly on Google, Facebook or Twitter?<p>What is Sharelock adding here other than a false sense of security? Are we supposed to trust Sharelock more than the aforementioned services?
politegooseabout 10 years ago
Does anyone here have experience with Tresorit? [1] They claim to offer something similar in terms of secure sharing, but with zero-knowledge encryption, i.e. without storing keys on the server. [2] Trouble is that the service seems very new, so not many reviews exist. The client being closed-source doesn&#x27;t help, and I&#x27;m not in a position to evaluate their bounty program.<p>[1] <a href="https://tresorit.com/features" rel="nofollow">https:&#x2F;&#x2F;tresorit.com&#x2F;features</a><p>[2] <a href="https://tresorit.com/files/encrypted-link-whitepaper.pdf" rel="nofollow">https:&#x2F;&#x2F;tresorit.com&#x2F;files&#x2F;encrypted-link-whitepaper.pdf</a>
didgeoridooabout 10 years ago
No comment on the underlying technology or security, but damned if that isn&#x27;t one of the best &quot;explainer&quot; animations I&#x27;ve ever seen. I&#x27;m adding this to my personal &quot;awesome onboarding&quot; catalogue.
评论 #9112068 未加载
EGregabout 10 years ago
Sign in with google? Facebook?<p>So you have to trust them, since they can get your data. No?<p>If anything, Apple&#x27;s iMessage already lets you send secure data this way. Apple doesn&#x27;t hold the keys, and messages are encrypted locally.<p>The site doesn&#x27;t scroll properly on iPhone 5. Probably was designed with iPhone 6 in mind.<p>Otherwise - this is a cool concept! Just fix the auth.
avenpaceabout 10 years ago
Strange coincidence that we share same name with bit similar concept under different tld. Mine is <a href="http://sharelock.co" rel="nofollow">http:&#x2F;&#x2F;sharelock.co</a> Kudos for nice ui
评论 #9112132 未加载
coderzachabout 10 years ago
How are keys shared between users?
评论 #9110117 未加载
评论 #9110101 未加载