TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Launch HN: SignAuth – A auth protocol bases on ed25519 high-security signatures

5 点作者 sullof超过 4 年前
I built in 2006 the first Host-proof Hosting Online Password Manager, Passpack (it still exists, but I sold it in 2013). I am fascinated by security and obsessed with details.<p>Any major web service sends your password to their server in plain text. Only when the service receives the password, it derivates it and saves it in the database. What happens is a smart employee puts a backdoor at the beginning of the flow and steal your password? I worked in many large companies, and security is not what they would pretend it is. So, at the end of November, I decided to try a different authentication approach, using ED25519 Elliptic Curve. It took my one day to build the library, because I reused a library that I wrote for Secrez.<p>After using it for two months without having problems, I think it is time to talk about it.<p>If you visit https:&#x2F;&#x2F;signauth.cc you can find a brief introduction to the protocol, and you can see how it works.<p>The code is open-source at https:&#x2F;&#x2F;github.com&#x2F;signauth, and there is also an Express-react boilerplate.<p>Any comment, opinion, suggestion, or critic is very welcomed.

1 comment

solus_factor超过 4 年前
What happens if a smart employee puts a backdoor in the client code served to you?
评论 #25934204 未加载