TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A Criticism of JavaScript Cryptography

33 点作者 ementally大约 2 年前

5 条评论

codeflo大约 2 年前
This seems to argue that accessing a web app (assuming an important piece of software that handles private encrypted data) is no less secure than loading software from a package repository, because a web server requesting the JavaScript and a software updater loading binary code from a server is structurally identical.<p>The obvious response to this is offline signatures: For package managers, app stores, updaters and the like, the integrity of the update server itself doesn&#x27;t really matter, because the installer verifies a cryptographic signature from an offline key.<p>This argument is acknowledged, but seems to be dismissed without a real explanation:<p>&gt; More astutely, there&#x27;s also the distinction that either a file system compromise or a key compromise is required to serve malicious code to users with TLS, but software repositories can be architected such that a key compromise is required, through the implementation of offline keys. Despite this, though, there are several examples of secure software repositories that successfully use TLS. This isn&#x27;t a grave concern (and they probably won&#x27;t be converting soon) because the decision to use offline keys is palliative, at best, and only marginally increases a system&#x27;s level of security.<p>&gt; However, I openly concede that there are cases where a software repository can offer a higher level of security than a browser is currently capable of. I plan to discuss this later.<p>AFAICT, this &quot;later&quot; doesn&#x27;t happen in this article, though I might have missed something. I really don&#x27;t see why offline signatures are only &quot;palliative&quot;. Web servers are hacked all the time, DNS misconfigurations happen, but organizations losing control of their software signature keys is comparatively rare. Why would you give up a very effective level of defense if it&#x27;s so easily available?
评论 #35036276 未加载
woodruffw大约 2 年前
(2014).<p>This is a response to Matasano&#x27;s &quot;JavaScript Cryptography Considered Harmful&quot;[1], except Matasano no longer exists and the link in the post 404s.<p>Archived[2].<p>[1]: <a href="https:&#x2F;&#x2F;matasano.com&#x2F;articles&#x2F;javascript-cryptography&#x2F;" rel="nofollow">https:&#x2F;&#x2F;matasano.com&#x2F;articles&#x2F;javascript-cryptography&#x2F;</a><p>[2]: <a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20120414231547&#x2F;https:&#x2F;&#x2F;matasano.com&#x2F;articles&#x2F;javascript-cryptography&#x2F;" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20120414231547&#x2F;https:&#x2F;&#x2F;matasano....</a>
评论 #35034219 未加载
评论 #35037699 未加载
评论 #35035199 未加载
franky47大约 2 年前
&gt; Do &quot;secure keystores&quot; just not exist?<p>Probably not if we consider threat models evolving in the same userspace as where they&#x27;re implemented (eg as cited: keyloggers and malicious native programs).<p>HSMs may provide an entrypoint to the &quot;root of secrecy&quot; problem, though the way they interface with the system now becomes the single point of defense.
评论 #35038212 未加载
dgl大约 2 年前
I’d really like to see something like <a href="https:&#x2F;&#x2F;engineering.fb.com&#x2F;2022&#x2F;03&#x2F;10&#x2F;security&#x2F;code-verify&#x2F;" rel="nofollow">https:&#x2F;&#x2F;engineering.fb.com&#x2F;2022&#x2F;03&#x2F;10&#x2F;security&#x2F;code-verify&#x2F;</a> become a more standard part of browsers. i.e. a standard way to go from sub-resource integrity to “full integrity”.<p>Having it as an extension just moves the weak point to the extension update mechanism.<p>Of course apps can just distribute themselves as an extension which is probably the best compromise right now and something most web based password managers for example already offer.
bawolff大约 2 年前
Crypto is always about having some people you trust, having some adversaries, and being able to interact with the trusted people without the adversary interfereing or evesdropping.<p>Most in browser crypto seems to view the web server as both the adversary and the trusted party at the same time. That is obviously not going to work well in most cases.
评论 #35035928 未加载