I thought this was a good post, but I wasn't impressed with the criticisms of other blog posts. Okay, perhaps I'm biased, because I wrote one of them, but how about I try to defend the other?<p>The Matasano post is here:<p><a href="http://matasano.com/articles/javascript-cryptography/" rel="nofollow">http://matasano.com/articles/javascript-cryptography/</a><p>Perhaps the most objectionable thing about the Matasano article is title. Otherwise it does a very good job of criticizing a particular way of engineering web cryptography that is, for lack of a better term, total bullshit. But is the approach criticized in the Matasano post used in the real world?<p>Let's try an experiment! Go to google.com and type in "encrypted chat"<p>If your results are similar to mine, one of the top 3 results will be "chatcrypt.com". Let's read the "How It Works?" page:<p>> Most people thinks that if a website uses a HTTPS connection (especially with the green address bar) then their "typed-in" informations are transmitted and stored securely. This is only partially true. The transmission is encrypted well, so no third party can sniff those informations, but there is no proof that the website owners will handle them with maximum care, not mentioning that the suitable laws can enforce anyone to serve stored data for the local authorities.<p>Okay, so this site attempts to implement end-to-end encryption in a web browser. Except... what's the problem? Oh, it looks like chatcrypt.com isn't served over HTTPS. In fact, if we try to visit the site over HTTPS, it doesn't work at all.<p>chatcrypt.com claims to keep your traffic secure using end-to-end cryptography implemented in JavaScript, except the JavaScript is being served in plaintext and is therefore easily MitMable.<p>Top 3 Google result for "encrypted chat"<p>Is the Matasano post that unreasonable? (besides the title) It pretty much describes that sort of site to a tee.