> From: bblisa [mailto:[email protected]] On Behalf Of Patrick Cable > Sent: Thursday, September 17, 2015 6:17 PM > > One thing I see missing from both your product/library github > page/indiegogo kickstarter page is a well-defined threat model. You mention > your use case and implementation (and I understand it), but I'm curious > about what boundaries/assumptions/etc. you had in mind when you built > the system?
Everybody knows they shouldn't login to anything over http:// We've all been trained to use https:// and ensure we have green checkmark security shields or whatever. Because thousands of random unknown employees maintaining the routers on the Internet could access the http traffic. When you login via HTTPS, to google, facebook, twitter, and thousands of other sites, there are still thousands of unknown employees maintaining the load balancers and web servers at the other end, who could access the traffic. It is a no-brainer. You should not send your password or encryption keys, even over https. You need to prove you know your secret without exposing it. _______________________________________________ bblisa mailing list [email protected] http://www.bblisa.org/mailman/listinfo/bblisa
