On 05/04/2019 20:37, mhoye via governance wrote:
That's not a spectacular argument, but our engineering resources are finite and in the face of other security issues we definitely need to manage, like Spectre - which absolutely does have some spectacular arguments in its corner - that argument has always been enough to move this bug far enough down the priority list that we never get to it.

Having said that, I'm definitely sympathetic to the position that if we're offering to encrypt something at all, we shouldn't be using weak or dated encryption for the job however remote we feel the related risks are.

Thanks for your reply.

To me, the most likely attack vectors are one of these two:

Some malware one the machine which only needs to be active for a very short amount of time shipping out the password database. It happened to me once that such malware shipped out my totally unencrypted FileZilla FTP password database. The attackers took over all my websites and installed their malware there; I was alarmed by Google's webmaster tools or some other Google tool. Of course I changed my FTP client immediately. Just now I read that FileZilla actually changed their product after years of user complaints.

There was a bug in Thunderbird, were Thunderbird would ship out a file on request by an attacker, see https://bugzilla.mozilla.org/show_bug.cgi?id=1151366.

The second situation is an office situation where someone leaves their machine unattended for two minutes. No software is required to do a "walk by" attack and carry away the password database on a USB stick.

Decent encryption would immediately defeat both attacks.

Kind regards, Jörg.

_______________________________________________
governance mailing list
governance@lists.mozilla.org
https://lists.mozilla.org/listinfo/governance

Reply via email to