Hi,

there is an episode from Hak5 that claims to show a security vulnerability
of OpenPGP.js: https://www.youtube.com/watch?v=NnHOYSRrqS4

As an example they demonstrate an "exploit" and extract private keys
from a Mailvelope and MyMail-Crypt installation.

Basically they own the machine first and then read in the localStorage SQL
file
where OpenPGP.js stores the keys in clear text.

My points on this:

- OpenPGP.js is not meant to be for hostile environments
- This is true for other PGP implementations as well. Take GPG: if you own
the machine you can also do a "gpg --export-secret-key -a" and get all the
keys
- There is a speculation in the episode about a possible attack on the
localStorage from other addons or external websites. This boils down to the
never ending discussion if the browser is a suitable platform for crypto or
not.
- It would be good to have a more modular persistence layer in OpenPGP.js
to enable applications to implement their own secure storage.

Any thoughts?

Thanks,
Thomas
_______________________________________________

http://openpgpjs.org

Reply via email to