Re: [liberationtech] Encrypted Pastebins: Attack Vectors against ezcrypt.it and 0bin.net

2014-01-21 Thread shootak...@riseup.net
Hi Lucas, I tried to set up a secure WebRTC server about one month ago using Kamailio with the Mediaproxy-ng to bridge text, audio, and video with appropriate ciphers which provided random public keys per session. The main security problem I found was with WebRTC's reliance on PKI to secure the

Re: [liberationtech] Encrypted Pastebins: Attack Vectors against ezcrypt.it and 0bin.net

2014-01-15 Thread coderman
On Tue, Jan 14, 2014 at 6:44 PM, Uncle Zzzen unclezz...@gmail.com wrote: 3. Passive global adversary attack: As long as the JS is what the owner claims it is (assuming it's code that has been peer reviewed enough according to your standards), it doesn't matter whether they confiscate

Re: [liberationtech] Encrypted Pastebins: Attack Vectors against ezcrypt.it and 0bin.net

2014-01-15 Thread coderman
On Tue, Jan 14, 2014 at 6:53 PM, Tony Arcieri basc...@gmail.com wrote: ... http://cryptosphere.org I also detail the present unsuitability of the browser for cryptographic applications in this blog post: http://tonyarcieri.com/whats-wrong-with-webcrypto i see what you did there. browser

Re: [liberationtech] Encrypted Pastebins: Attack Vectors against ezcrypt.it and 0bin.net

2014-01-15 Thread Tony Arcieri
On Wed, Jan 15, 2014 at 4:34 AM, Eduardo Robles Elvira edu...@gmail.comwrote: This is what I call the server-in-the-middle attack. My proposal would be to do something like SSL for end-to-end crypto. To have secure isolated reusable web-components so that you don't need to trust the web site,

Re: [liberationtech] Encrypted Pastebins: Attack Vectors against ezcrypt.it and 0bin.net

2014-01-14 Thread Uncle Zzzen
IMHO there's a #readme missings at the end of the Learn more url. Makes it kinda hardcore ;) On 15 January 2014 09:53, Tony Arcieri basc...@gmail.com wrote: On Tue, Jan 14, 2014 at 6:44 PM, Uncle Zzzen unclezz...@gmail.com wrote: Maybe one day JS will introduce signed code :) If this

Re: [liberationtech] Encrypted Pastebins: Attack Vectors against ezcrypt.it and 0bin.net

2014-01-14 Thread Scott Elcomb
On Tue, Jan 14, 2014 at 9:44 PM, Uncle Zzzen unclezz...@gmail.com wrote: Maybe one day JS will introduce signed code :) Coming at that from a different angle... tl;dr [1] It's possible to sign JS, it's just a pain. See for example:

[liberationtech] Encrypted Pastebins: Attack Vectors against ezcrypt.it and 0bin.net

2014-01-13 Thread carlo von lynX
Synopsis: Hi, you may have seen the popularity rising of https://ezcrypt.it and its imitator https://0bin.net. These are services that let you encrypt a message using Javascript in your own browser, then pass on the encrypted contents for the service to store while you pass the

Re: [liberationtech] Encrypted Pastebins: Attack Vectors against ezcrypt.it and 0bin.net

2014-01-13 Thread Gregory Maxwell
On Mon, Jan 13, 2014 at 4:57 AM, carlo von lynX l...@time.to.get.psyced.org wrote: Sorry for spoiling this apparently easy solution, but the Internet is currently more broken than that. I don't think you're spoiling it. I use 0bin only for things I'd otherwise use a non-encrypted tool