>
> It's not quite correct that we see your private key, even encrypted; but
> it's close enough for these purposes.  Mozilla could be compelled to
> provide information that gives law enforcement a privileged attack on your
> password.  If you choose a strong password, this is as hard as breaking the
> private keys that were used in Old Sync.
>

It's worth noting that most of these theoretical noodlings converge on the
same point: the point at which a government is able to compel Mozilla to
attack your Firefox Account — that is, they know your email address and
that you use Sync — is also the point at which they could attack you
without bothering to do so.

For example, we could theoretically be compelled to push out a point
release or hotfix that leaks your credentials, or a government could
compromise our stack without our cooperation, or you could be spearphished.
If you use Android, for example, the government could compel Google to
remotely install and run code on your Android device as root. As soon as
code is running in your browser, or on your phone, they have all of the
data that's in your Sync account without touching the server.

If I were trying to get your browsing history, I would give up on attacking
your Sync account as soon as I tried "hunter2" and "password" as the
passwords, and I'd switch to more direct methods.

This is a roundabout way of saying: security is much more than just
encryption.
_______________________________________________
Sync-dev mailing list
[email protected]
https://mail.mozilla.org/listinfo/sync-dev

Reply via email to