Why browser-based crypto sucks: MEGApwn bookmarklet shows just how easy it is to get access to your MEGA private key http://nzkoz.github.io/MegaPWN/
@dakami @BrendanEich @ashk4n please see page 2, under "Main contributions": https://isis.poly.edu/~jcappos/papers/samuel_tuf_ccs_2010.pdf …
-
-
@bascule@BrendanEich@ashk4n like keying isn't hard enough, that we need more keys. I swear, people need to do tours of duty in ops -
@dakami@BrendanEich@ashk4n see what happened to RubyGems with the YAML vulnerability, or more recently with TorBrowser -
@bascule@BrendanEich@ashk4n cryptographers have a habit of treating ops like a massive externality -
@dakami@BrendanEich@ashk4n I work in ops, FYI -
@bascule@BrendanEich@ashk4n ever put a passphrase on a production SSL cert? :) -
@dakami@BrendanEich@ashk4n no, but TLS aside we keep our encryption keys for sensitive data airgapped: http://www.slideshare.net/diogomonica/bletchley … -
@bascule@dakami@BrendanEich@ashk4n Yikes, those are some real disadvantages. Especially the cross-DC problem. -
@grittygrease@dakami@BrendanEich@ashk4n cross-DC problem is solvable, and HSMs are a PITA but certainly help pass PCI audits ;) - 13 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.