Re: [FD] end of useable crypto in browsers?

2016-04-15 Thread Tony Arcieri
nge-response auth system with a key shared across origins, where an attacker can trick you into exposing it, and effectively MitMing the challenge/response) The reality of is its many problems meant adoption was extremely low, so it's not surprising

Re: [FD] Critical bash vulnerability CVE-2014-6271

2014-09-25 Thread Tony Arcieri
On Thu, Sep 25, 2014 at 8:55 AM, Michal Zalewski wrote: > In what way? It doesn't have a logo, so it's a bit better in my book. That's where you're wrong: https://pbs.twimg.com/media/ByVh24fCcAAy7mT.png -- Tony Arcieri __

Re: [FD] keybase.io

2014-06-25 Thread Tony Arcieri
facts. They're installed and updated as granular, auditable units. Using browser plugins for crypto is much less objectionable than "just a web page" IMO. I've written a blog post about this, FWIW: http://tonyarcieri.com/whats-wrong-with-webcrypto -- Tony Arcieri

Re: [FD] keybase.io

2014-06-23 Thread Tony Arcieri
the scripts every single time you load the page, they (or anyone with access to their servers, or anyone able to pull off an XSS attack) could easily inject a keylogger or other mechanism for recovering the password. -- Tony Arcieri ___ Sent through th

Re: [FD] keybase.io

2014-06-22 Thread Tony Arcieri
of priorities for secure software. -- Tony Arcieri ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/

Re: [FD] Telegram authentication bypass

2014-04-29 Thread Tony Arcieri
;client is duped into installing malware" attack? -- Tony Arcieri ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/