You obviously don't know what you are talking about or just did not get
what I explained or just do not understand http versus https or the
contrary, or just do not understand the web, what's on client side
(browser) or on server side, or don't get that your extension can be
mitmed too including its signature.
So unfortunately I have to stop this discussion right here with you, not
to waste the time of serious people on this list, if you want to restart
with another tone, then please go, but first checkout what is writen on
Peersm site, everything is explained, including your focus on elementary
mitm issue, your arguments and judgement are so basic that I am
wondering why I am answering it, you should do some reading, and if you
can trivially defeat Peersm, then just show us how
Le 21/07/2014 22:53, Tony Arcieri a écrit :
On Mon, Jul 21, 2014 at 12:59 PM, Aymeric Vitte
<vitteayme...@gmail.com <mailto:vitteayme...@gmail.com>> wrote:
Please read again what I have written, your answer just extracts
really basic parts out of the context and does not take into
account the whole picture that I have explained, I already read
the link you provided some years ago, I recall it as trivial
and/or too old statements unfortunately having still enough
visibility on the web to disinform people.
I read what you wrote. You're wrong. You are very, very wrong.
The code loading is an unsolvable issue unless you do what I have
writen.
Loading JavaScript of any kind over plaintext HTTP is a bad idea.
Loading JavaScript implementing cryptography is a sign you have no
fucking clue what you're doing. It's the equivalent of a giant "DANGER
WILL ROBINSON: THIS CODE IS UNSAFE" sign.
Extensions, plug-in, add-on can not secure you more than a js code
that you can not hide
Browser extensions are cryptographically signed. Plaintext HTTP is
trivially rewritten by an attacker. Systems like Peersm are
horrendously vulnerable to an active attacker.
And at the end, what I am talking about is a standalone js app
inside browsers, this is highly doubtful that someone can question
the security of this, I would like to see it (but then please read
exactly what I wrote)
If someone has a "privileged network position" (i.e. your barista),
they can catastrophically compromise the alleged "security" of such a
system via an incredibly trivial MitM attack.
This same attack cannot be performed against cryptographically signed
browser extensions. Even adding HTTPS to your HTML/JS site would be a
step up.
This app is poorly implemented and dangerous and it would be best for
you to either find some way to serve it over HTTPS or delete it from
the Internet.
--
Peersm : http://www.peersm.com
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password by emailing moderator at
compa...@stanford.edu.