Hey Yonas,

The situation back during the 0.5 days was that a request to a gadget's own
back-end servers wasn't signed, hence you could easily change a url from
?song=foo&owner=yonas to ?song=bar&owner=chris.. thus "hacking" OpenSocial.

Quickly after that initial release we've added signatures (using oauth to be
precise, see
http://wiki.opensocial.org/index.php?title=Validating_Signed_Requests for
the exact details) to these requests which cryptographically guarantee that
a query hasn't been tampered with, so this hasn't been an issue any more for
a very long time.

As far as the 1.0 release goes, the current thinking is that that will just
be a spec documentation fix up, so it won't be technically different from
0.9 in any significant ways.

So I understand your concern when you have to base your business on a bit of
unknown technology, but this platform is run in production for 800+ million
end users by the majority of the social web, many tens of thousands
applications and is used inside of security-critical enterprise situations,
we've come a long long way since the initial release and that old bit of
news really has no relevance and hasn't for a very long time already.

   -- Chris

On Wed, Sep 16, 2009 at 9:34 PM, Yonas <[email protected]> wrote:

> Hi,
>
> According to:
>
> http://www.techcrunch.com/2007/11/05/opensocial-hacked-again
>
> TechCrunch reported that OpenSocial was cracked within 20 minutes of
> release.
>
>
> I'm thinking of using OpenSocial/Shindig for a startup company, but I
> need to know how much of a security risk I'm taking. Since the gadget
> will be dealing with transferal of money, I'm very sceptical of the
> benefits outweighing the risk of being cracked.
>
> I understand that OpenSocial is still growing and isn't 1.0 yet, so
> maybe I should wait until then?
>
> Cheers,
> Yonas
>
>

Reply via email to