Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Its [sic] funny that people have to all learn the same lessons over and over again

That pretty much defines what the field of computer security is. From DES to AES, we learned the same lesson: As things designed to be secure are put out in the real world, with sufficient enough time, they're broken. It's important not to make the same mistakes again and again, and that's nearly impossible to do with JS-Crypto since there are so many permutations of platform X on implementation (browser) Y. As long as the numbers of platforms is large and the numbers of browsers are large, having one implementation that works properly in all platforms isn't practical.

However, a specific implementation targeted at a specific browser/platform could be vetted provided the JS engine handles random numbers in a cryptographically sound manner. Ideally, the browsers would expose ways to call vetted cryptographic APIs directly via JS.



That's already happened w/ the crypto.getRandomNumber function, which openpgp.js uses/


That really doesn't change the equation. That's only if you can trust the client code...and it just isn't feasible with JS sent to you from a 3rd party.

pgp works because it transfers data and not code.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: