• 1 Post
  • 185 Comments
Joined 3 years ago
cake
Cake day: July 3rd, 2023

help-circle

  • There is no full stop there… A password that is sufficiently long will never be cracked no matter the hashing algorithm in use. Passwords are easily transferrable and can be communicated to a third party in the event of an emergency. They also provide tunable security, where you can trade off security for convenience if you want.

    Some (not all, I know) passkeys are tied to a device. Stolen device means stolen passkey, and it’s potentially very difficult to recover from that. Passkeys are also locked to a certain standard, passwords have no such restrictions.

    Tbh I don’t understand the move for passkeys replacing passwords. They should become the second factor when a user wants additional security. They’re perfect for that niche.


  • I once again cannot disagree more strongly. This is the BS that has been pushed by the mobile phone world. It couldn’t be more wrong. Well designed root access to your own device would dramatically increase its security for those who chose to use it.

    Here are a few things you simply cannot do on a phone and would be considered terrible in any other context:

    • Control system, root level services running on your device. The idea that you can’t do this is a security nightmare. It is the single most basic security tenant I can think of that is grossly violated. You have no control over your device’s attack surface
    • Control privileged non-root applications
    • Control network traffic. You have no low level control over your device’s firewall without root. You want egress rules? Sorry.
    • Linux namespaces. You literally are banned from accessing the single greatest Linux security feature since UIDs and GIDs. Network namespace isolation? You can’t do it. UID remapping? Nah. Mount namespaces? Nope.
    • SELinux policy. Android relies heavily on SELinux and you have no control over it at all.
    • Device handling. There was a great root exploit a long time ago with just a plugged in USB that would have never existed on devices that sanely disabled automounting.

    There is so much more. I can’t even imagine calling a device I had no root access to “secure” in a personal threat model. Business? Sure. Personal? God no. Not even close.

    This is in addition to the privacy benefits.










  • Lol, ok, fair.

    I guess I see a lot of wiggle room in the marketing speak of their page and I haven’t actually “looked in to” Proton Mail’s claims in a loooong time. So I guess what I really wanted to say is that it’s interesting to me that people take that marketing at face value if they’re actually trying to maintain secrecy. I’ve always just taken it as a given that third party services aren’t particularly good at that, especially as they grow in complexity like Proton has. Signal has been easier for me to believe because of the singular focus and the reputation of the founder in the crypto community; although I guess he’s long gone.


  • It’s interesting what people expect of Proton Mail. I’ve used it for a long time but for only one reason really: their revenue stream is my subscription and not ads. I’ve never even given a second thought to all their encryption claims. Even with Proton Mail if I ever wanted to send a “secret” email I’d wrap the content in my own personal keys.

    With respect to IP addresses of email logins, I’m surprised they ever claimed they don’t have logs. You’ve always been able to review the IP of a login through the web UI as far as I remember. Was the idea that that was also supposed to be encrypted?

    Personally I’m OK with them complying with court orders, but I understand that “the definition of criminal is state defined” and that poses serious issues. It kinda seems like if you want to do something that could be considered criminal at some point in your life by your country you should consider something other than a 3rd party email provider for those messages. Signal would be a step up in that regard if you still wanted to use a third party.




  • I don’t follow CVEs: when was the last time a remotely exploitable kernel bug was a concern? Ignoring the fact that this is a home server and they likely care about uptime a lot more than exploitation on their LAN.

    Generally I expect kernel bugs to be LPEs so updating user space would probably be sufficient for most home servers