top | item 33945499

(no title)

svet_0 | 3 years ago

Really boring report, nothing of real essence. Either G's product is bullet-proof or the research quality from NCC has deteriorated.

discuss

order

nibbleshifter|3 years ago

The quality of work from NCC has always been really inconsistent. It also depends on "which part of NCC" you were looking at.

Aachen|3 years ago

> It also depends on "which part of NCC" you were looking at.

For the security consultancy part of NCC, it's not like I catalogue and re-check their findings so probably this is biased, but the only report I remember is the one from Keybase where they failed to notice that the claimed end to end encryption trusts the server to deliver the right keys. This was tested together with some other people on HN and packet capturing (one theory was that it checks the third-party websites like reddit/HN/... proofs, and that it's user error if you don't have any, but no, not even that).

I was really surprised by both Keybase getting something so fundamental wrong (they claim some blockchain magic verification which you can do on the command line, but the app doesn't have a blockchain client and no manual fallback either, so it's never verifying anything and instead fully trusts the centralized Keybase-operated proprietary servers) and by NCC not noticing this problem. Someone I knew from the security stackexchange site and whom I admire greatly took part in the audit, but of course they never replied (not even declining to comment) when I emailed them with a question about how this verification works (at that point, I still felt like I must be missing something so this email wasn't phrased accusatorily).

I don't have a bad impression of NCC in general and we all make mistakes, but yeah that's the example that stuck in my mind.