top | item 35442308

“Breaking Cryptography in the Wild: Nextcloud”

4 points| martinralbrecht | 2 years ago |twitter.com

1 comment

order

martinralbrecht|2 years ago

- Issue 1: using uninitialised keys. - Issue 2: IV reuse in AES-GCM when a file is re-encrypted after an update. - Issue 3: a malicious server can place a chosen key in a victim user's encrypted keystore; the user then rotates everything to that key on next login/update.