handsomeransoms | 11 years ago | on: The problematic culture of “Worse is Better”
handsomeransoms's comments
handsomeransoms | 11 years ago | on: Keyless SSL: The Nitty Gritty Technical Details
> You are implying something fundamental: that the encrypted traffic could be adequately analysed for insight without the need for decryption.
> Yet to do so would be to defeat SSL itself, or at least to declare it as insufficient to adequately protect secrets.
This is possible through HTTPS traffic analysis, see [0] and [1] for starters. Of course, it's much easier for Cloudflare to do analysis for DDoS protection if they have access to plaintext.Whether this means that SSL is, as you say, "insufficient to adequately protect secrets" is an interesting discussion to have.
[0] http://arxiv.org/pdf/1403.0297.pdf
[1] http://blog.ioactive.com/2012/02/ssl-traffic-analysis-on-goo...
handsomeransoms | 11 years ago | on: Debian Security Advisory: DSA-3025-1 apt
Anybody know how to find better descriptions of these bugs, or the patches that fixed them?
handsomeransoms | 11 years ago | on: We Experiment On Human Beings
handsomeransoms | 11 years ago | on: Retain Scroll Position in Infinite Scroll
handsomeransoms | 11 years ago | on: SecureDrop
handsomeransoms | 11 years ago | on: SecureDrop
handsomeransoms | 11 years ago | on: SecureDrop
handsomeransoms | 11 years ago | on: SecureDrop
We're working on a best practices guide for deployments [0]. I'll make sure these suggestions go in there. Feel free to take a look and comment if you're interested!
[0] https://securedrop.hackpad.com/SecureDrop-Deployment-Best-Pr...
handsomeransoms | 11 years ago | on: SecureDrop
The explicit encouragement that is clearly written on the landing page is to use a personal computer (not a work computer) and a public network (e.g. a coffee shop).
handsomeransoms | 11 years ago | on: SecureDrop
handsomeransoms | 11 years ago | on: SecureDrop
I'm not sure how we could explain to avoid it - where would the explanation go? Visiting that page would be just as much of a correlation, no? It's kind of a chicken and egg problem, unless the source is already using Tor.
Avoiding the "trail of the SSL connection" also suggests we should be doing something to combat website fingerprinting, which we have discussed but do not have a clear solution for yet.
Our current thinking is that just visiting the landing page is not enough to prosecute a source. We can do better, and are working on it, but it's difficult.
handsomeransoms | 11 years ago | on: SecureDrop
Generally, it is very difficult to convince the operators of sites like the Washington Post to do things like this, but we're working on it!
handsomeransoms | 11 years ago | on: SecureDrop
We are continuing to discuss and debate this trade-off. Other ideas welcome!
handsomeransoms | 11 years ago | on: OnionShare: securely and anonymously share a file of any size
handsomeransoms | 11 years ago | on: OnionShare: securely and anonymously share a file of any size
handsomeransoms | 12 years ago | on: Privacy Badger
handsomeransoms | 12 years ago | on: Onionshare – Securely share a file of any size using Tor
handsomeransoms | 12 years ago | on: Chrome's experiment of hiding the URL is great for security
FWIW, Firefox detects insecure login forms and emits a security warning to the web console. This is aimed at developers, however, not users (because the developers are the only ones who can improve the situation).
Our heuristic is imperfect as well. We simply detect <input type="password"> fields on http pages. This works well enough. Trying to detect when developers are abusing <input type="text"> for a password field is non-trivial.
handsomeransoms | 12 years ago | on: Help EFF test Privacy Badger, our new browser extension for privacy
1. Many of Firefox's stability issues are due to 3rd party components (plugins and addons). I recommend disabling all of them, restarting the browser, and seeing if the issues persist. You can then selectively enable (or click-to-play, for plugins) them to improve your experience while maintaining stability. 2. You could also try a profile reset [0], which tends to magically fix some problems (especially if you've had the profile for a while).
[0] https://support.mozilla.org/en-US/kb/reset-firefox-easily-fi...