lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 22 Jun 2014 16:58:17 -0700 From: Tony Arcieri <bascule@...il.com> To: Robert Dannhauer <r.dannhauer@...glemail.com> Cc: fulldisclosure@...lists.org Subject: Re: [FD] keybase.io On Sat, Jun 21, 2014 at 1:37 PM, Robert Dannhauer < r.dannhauer@...glemail.com> wrote: > The only question: Can this be trusted? Can we make sure they don't know > the passphrase? No, the passphrase is being entered into a web page loaded from their domain. Unless you audit the scripts every single time you load the page, they (or anyone with access to their servers, or anyone able to pull off an XSS attack) could easily inject a keylogger or other mechanism for recovering the password. -- Tony Arcieri _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists