[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHOTMVJLvrbtOdJcPWoSCqGMYq8DkkaOV9788t8y7cnKek937Q@mail.gmail.com>
Date: Sun, 22 Jun 2014 16:58:17 -0700
From: Tony Arcieri <bascule@...il.com>
To: Robert Dannhauer <r.dannhauer@...glemail.com>
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] keybase.io
On Sat, Jun 21, 2014 at 1:37 PM, Robert Dannhauer <
r.dannhauer@...glemail.com> wrote:
> The only question: Can this be trusted? Can we make sure they don't know
> the passphrase?
No, the passphrase is being entered into a web page loaded from their
domain. Unless you audit the scripts every single time you load the page,
they (or anyone with access to their servers, or anyone able to pull off an
XSS attack) could easily inject a keylogger or other mechanism for
recovering the password.
--
Tony Arcieri
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists